[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil EC0-350 Dumps with VCE and PDF 111-120

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V8

Question No: 111 – (Topic 2)

What sequence of packets is sent during the initial TCP three-way handshake?


  2. SYN, URG, ACK



Answer: A

Question No: 112 – (Topic 2)

This is an example of whois record.

Ensurepass 2018 PDF and VCE

Sometimes a company shares a little too much information on their organization through public domain records. Based on the above whois record, what can an attacker do? (Select 2 answers)

  1. Search engines like Google, Bing will expose information listed on the WHOIS record

  2. An attacker can attempt phishing and social engineering on targeted individuals using the information from WHOIS record

  3. Spammers can send unsolicited e-mails to addresses listed in the WHOIS record

  4. IRS Agents will use this information to track individuals using the WHOIS record information

Answer: B,C

Question No: 113 – (Topic 2)

You are programming a buffer overflow exploit and you want to create a NOP sled of 200 bytes in the program exploit.c

Ensurepass 2018 PDF and VCE

What is the hexadecimal value of NOP instruction?

  1. 0x60

  2. 0x80

  3. 0x70

  4. 0x90

Answer: D

Question No: 114 – (Topic 2)

An Attacker creates a zuckerjournals.com website by copying and mirroring HACKERJOURNALS.COM site to spread the news that Hollywood actor Jason Jenkins died in a car accident. The attacker then submits his fake site for indexing in major search engines. When users search for quot;Jason Jenkinsquot;, attacker#39;s fake site shows up and dupes victims by the fake news.

Ensurepass 2018 PDF and VCE

This is another great example that some people do not know what URL#39;s are. Real website:

Fake website: http://www.zuckerjournals.com

Ensurepass 2018 PDF and VCE

The website is clearly not WWW.HACKERJOURNALS.COM. It is obvious for many, but unfortunately some people still do not know what an URL is. It#39;s the address that you enter into the address bar at the top your browser and this is clearly not legit site, its www.zuckerjournals.com

How would you verify if a website is authentic or not?

  1. Visit the site using secure HTTPS protocol and check the SSL certificate for authenticity

  2. Navigate to the site by visiting various blogs and forums for authentic links

  3. Enable Cache on your browser and lookout for error message warning on the screen

  4. Visit the site by clicking on a link from Google search engine

Answer: D

Question No: 115 – (Topic 2)

Data is sent over the network as clear text (unencrypted) when Basic Authentication is configured on Web Servers.

  1. true

  2. false

Answer: A

Question No: 116 – (Topic 2)

Which of the following Trojans would be considered #39;Botnet Command Control Center#39;?

  1. YouKill DOOM

  2. Damen Rock

  3. Poison Ivy

  4. Matten Kit

Answer: C

Question No: 117 – (Topic 2)

How does a denial-of-service attack work?

  1. A hacker prevents a legitimate user (or group of users) from accessing a service

  2. A hacker uses every character, word, or letter he or she can think of to defeat authentication

  3. A hacker tries to decipher a password by using a system, which subsequently crashes the network

  4. A hacker attempts to imitate a legitimate user by confusing a computer or even another person

Answer: A

Question No: 118 – (Topic 2)

You have chosen a 22 character word from the dictionary as your password. How long will it take to crack the password by an attacker?

  1. 16 million years

  2. 5 minutes

  3. 23 days

  4. 200 years

Answer: B

Question No: 119 – (Topic 2)

Which port, when configured on a switch receives a copy of every packet that passes through it?

Ensurepass 2018 PDF and VCE

  1. R-DUPE Port

  2. MIRROR port

  3. SPAN port


Answer: C

Question No: 120 – (Topic 2)

You work for Acme Corporation as Sales Manager. The company has tight network security restrictions. You are trying to steal data from the company#39;s Sales database (Sales.xls) and transfer them to your home computer. Your company filters and monitors traffic that leaves from the internal network to the Internet. How will you achieve this without raising suspicion?

  1. Encrypt the Sales.xls using PGP and e-mail it to your personal gmail account

  2. Package the Sales.xls using Trojan wrappers and telnet them back your home computer

  3. You can conceal the Sales.xls database in another file like photo.jpg or other files and send it out in an innocent looking email or file transfer using Steganography techniques

  4. Change the extension of Sales.xls to sales.txt and upload them as attachment to your hotmail account

Answer: C

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.