[Free] 2017(Sep) EnsurePass Pass4sure ECCouncil EC0-350 Dumps with VCE and PDF 201-210

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/EC0-350.html

Ethical Hacking and Countermeasures V8

Question No: 201 – (Topic 3)

Which vital role does the U.S. Computer Security Incident Response Team (CSIRT) provide?

  1. Incident response services to any user, company, government agency, or organization in partnership with the Department of Homeland Security

  2. Maintenance of the nation’s Internet infrastructure, builds out new Internet infrastructure, and decommissions old Internet infrastructure

  3. Registration of critical penetration testing for the Department of Homeland Security and public and private sectors

  4. Measurement of key vulnerability assessments on behalf of the Department of Defense (DOD) and State Department, as well as private sectors

Answer: A

Question No: 202 – (Topic 3)

Which of the following are valid types of rootkits? (Choose three.)

  1. Hypervisor level

  2. Network level

  3. Kernel level

  4. Application level

  5. Physical level

  6. Data access level

Answer: A,C,D

Question No: 203 – (Topic 3)

A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed. Which security policy must the security analyst check to see if dial-out modems are allowed?

  1. Firewall-management policy

  2. Acceptable-use policy

  3. Remote-access policy

  4. Permissive policy

Answer: C

Question No: 204 – (Topic 3)

You ping a target IP to check if the host is up. You do not get a response. You suspect ICMP is blocked at the firewall. Next you use hping2 tool to ping the target host and you get a response. Why does the host respond to hping2 and not ping packet?

Ensurepass 2017 PDF and VCE

  1. Ping packets cannot bypass firewalls

  2. You must use ping 10.2.3.4 switch

  3. Hping2 uses stealth TCP packets to connect

  4. Hping2 uses TCP instead of ICMP by default

Answer: D

Question No: 205 – (Topic 3)

Which of the following describes a component of Public Key Infrastructure (PKI) where a copy of a private key is stored to provide third-party access and to facilitate recovery operations?

  1. Key registry

  2. Recovery agent

  3. Directory

  4. Key escrow

Answer: D

Question No: 206 – (Topic 3)

Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?

  1. SHA-1

  2. MD5

  3. HAVAL

  4. MD4

Answer: A

Question No: 207 – (Topic 3)

The GET method should never be used when sensitive data such as credit card is being sent to a CGI program. This is because any GET command will appear in the URL, and will be logged by any servers. For example, let#39;s say that you#39;ve entered your credit card information into a form that uses the GET method. The URL may appear like this:

https://www.xsecurity-bank.com/creditcard.asp?cardnumber=453453433532234

The GET method appends the credit card number to the URL. This means that anyone with access to a server log will be able to obtain this information. How would you protect from this type of attack?

  1. Never include sensitive information in a script

  2. Use HTTPS SSLv3 to send the data instead of plain HTTPS

  3. Replace the GET with POST method when sending data

  4. Encrypt the data before you send using GET method

Answer: C

Question No: 208 – (Topic 3)

Which of the following is a hashing algorithm?

  1. MD5

  2. PGP

  3. DES

  4. ROT13

Answer: A

Question No: 209 – (Topic 3)

Low humidity in a data center can cause which of the following problems?

  1. Heat

  2. Corrosion

  3. Static electricity

  4. Airborne contamination

Answer: C

Question No: 210 – (Topic 3)

John the Ripper is a technical assessment tool used to test the weakness of which of the following?

  1. Usernames

  2. File permissions

  3. Firewall rulesets

  4. Passwords

Answer: D

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.