All Exams
Login
Home
Exams
ECCouncil
EC0-350
Question 6 of 357
Which statement is TRUE regarding network firewalls preventing Web Application attacks?
A.
Network firewalls can prevent attacks because they can detect malicious HTTP traffic.
B.
Network firewalls cannot prevent attacks because ports 80 and 443 must be opened.
C.
Network firewalls can prevent attacks if they are properly configured.
D.
Network firewalls cannot prevent attacks because they are too complex to configure.
Answer
Discussion
Correct Answer: B
Question 7 of 357
Bluetooth uses which digital modulation technique to exchange information between paired devices?
A.
PSK (phase-shift keying)
B.
FSK (frequency-shift keying)
C.
ASK (amplitude-shift keying)
D.
QAM (quadrature amplitude modulation)
Answer
Discussion
Correct Answer: A
Question 8 of 357
In order to show improvement of security over time, what must be developed?
A.
Reports
B.
Testing tools
C.
Metrics
D.
Taxonomy of vulnerabilities
Answer
Discussion
Correct Answer: C
Question 9 of 357
Passive reconnaissance involves collecting information through which of the following?
A.
Social engineering
B.
Network traffic sniffing
C.
Man in the middle attacks
D.
Publicly accessible sources
Answer
Discussion
Correct Answer: D
Question 10 of 357
How can rainbow tables be defeated?
A.
Password salting
B.
Use of non-dictionary words
C.
All uppercase character passwords
D.
Lockout accounts under brute force password cracking attempts
Answer
Discussion
Correct Answer: A
Prev page
Prev
Next page
Next