[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil EC0-350 Dumps with VCE and PDF 491-500

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V8

Question No: 491 – (Topic 5)

What is the name of the international standard that establishes a baseline level of confidence in the security functionality of IT products by providing a set of requirements for evaluation?

  1. Blue Book

  2. ISO 26029

  3. Common Criteria

  4. The Wassenaar Agreement

Answer: C

Question No: 492 – (Topic 5)

Which of the following is a component of a risk assessment?

  1. Physical security

  2. Administrative safeguards

  3. DMZ

  4. Logical interface

Answer: B

Question No: 493 – (Topic 5)

Which of the following is a strong post designed to stop a car?

  1. Gate

  2. Fence

  3. Bollard

  4. Reinforced rebar

Answer: C

Question No: 494 – (Topic 5)

A pentester gains acess to a Windows application server and needs to determine the settings of the built-in Windows firewall. Which command would be used?

  1. Netsh firewall show config

  2. WMIC firewall show config

  3. Net firewall show config

  4. Ipconfig firewall show config

Answer: A

Question No: 495 – (Topic 5)

What is the main advantage that a network-based IDS/IPS system has over a host-based solution?

  1. They do not use host system resources.

  2. They are placed at the boundary, allowing them to inspect all traffic.

  3. They are easier to install and configure.

  4. They will not interfere with user interfaces.

Answer: A

Question No: 496 – (Topic 5)

A certified ethical hacker (CEH) is approached by a friend who believes her husband is cheating. She offers to pay to break into her husband#39;s email account in order to find proof so she can take him to court. What is the ethical response?

  1. Say no; the friend is not the owner of the account.

  2. Say yes; the friend needs help to gather evidence.

  3. Say yes; do the job for free.

  4. Say no; make sure that the friend knows the risk she’s asking the CEH to take.

Answer: A

Question No: 497 – (Topic 5)

A hacker searches in Google for filetype:pcf to find Cisco VPN config files. Those files may contain connectivity passwords that can be decoded with which of the following?

  1. Cupp

  2. Nessus

  3. Cain and Abel

  4. John The Ripper Pro

Answer: C

Question No: 498 – (Topic 5)

Which of the following tools would be the best choice for achieving compliance with PCI Requirement 11?

  1. Truecrypt

  2. Sub7

  3. Nessus

  4. Clamwin

Answer: C

Question No: 499 – (Topic 5)

Which of the following cryptography attack methods is usually performed without the use of a computer?

  1. Ciphertext-only attack

  2. Chosen key attack

  3. Rubber hose attack

  4. Rainbow table attack

Answer: C

Question No: 500 – (Topic 5)

Which of the following network attacks relies on sending an abnormally large packet size that exceeds TCP/IP specifications?

  1. Ping of death

  2. SYN flooding

  3. TCP hijacking

  4. Smurf attack

Answer: A

Topic 6, Volume F

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.