Exam Details

  • Exam Code
    :EC0-349
  • Exam Name
    :Computer Hacking Forensic Investigator
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :304 Q&As
  • Last Updated
    :Mar 26, 2025

EC-COUNCIL EC-COUNCIL Certifications EC0-349 Questions & Answers

  • Question 261:

    As a security analyst, you setup a false survey website that will require users to create a username and a strong password. You send the link to all the employees of the company. What information will you be able to gather?

    A. The IP address of the employees' computers

    B. Bank account numbers and the corresponding routing numbers

    C. The employees network usernames and passwords

    D. The MAC address of the employees' computers

  • Question 262:

    What is a good security method to prevent unauthorized users from "tailgating"?

    A. Man trap

    B. Electronic combination locks

    C. Pick-resistant locks

    D. Electronic key systems

  • Question 263:

    You are the security analyst working for a private company out of France. Your current assignment is to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance, you discover that the bank security defenses are very strong and would take too long to penetrate. You decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in London. After monitoring some of the traffic, you see a lot of FTP packets traveling back and forth. You want to sniff the traffic and extract usernames and passwords. What tool could you use to get this information?

    A. Airsnort

    B. Snort

    C. Ettercap

    D. RaidSniff

  • Question 264:

    Kyle is performing the final testing of an application he developed for the accounting department.

    His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following

    command. What is he testing at this point?

    #include #include int main(int argc, char

    *argv[]) { char buffer[10]; if (argc < 2) { fprintf (stderr, "USAGE: %s string\n", argv[0]); return 1; }

    strcpy(buffer, argv[1]); return 0; }

    A. Buffer overflow

    B. SQL injection

    C. Format string bug

    D. Kernal injection

  • Question 265:

    You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?

    A. Polymorphic

    B. Metamorphic

    C. Oligomorhic

    D. Transmorphic

  • Question 266:

    Why is it a good idea to perform a penetration test from the inside?

    A. It is never a good idea to perform a penetration test from the inside

    B. Because 70% of attacks are from inside the organization

    C. To attack a network from a hacker's perspective

    D. It is easier to hack from the inside

  • Question 267:

    Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold navigates to google.com and types in the following search. link:www.ghttech.net What will this search produce?

    A. All sites that ghttech.net links to

    B. All sites that link to ghttech.net

    C. All search engines that link to .net domains

    D. Sites that contain the code: link:www.ghttech.net

  • Question 268:

    Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to hijack a session, using Ettercap, of a user connected to his Web server. Why will Jonathan not succeed?

    A. Only an HTTPS session can be hijacked

    B. HTTP protocol does not maintain session

    C. Only FTP traffic can be hijacked

    D. Only DNS traffic can be hijacked

  • Question 269:

    A packet is sent to a router that does not have the packet destination address in its route table. How will the packet get to its proper destination?

    A. Root Internet servers

    B. Border Gateway Protocol

    C. Gateway of last resort

    D. Reverse DNS

  • Question 270:

    James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?

    A. Smurf

    B. Trinoo

    C. Fraggle

    D. SYN flood

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your EC0-349 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.