[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil EC0-350 Dumps with VCE and PDF 401-410

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/EC0-350.html

Ethical Hacking and Countermeasures V8

Question No: 401 – (Topic 5)

During a penetration test, a tester finds a target that is running MS SQL 2000 with default credentials. The tester assumes that the service is running with Local System account.

How can this weakness be exploited to access the system?

  1. Using the Metasploit psexec module setting the SA / Admin credential

  2. Invoking the stored procedure xp_shell to spawn a Windows command shell

  3. Invoking the stored procedure cmd_shell to spawn a Windows command shell

  4. Invoking the stored procedure xp_cmdshell to spawn a Windows command shell

Answer: D

Question No: 402 – (Topic 5)

If an e-commerce site was put into a live environment and the programmers failed to remove the secret entry point that was used during the application development, what is this secret entry point known as?

  1. SDLC process

  2. Honey pot

  3. SQL injection

  4. Trap door

Answer: D

Question No: 403 – (Topic 5)

A company has publicly hosted web applications and an internal Intranet protected by a firewall. Which technique will help protect against enumeration?

  1. Reject all invalid email received via SMTP.

  2. Allow full DNS zone transfers.

  3. Remove A records for internal hosts.

  4. Enable null session pipes.

Answer: C

Question No: 404 – (Topic 5)

Which of the following describes the characteristics of a Boot Sector Virus?

  1. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR

  2. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR

  3. Modifies directory table entries so that directory entries point to the virus code instead of the actual program

  4. Overwrites the original MBR and only executes the new virus code

Answer: B

Question No: 405 – (Topic 5)

Which of the following defines the role of a root Certificate Authority (CA) in a Public Key Infrastructure (PKI)?

  1. The root CA is the recovery agent used to encrypt data when a user#39;s certificate is lost.

  2. The root CA stores the user#39;s hash value for safekeeping.

  3. The CA is the trusted root that issues certificates.

  4. The root CA is used to encrypt email messages to prevent unintended disclosure of data.

Answer: C

Question No: 406 – (Topic 5)

A hacker is attempting to see which IP addresses are currently active on a network. Which NMAP switch would the hacker use?

  1. -sO

  2. -sP

  3. -sS

  4. -sU

Answer: B

Question No: 407 – (Topic 5)

What are the three types of authentication?

  1. Something you: know, remember, prove

  2. Something you: have, know, are

  3. Something you: show, prove, are

  4. Something you: show, have, prove

Answer: B

Question No: 408 – (Topic 5)

Which security control role does encryption meet?

  1. Preventative

  2. Detective

  3. Offensive

  4. Defensive

Answer: A

Question No: 409 – (Topic 5)

Which of the following techniques will identify if computer files have been changed?

  1. Network sniffing

  2. Permission sets

  3. Integrity checking hashes

  4. Firewall alerts

Answer: C

Question No: 410 – (Topic 5)

A hacker is attempting to see which ports have been left open on a network. Which NMAP switch would the hacker use?

  1. -sO

  2. -sP

  3. -sS

  4. -sU

Answer: A

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.