[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil EC0-350 Dumps with VCE and PDF 261-270

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V8

Question No: 261 – (Topic 3)

What type of port scan is represented here.

Ensurepass 2018 PDF and VCE

  1. Stealth Scan

  2. Full Scan

  3. XMAS Scan

  4. FIN Scan

Answer: A

Question No: 262 – (Topic 3)

An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?

  1. Birthday attack

  2. Plaintext attack

  3. Meet in the middle attack

  4. Chosen ciphertext attack

Answer: D

Question No: 263 – (Topic 3)

Here is the ASCII Sheet.

Ensurepass 2018 PDF and VCE

You want to guess the DBO username juggyboy (8 characters) using Blind SQL Injection


What is the correct syntax?

Ensurepass 2018 PDF and VCE

  1. Option A

  2. Option B

  3. Option C

  4. Option D

Answer: A

Question No: 264 – (Topic 3)

Which of the following represent weak password? (Select 2 answers)

  1. Passwords that contain letters, special characters, and numbers ExamplE.


  2. Passwords that contain only numbers ExamplE. 23698217

  3. Passwords that contain only special characters ExamplE. amp;*#@!(%)

  4. Passwords that contain letters and numbers ExamplE. meerdfget123

  5. Passwords that contain only letters ExamplE. QWERTYKLRTY

  6. Passwords that contain only special characters and numbers ExamplE. 123@$45

  7. Passwords that contain only letters and special characters ExamplE. bob@amp;ba

  8. Passwords that contain Uppercase/Lowercase from a dictionary list ExamplE. OrAnGe

Answer: E,H

Question No: 265 – (Topic 3)

You are writing security policy that hardens and prevents Footprinting attempt by Hackers. Which of the following countermeasures will NOT be effective against this attack?

  1. Configure routers to restrict the responses to Footprinting requests

  2. Configure Web Servers to avoid information leakage and disable unwanted protocols

  3. Lock the ports with suitable Firewall configuration

  4. Use an IDS that can be configured to refuse suspicious traffic and pick up Footprinting patterns

  5. Evaluate the information before publishing it on the Website/Intranet

  6. Monitor every employee computer with Spy cameras, keyloggers and spy on them

  7. Perform Footprinting techniques and remove any sensitive information found on DMZ sites

  8. Prevent search engines from caching a Webpage and use anonymous registration services

  9. Disable directory and use split-DNS

Answer: F

Question No: 266 – (Topic 3)

Bill is a security analyst for his company. All the switches used in the company#39;s office are Cisco switches. Bill wants to make sure all switches are safe from ARP poisoning. How can Bill accomplish this?

  1. Bill can use the command: ip dhcp snooping.

  2. Bill can use the command: no ip snoop.

  3. Bill could use the command: ip arp no flood.

  4. He could use the command: ip arp no snoop.

Answer: A

Question No: 267 – (Topic 3)

NTP allows you to set the clocks on your systems very accurately, to within 100ms and sometimes-even 10ms. Knowing the exact time is extremely important for enterprise security. Various security protocols depend on an accurate source of time information in order to prevent quot;playbackquot; attacks. These protocols tag their communications with the current time, to prevent attackers from replaying the same communications, e.g., a login/password interaction or even an entire communication, at a later date. One can circumvent this tagging, if the clock can be set back to the time the communication was recorded. An attacker attempts to try corrupting the clocks on devices on your network. You run Wireshark to detect the NTP traffic to see if there are any irregularities on the network. What port number you should enable in Wireshark display filter to view NTP packets?

  1. TCP Port 124

  2. UDP Port 125

  3. UDP Port 123

  4. TCP Port 126

Answer: C

Question No: 268 – (Topic 3)

You are trying to package a RAT Trojan so that Anti-Virus software will not detect it. Which of the listed technique will NOT be effective in evading Anti-Virus scanner?

  1. Convert the Trojan.exe file extension to Trojan.txt disguising as text file

  2. Break the Trojan into multiple smaller files and zip the individual pieces

  3. Change the content of the Trojan using hex editor and modify the checksum

  4. Encrypt the Trojan using multiple hashing algorithms like MD5 and SHA-1

Answer: A

Question No: 269 – (Topic 3)

A company is using Windows Server 2003 for its Active Directory (AD). What is the most efficient way to crack the passwords for the AD users?

  1. Perform a dictionary attack.

  2. Perform a brute force attack.

  3. Perform an attack with a rainbow table.

  4. Perform a hybrid attack.

Answer: C

Question No: 270 – (Topic 3)

When an alert rule is matched in a network-based IDS like snort, the IDS does which of the following?

  1. Drops the packet and moves on to the next one

  2. Continues to evaluate the packet until all rules are checked

  3. Stops checking rules, sends an alert, and lets the packet continue

  4. Blocks the connection with the source IP address in the packet

Answer: B

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.