[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil EC0-350 Dumps with VCE and PDF 151-160

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/EC0-350.html

Ethical Hacking and Countermeasures V8

Question No: 151 – (Topic 2)

TCP packets transmitted in either direction after the initial three-way handshake will have which of the following bit set?

  1. SYN flag

  2. ACK flag

  3. FIN flag

  4. XMAS flag

Answer: B

Question No: 152 – (Topic 2)

Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches. If these switches#39; ARP cache is successfully flooded, what will be the result?

  1. The switches will drop into hub mode if the ARP cache is successfully flooded.

  2. If the ARP cache is flooded, the switches will drop into pix mode making it less susceptible to attacks.

  3. Depending on the switch manufacturer, the device will either delete every entry in its ARP cache or reroute packets to the nearest switch.

  4. The switches will route all traffic to the broadcast address created collisions.

Answer: A

Question No: 153 – (Topic 2)

Jason is the network administrator of Spears Technology. He has enabled SNORT IDS to detect attacks going through his network. He receives Snort SMS alerts on his iPhone whenever there is an attempted intrusion to his network.

He receives the following SMS message during the weekend.

Ensurepass 2018 PDF and VCE

An attacker Chew Siew sitting in Beijing, China had just launched a remote scan on Jason#39;s network with the hping command.

Which of the following hping2 command is responsible for the above snort alert?

  1. chenrocks:/home/siew # hping -S -R -P -A -F -U 192.168.2.56 -p 22 -c 5 -t 118

  2. chenrocks:/home/siew # hping -F -Q -J -A -C -W 192.168.2.56 -p 22 -c 5 -t 118

  3. chenrocks:/home/siew # hping -D -V -R -S -Z -Y 192.168.2.56 -p 22 -c 5 -t 118

  4. chenrocks:/home/siew # hping -G -T -H -S -L -W 192.168.2.56 -p 22 -c 5 -t 118

Answer: A

Question No: 154 – (Topic 2)

One of the most common and the best way of cracking RSA encryption is to begin to derive the two prime numbers, which are used in the RSA PKI mathematical process. If the two numbers p and q are discovered through a process, then the private key can be derived.

  1. Factorization

  2. Prime Detection

  3. Hashing

  4. Brute-forcing

Answer: A

Question No: 155 – (Topic 2)

In which step Steganography fits in CEH System Hacking Cycle (SHC)

  1. Step 2: Crack the password

  2. Step 1: Enumerate users

  3. Step 3: Escalate privileges

  4. Step 4: Execute applications

  5. Step 5: Hide files

  6. Step 6: Cover your tracks

Answer: E

Question No: 156 – (Topic 2)

quot;Testing the network using the same methodologies and tools employed by attackersquot; Identify the correct terminology that defines the above statement.

  1. Vulnerability Scanning

  2. Penetration Testing

  3. Security Policy Implementation

  4. Designing Network Security

Answer: B

Question No: 157 – (Topic 2)

Finding tools to run dictionary and brute forcing attacks against FTP and Web servers is an easy task for hackers. They use tools such as arhontus or brutus to break into remote servers.

Ensurepass 2018 PDF and VCE

A command such as this, will attack a given 10.0.0.34 FTP and Telnet servers simultaneously with a list of passwords and a single login namE. linksys. Many FTP- specific password-guessing tools are also available from major security sites.

What defensive measures will you take to protect your network from these attacks?

  1. Never leave a default password

  2. Never use a password that can be found in a dictionary

  3. Never use a password related to your hobbies, pets, relatives, or date of birth.

  4. Use a word that has more than 21 characters from a dictionary as the password

  5. Never use a password related to the hostname, domain name, or anything else that can be found with whois

Answer: A,B,C,E

Question No: 158 – (Topic 2)

Jess the hacker runs L0phtCrack#39;s built-in sniffer utility that grabs SMB password hashes and stores them for offline cracking. Once cracked, these passwords can provide easy access to whatever network resources the user account has access to. But Jess is not picking up hashes from the network. Why?

  1. The network protocol is configured to use SMB Signing

  2. The physical network wire is on fibre optic cable

  3. The network protocol is configured to use IPSEC

  4. L0phtCrack SMB sniffing only works through Switches and not Hubs

Answer: A

Question No: 159 – (Topic 2)

What techniques would you use to evade IDS during a Port Scan? (Select 4 answers)

  1. Use fragmented IP packets

  2. Spoof your IP address when launching attacks and sniff responses from the server

  3. Overload the IDS with Junk traffic to mask your scan

  4. Use source routing (if possible)

  5. Connect to proxy servers or compromised Trojaned machines to launch attacks

Answer: A,B,D,E

Question No: 160 – (Topic 2)

What is the IV key size used in WPA2?

  1. 32

  2. 24

  3. 16

  4. 48

E. 128

Answer: D Explanation:

Every WPA key includes a 48 bit IV key, which creates 500 trillion combinations and is a stronger encryption compared to WEP. With so many combinations, the possibility of the encryption key reuse is lesser and therefore the encryption can endure hacking attacks better than WEP. WPA does not make direct use of the master encryption keys and has a message integrity checking facility.

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.