[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil EC0-350 Dumps with VCE and PDF 101-110

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V8

Question No: 101 – (Topic 2)

In this attack, a victim receives an e-mail claiming from PayPal stating that their account has been disabled and confirmation is required before activation. The attackers then scam to collect not one but two credit card numbers, ATM PIN number and other personal details.

Ensurepass 2018 PDF and VCE

Ignorant users usually fall prey to this scam. Which of the following statement is incorrect

related to this attack?

  1. Do not reply to email messages or popup ads asking for personal or financial information

  2. Do not trust telephone numbers in e-mails or popup ads

  3. Review credit card and bank account statements regularly

  4. Antivirus, anti-spyware, and firewall software can very easily detect these type of attacks

  5. Do not send credit card numbers, and personal or financial information via e-mail

Answer: D

Question No: 102 – (Topic 2)

You are gathering competitive intelligence on an organization. You notice that they have jobs listed on a few Internet job-hunting sites. There are two jobs for network and system administrators. How can this help you in foot printing the organization?

  1. To learn about the IP range used by the target network

  2. To identify the number of employees working for the company

  3. To test the limits of the corporate security policy enforced in the company

  4. To learn about the operating systems, services and applications used on the network

Answer: D

Question No: 103 – (Topic 2)

Which type of sniffing technique is generally referred as MiTM attack?

Ensurepass 2018 PDF and VCE

  1. Password Sniffing

  2. ARP Poisoning

  3. Mac Flooding

  4. DHCP Sniffing

Answer: B Explanation:

ARP poisoning is the closest value to the right answer because ARP spoofing, also known as ARP flooding, ARP poisoning or ARP poison routing (APR), is a technique used to attack a local-area network (LAN). ARP spoofing may allow an attacker to interceptdata frames on a LAN, modify the traffic, or stop the traffic altogether. The attack can only be used on networks that make use of the Address Resolution Protocol (ARP) and not another method of address resolution.

Question No: 104 – (Topic 2)

John is using a special tool on his Linux platform that has a database containing signatures to be able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI/ASPX scripts. Moreover, the database detects DDoS zombies and Trojans as well.

What would be the name of this tool?

  1. hping2

  2. nessus

  3. nmap

  4. make

Answer: B

Question No: 105 – (Topic 2)

Bob has been hired to do a web application security test. Bob notices that the site is dynamic and must make use of a back end database. Bob wants to see if SQL Injection would be possible. What is the first character that Bob should use to attempt breaking valid SQL request?

  1. Semi Column

  2. Double Quote

  3. Single Quote

  4. Exclamation Mark

Answer: C

Question No: 106 – (Topic 2)

Gerald, the Systems Administrator for Hyped Enterprises, has just discovered that his network has been breached by an outside attacker. After performing routine maintenance on his servers, he discovers numerous remote tools were installed that no one claims to have knowledge of in his department. Gerald logs onto the management console for his IDS and discovers an unknown IP address that scanned his network constantly for a week and was able to access his network through a high-level port that was not closed. Gerald traces the IP address he found in the IDS log to a proxy server in Brazil. Gerald calls the company that owns the proxy server and after searching through their logs, they trace the source to another proxy server in Switzerland. Gerald calls the company in Switzerland that owns the proxy server and after scanning through the logs again, they trace the source back to a proxy server in China. What proxy tool has Gerald#39;s attacker used to cover their tracks?

  1. ISA proxy

  2. IAS proxy

  3. TOR proxy

  4. Cheops proxy

Answer: C

Question No: 107 – (Topic 2)

What port number is used by LDAP protocol?

A. 110

B. 389

C. 464

D. 445

Answer: B

Question No: 108 – (Topic 2)

What is the command used to create a binary log file using tcpdump?

  1. tcpdump -w ./log

  2. tcpdump -r log

  3. tcpdump -vde logtcpdump -vde ? log

  4. tcpdump -l /var/log/

Answer: A

Question No: 109 – (Topic 2)

A simple compiler technique used by programmers is to add a terminator #39;canary word#39; containing four letters NULL (0x00), CR (0x0d), LF (0x0a) and EOF (0xff) so that most string operations are terminated. If the canary word has been altered when the function returns, and the program responds by emitting an intruder alert into syslog, and then halts what does it indicate?

  1. A buffer overflow attack has been attempted

  2. A buffer overflow attack has already occurred

  3. A firewall has been breached and this is logged

  4. An intrusion detection system has been triggered

  5. The system has crashed

Answer: A

Question No: 110 – (Topic 2)

A digital signature is simply a message that is encrypted with the public key instead of the private key.

  1. true

  2. false

Answer: B

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.