[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil EC0-350 Dumps with VCE and PDF 41-50

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V8

Question No: 41 – (Topic 1)

You just purchased the latest DELL computer, which comes pre-installed with Windows 7, McAfee antivirus software and a host of other applications. You want to connect Ethernet wire to your cable modem and start using the computer immediately. Windows is dangerously insecure when unpacked from the box, and there are a few things that you must do before you use it.

  1. New installation of Windows should be patched by installing the latest service packs and hotfixes

  2. Key applications such as Adobe Acrobat, Macromedia Flash, Java, Winzip etc., must have the latest security patches installed

  3. Install a personal firewall and lock down unused ports from connecting to your computer

  4. Install the latest signatures for Antivirus software

  5. Configure quot;Windows Updatequot; to automatic

  6. Create a non-admin user with a complex password and logon to this account

  7. You can start using your computer as vendors such as DELL, HP and IBM would have already installed the latest service packs.

Answer: A,C,D,E,F

Question No: 42 – (Topic 1)

Which type of scan does NOT open a full TCP connection?

  1. Stealth Scan

  2. XMAS Scan

  3. Null Scan

  4. FIN Scan

Answer: A

Question No: 43 – (Topic 1)

How do you defend against ARP Spoofing? Select three.

  1. Use ARPWALL system and block ARP spoofing attacks

  2. Tune IDS Sensors to look for large amount of ARP traffic on local subnets

  3. Use private VLANS

  4. Place static ARP entries on servers, workstation and routers

Answer: A,C,D Explanation:

ARPwall is used in protecting against ARP spoofing. Incorrect answer:

IDS option may works fine in case of monitoring the traffic from outside the network but not from internal hosts.

Question No: 44 – (Topic 1)

Which of the following statements would NOT be a proper definition for a Trojan Horse?

  1. An authorized program that has been designed to capture keyboard keystroke while the user is unaware of such activity being performed

  2. An unauthorized program contained within a legitimate program. This unauthorized program performs functions unknown (and probably unwanted) by the user

  3. A legitimate program that has been altered by the placement of unauthorized code

    within it; this code performs functions unknown (and probably unwanted) by the user

  4. Any program that appears to perform a desirable and necessary function but that (because of unauthorized code within it that is unknown to the user) performs functions unknown (and definitely unwanted) by the user

Answer: A

Question No: 45 – (Topic 1)

More sophisticated IDSs look for common shellcode signatures. But even these systems can be bypassed, by using polymorphic shellcode. This is a technique common among virus writers ?it basically hides the true nature of the shellcode in different disguises.

How does a polymorphic shellcode work?

  1. They encrypt the shellcode by XORing values over the shellcode, using loader code to decrypt the shellcode, and then executing the decrypted shellcode

  2. They convert the shellcode into Unicode, using loader to convert back to machine code then executing them

  3. They reverse the working instructions into opposite order by masking the IDS signatures

  4. They compress shellcode into normal instructions, uncompress the shellcode using loader code and then executing the shellcode

Answer: A

Question No: 46 – (Topic 1)

How do you defend against DHCP Starvation attack?

Ensurepass 2018 PDF and VCE

  1. Enable ARP-Block on the switch

  2. Enable DHCP snooping on the switch

  3. Configure DHCP-BLOCK to 1 on the switch

  4. Install DHCP filters on the switch to block this attack

Answer: B

Question No: 47 – (Topic 1)

Fake Anti-Virus, is one of the most frequently encountered and persistent threats on the web. This malware uses social engineering to lure users into infected websites with a technique called Search Engine Optimization.

Once the Fake AV is downloaded into the user#39;s computer, the software will scare them into believing their system is infected with threats that do not really exist, and then push users to purchase services to clean up the non-existent threats.

The Fake AntiVirus will continue to send these annoying and intrusive alerts until a payment is made.

Ensurepass 2018 PDF and VCE

What is the risk of installing Fake AntiVirus?

  1. Victim#39;s Operating System versions, services running and applications installed will be published on Blogs and Forums

  2. Victim#39;s personally identifiable information such as billing address and credit card details, may be extracted and exploited by the attacker

  3. Once infected, the computer will be unable to boot and the Trojan will attempt to format the hard disk

  4. Denial of Service attack will be launched against the infected computer crashing other machines on the connected network

Answer: B

Question No: 48 – (Topic 1)

Stephanie works as senior security analyst for a manufacturing company in Detroit. Stephanie manages network security throughout the organization. Her colleague Jason told her in confidence that he was able to see confidential corporate information posted on the external website http://www.jeansclothesman.com. He tries random URLs on the company#39;s website and finds confidential information leaked over the web. Jason says this happened about a month ago. Stephanie visits the said URLs, but she finds nothing. She is

very concerned about this, since someone should be held accountable if there was sensitive information posted on the website.

Where can Stephanie go to see past versions and pages of a website?

  1. She should go to the web page Samspade.org to see web pages that might no longer be on the website

  2. If Stephanie navigates to Search.com; she will see old versions of the company website

  3. Stephanie can go to Archive.org to see past versions of the company website

  4. AddressPast.com would have any web pages that are no longer hosted on the company#39;s website

Answer: C

Question No: 49 – (Topic 1)

What type of Virus is shown here?

Ensurepass 2018 PDF and VCE

  1. Cavity Virus

  2. Macro Virus

  3. Boot Sector Virus

  4. Metamorphic Virus

  5. Sparse Infector Virus

Answer: E

Question No: 50 – (Topic 1)

In Buffer Overflow exploit, which of the following registers gets overwritten with return address of the exploit code?

  1. EEP

  2. ESP

  3. EAP

  4. EIP

Answer: D

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.