Real 228
EC-Council EC0-350 Exam
Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must
have in order to properly function?
If an e-commerce site was put into a live environment and the programmers failed to remove the secret
entry point that was used during the application development, what is this secret entry point known as?
A Certificate Authority (CA) generates a key pair that will be used for encryption and decryption of email.
The integrity of the encrypted email is dependent on the security of which of the following?
A tester has been hired to do a web application security test. The tester notices that the site is dynamic and
must make use of a back end database.
In order for the tester to see if SQL injection is possible, what is the first character that the tester should use
to attempt breaking a valid SQL request?
What is the name of the international standard that establishes a baseline level of confidence in the security
functionality of IT products by providing a set of requirements for evaluation?