1.
Botnets are networks of compromised computers that are controlled remotely and surreptitiously by one or more cyber criminals. How do cyber criminals infect a victim's computer with bots? (Select 4 answers)
2.
User which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?
3.
Which of the following activities will NOT be considered as passive footprinting?
4.
Which one of the following is defined as the process of distributing incorrect Internet Protocol (IP) addresses/names with the intent of diverting traffic?
5.
A XYZ security System Administrator is reviewing the network system log files. He notes the following: - Network log files are at 5 MB at 12:00 noon. - At 14:00 hours, the log files at 3 MB. What should he assume has happened and what should he do about the situation?
6.
To what does "message repudiation" refer to what concept in the realm of email security?
7.
Snort has been used to capture packets on the network. On studying the packets, the penetration tester finds it to be abnormal. If you were the penetration tester, why would you find this abnormal? What is odd about this attack? (Choose the most appropriate statement)
8.
Your XYZ trainee Sandra asks you which are the four existing Regional Internet Registry (RIR's)?
9.
A very useful resource for passively gathering information about a target company is: Real 247 EC-Council EC0-350 Exam
10.
Which of the following tools are used for footprinting? (Choose four)