Ceh Ec0 350 Ethical Hacking And Countermeasures V8 Practice Test - Set 1

Test your knowledge with this Ceh Ec0 350 Ethical Hacking And Countermeasures V8 mock exam. Get real-world IT questions and prepare for certification success.

EC0-350: Ethical Hacking and Countermeasures v8 - Exam Information

Exam Information

Exam Code

Ceh Ec0 350 Ethical Hacking And Countermeasures V8

Exam Title

EC0-350: Ethical Hacking and Countermeasures v8

Vendor

CEH

Difficulty

Advanced

Duration

4 Hours

Question Format

Multiple Choice

Last Updated

March 10, 2025

This exam assesses ethical hacking skills and security countermeasures.

Practice Test

Shop Best EC0-350: Ethical Hacking and Countermeasures v8 Resources Worldwide Amazon

1. Which tool is commonly used for footprinting during the reconnaissance phase?

Metasploit
Nmap
Burp Suite
Wireshark

2. What is the primary purpose of the `hping` tool?

Analyze malware
Perform penetration testing
Craft network packets
Brute-force credentials

3. What is the purpose of network scanning in ethical hacking?

Identify open ports and services
Encrypt sensitive data
Develop secure software
Monitor web traffic

4. Which phase of ethical hacking involves covering tracks?

Maintaining access
Reconnaissance
Covering tracks
Gaining access

5. Which tool is used for wireless network auditing?

Aircrack-ng
John the Ripper
Netcat
Burp Suite

6. What is the goal of privilege escalation?

Gain higher-level access
Encrypt sensitive data
Prevent network attacks
Scan for open ports

7. Which type of malware replicates itself without a host file?

Worm
Trojan
Virus
Rootkit

8. What is a key objective of social engineering attacks?

Obtain sensitive information
Speed up networks
Encrypt user data
Prevent phishing

9. Which attack involves injecting malicious SQL queries?

SQL Injection
Phishing
DDoS
ARP Spoofing

10. Which encryption method uses the same key for encryption and decryption?

Symmetric encryption
Asymmetric encryption
Hashing
SSL

11. What does a vulnerability scanner do?

Identifies security weaknesses
Encrypts communications
Blocks malware
Monitors user activity

12. Which protocol is commonly targeted in session hijacking?

HTTP
FTP
SMTP
SNMP

13. Which type of attack involves overwhelming a target with excessive traffic?

DDoS
Phishing
ARP Poisoning
Privilege Escalation

14. What is the main function of a honeypot?

Attract and monitor attackers
Block network traffic
Encrypt user data
Scan for vulnerabilities

15. Which tool is often used to crack hashed passwords?

John the Ripper
Snort
Wireshark
Aircrack-ng

16. Which phase of ethical hacking includes maintaining persistent access?

Maintaining access
Reconnaissance
Gaining access
Covering tracks

17. What is the primary purpose of penetration testing?

Identify and exploit vulnerabilities
Encrypt user data
Develop secure software
Prevent malware infections

18. Which port does SSH typically use?

22
80
443
25

19. Which technique is used to hide malicious code within legitimate files?

Steganography
Spoofing
Phishing
Brute-forcing

20. What is the primary purpose of IDS (Intrusion Detection System)?

Monitor and detect suspicious activities
Encrypt sensitive data
Prevent social engineering attacks
Accelerate network traffic

21. Which DNS record maps IP addresses to hostnames?

PTR
A
MX
CNAME

22. What is the purpose of theHarvester tool?

Gather email and subdomain information
Crack passwords
Scan networks
Analyze malware

23. Which Google operator finds specific filetypes?

filetype:
site:
inurl:
intitle:

24. What does WHOIS provide about a domain?

Registration details
Vulnerabilities
Traffic statistics
Encryption status

25. Which tool performs reverse IP lookups?

DNSRecon
Nmap
Metasploit
Wireshark

26. What does a NULL scan attempt to identify?

Open ports
OS version
User accounts
Network speed

27. Which Nmap flag enables OS detection?

-O
-sS
-p
-A

28. What is the purpose of Netcat?

Network debugging
Password cracking
Vulnerability scanning
Traffic encryption

29. Which protocol does a ping sweep use?

ICMP
TCP
UDP
HTTP

30. What does a SYN scan determine?

Port status without completing TCP handshake
Service versions
OS fingerprint
Network bandwidth

31. Which tool enumerates Windows shares?

Enum4linux
Nmap
Metasploit
Wireshark

32. What does SNMP enumeration reveal?

Network device information
Encrypted passwords
Web application vulnerabilities
Malware signatures

