[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil EC0-350 Dumps with VCE and PDF 1-10

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V8

Question No: 1 – (Topic 1)

What port number is used by Kerberos protocol?

  1. 88

  2. 44 C. 487 D. 419

Answer: A

Question No: 2 – (Topic 1)

Jack Hacker wants to break into Brown Co.#39;s computers and obtain their secret double fudge cookie recipe. Jack calls Jane, an accountant at Brown Co., pretending to be an administrator from Brown Co. Jack tells Jane that there has been a problem with some accounts and asks her to verify her password with him #39;#39;just to double check our records.#39;#39; Jane does not suspect anything amiss, and parts with her password. Jack can now access Brown Co.#39;s computers with a valid user name and password, to steal the cookie recipe.

What kind of attack is being illustrated here?

  1. Reverse Psychology

  2. Reverse Engineering

  3. Social Engineering

  4. Spoofing Identity

  5. Faking Identity

Answer: C

Question No: 3 – (Topic 1)

Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and uses the special card in order to access the restricted area of the target company. Just as the employee opens the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so that he can enter. What is the best way to undermine the social engineering activity of tailgating?

  1. Issue special cards to access secure doors at the company and provide a one-time only brief description of use of the special card

  2. Educate and enforce physical security policies of the company to all the employees on a regular basis

  3. Setup a mock video camera next to the special card reader adjacent to the secure door

  4. Post a sign that states, quot;no tailgatingquot; next to the special card reader adjacent to the secure door

Answer: B

Question No: 4 – (Topic 1)

A rootkit is a collection of tools (programs) that enable administrator-level access to a computer. This program hides itself deep into an operating system for malicious activity and is extremely difficult to detect. The malicious software operates in a stealth fashion by hiding its files, processes and registry keys and may be used to create a hidden directory or folder designed to keep out of view from a user#39;s operating system and security software.

Ensurepass 2018 PDF and VCE

What privilege level does a rootkit require to infect successfully on a Victim#39;s machine?

  1. User level privileges

  2. Ring 3 Privileges

  3. System level privileges

  4. Kernel level privileges

Answer: D

Question No: 5 – (Topic 1)

Ursula is a college student at a University in Amsterdam. Ursula originally went to college to study engineering but later changed to marine biology after spending a month at sea with her friends. These friends frequently go out to sea to follow and harass fishing fleets that illegally fish in foreign waters. Ursula eventually wants to put companies practicing illegal fishing out of business. Ursula decides to hack into the parent company#39;s computers and destroy critical data knowing fully well that, if caught, she probably would be sent to jail for a very long time. What would Ursula be considered?

  1. Ursula would be considered a gray hat since she is performing an act against illegal activities.

  2. She would be considered a suicide hacker.

  3. She would be called a cracker.

  4. Ursula would be considered a black hat.

Answer: B

Question No: 6 – (Topic 1)

This type of Port Scanning technique splits TCP header into several packets so that the packet filters are not able to detect what the packets intends to do.

  1. UDP Scanning

  2. IP Fragment Scanning

  3. Inverse TCP flag scanning

  4. ACK flag scanning

Answer: B

Question No: 7 – (Topic 1)

Jake works as a system administrator at Acme Corp. Jason, an accountant of the firm befriends him at the canteen and tags along with him on the pretext of appraising him about potential tax benefits. Jason waits for Jake to swipe his access card and follows him through the open door into the secure systems area. How would you describe Jason#39;s behavior within a security context?

  1. Smooth Talking

  2. Swipe Gating

  3. Tailgating

  4. Trailing

Answer: C

Question No: 8 – (Topic 1)

Neil is a network administrator working in Istanbul. Neil wants to setup a protocol analyzer on his network that will receive a copy of every packet that passes through the main office switch. What type of port will Neil need to setup in order to accomplish this?

  1. Neil will have to configure a Bridged port that will copy all packets to the protocol analyzer.

  2. Neil will need to setup SPAN port that will copy all network traffic to the protocol analyzer.

  3. He will have to setup an Ether channel port to get a copy of all network traffic to the analyzer.

  4. He should setup a MODS port which will copy all network traffic.

Answer: B

Question No: 9 – (Topic 1)

Syslog is a standard for logging program messages. It allows separation of the software that generates messages from the system that stores them and the software that reports and analyzes them. It also provides devices, which would otherwise be unable to communicate a means to notify administrators of problems or performance.

Ensurepass 2018 PDF and VCE

What default port Syslog daemon listens on?

A. 242

B. 312

C. 416

D. 514

Answer: D

Question No: 10 – (Topic 1)

Anonymizer sites access the Internet on your behalf, protecting your personal information from disclosure. An anonymizer protects all of your computer#39;s identifying information while it surfs for you, enabling you to remain at least one step removed from the sites you visit.

You can visit Web sites without allowing anyone to gather information on sites visited by you. Services that provide anonymity disable pop-up windows and cookies, and conceal visitor#39;s IP address.

These services typically use a proxy server to process each HTTP request. When the user requests a Web page by clicking a hyperlink or typing a URL into their browser, the service retrieves and displays the information using its own server. The remote server (where the requested Web page resides) receives information on the anonymous Web surfing service in place of your information.

In which situations would you want to use anonymizer? (Select 3 answers)

  1. Increase your Web browsing bandwidth speed by using Anonymizer

  2. To protect your privacy and Identity on the Internet

  3. To bypass blocking applications that would prevent access to Web sites or parts of sites

    that you want to visit.

  4. Post negative entries in blogs without revealing your IP identity

Answer: B,C,D

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.