33. Which port does LDAP typically use?

389
80
443
22

34. What is the purpose of RPC enumeration?

Discover remote services
Crack passwords
Encrypt communications
Prevent attacks

35. Which tool enumerates web server directories?

DirBuster
John
Aircrack-ng
Snort

36. What is the purpose of the SAM file in Windows?

Store password hashes
Log system events
Manage services
Encrypt files

37. Which tool extracts password hashes from memory?

Mimikatz
Wireshark
Nmap
Burp Suite

38. What does a rainbow table contain?

Precomputed password hashes
Network vulnerabilities
Malware signatures
Encryption keys

39. Which registry hive contains user-specific settings?

HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_CLASSES_ROOT
HKEY_USERS

40. What is the purpose of the sticky bit?

Maintain file permissions
Encrypt files
Hide directories
Prevent deletion

41. What is the primary characteristic of a rootkit?

Hides its presence
Encrypts files
Spreads through email
Displays ads

42. Which malware type demands payment?

Ransomware
Spyware
Adware
Worm

43. What does a Trojan horse do?

Disguises as legitimate software
Self-replicates
Infects boot sectors
Spreads through networks

44. Which tool analyzes malware behavior?

Cuckoo Sandbox
Nmap
Wireshark
Metasploit

45. What is the purpose of a botnet?

Execute coordinated attacks
Encrypt communications
Scan for vulnerabilities
Analyze network traffic

46. Which attack intercepts network traffic?

Man-in-the-middle
DDoS
SQL injection
Phishing

47. What does ARP spoofing accomplish?

Redirect network traffic
Encrypt data
Crack passwords
Scan ports

48. Which tool captures network packets?

Wireshark
John
Hydra
Sqlmap

49. What is the purpose of MAC flooding?

Overwhelm switch CAM tables
Encrypt traffic
Prevent sniffing
Accelerate networks

50. Which protocol is vulnerable to sniffing?

FTP
HTTPS
SSH
SFTP

51. What is pretexting in social engineering?

Creating fake scenarios
Sending mass emails
Exploiting software bugs
Cracking passwords

52. Which tool creates phishing pages?

SET (Social Engineering Toolkit)
Metasploit
Nmap
Wireshark

53. What is tailgating?

Physical access by following someone
Network eavesdropping
Password cracking
Email spoofing

54. Which attack uses phone calls?

Vishing
Phishing
Smishing
Pharming

55. What is the primary defense against social engineering?

Security awareness training
Firewalls
Antivirus
Encryption

56. What is the difference between DoS and DDoS?

Multiple attack sources
Attack duration
Target systems
Exploited vulnerabilities

57. Which tool performs stress testing?

LOIC
Nmap
Metasploit
Wireshark

58. What is a SYN flood attack?

Exploits TCP handshake
Overflows buffers
Exhausts bandwidth
Corrupts packets

59. Which attack targets application layers?

HTTP flood
Ping of death
Smurf attack
UDP flood

60. What is the primary defense against DDoS?

Traffic filtering
Strong passwords
Encryption
Antivirus

61. What is session fixation?

Setting session ID before login
Stealing cookies
Brute-forcing credentials
Exploiting buffer overflows

62. Which tool performs MITM attacks?

Ettercap
Hydra
John
Sqlmap

63. What is the primary defense against session hijacking?

HTTPS and secure cookies
Firewalls
Antivirus
Encryption

64. Which attack steals session tokens?

XSS
SQLi
Phishing
DDoS

65. What does CSRF exploit?

Authenticated sessions
Network protocols
OS vulnerabilities
Physical access

66. Which tool tests for SQL injection?

Sqlmap
Metasploit
Nmap
Wireshark

67. What is the primary defense against XSS?

Input validation and output encoding
Firewalls
Antivirus
Encryption

68. Which attack manipulates file paths?

Directory traversal
CSRF
Phishing
DDoS

69. What is the purpose of Burp Suite?

Web application testing
Network scanning
Password cracking
Malware analysis

70. Which HTTP header prevents clickjacking?

X-Frame-Options
Content-Security-Policy
Strict-Transport-Security
X-XSS-Protection

71. Which encryption is weakest for WiFi?

WEP
WPA
WPA2
WPA3

72. What does an evil twin attack create?

Rogue access point
Duplicate packets
Fake certificates
Spoofed MAC addresses

73. Which tool cracks WPA handshakes?

Aircrack-ng
Wireshark
Nmap
Metasploit

74. What is wardriving?

Locating wireless networks
Cracking passwords
Sniffing traffic
Launching DDoS

75. Which attack targets WPS?

PIN brute-forcing
Packet injection
MAC spoofing
ARP poisoning

The Ceh Ec0 350 Ethical Hacking And Countermeasures V8 certification is a globally recognized credential for IT professionals. This practice test helps you prepare by covering key topics like hardware, networking, troubleshooting, and security.

Want more practice? Check out our other mock exams:

© 2025 ITCertRocket.com - Hands-On IT Lab Exercises & Certification Prep. All rights reserved.