[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil EC0-350 Dumps with VCE and PDF 571-580

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V8

Question No: 571 – (Topic 6)

Which of the following ICMP message types are used for destinations unreachables?

  1. 0

  2. 3

  3. 11

  4. 13

  5. 17

Answer: B Explanation:

Type 3 messages are used for unreachable messages. 0 is Echo Reply, 8 is Echo request, 11 is time exceeded, 13 is timestamp and 17 is subnet mask request. Learning these would be advisable for the test.

Question No: 572 – (Topic 6)

Which Windows system tool checks integrity of critical files that has been digitally signed by Microsoft?

  1. signverif.exe

  2. sigverif.exe

  3. msverif.exe

  4. verifier.exe

Answer: B

Question No: 573 – (Topic 6)

When Nmap performs a ping sweep, which of the following sets of requests does it send to the target device?





Answer: B

Explanation: The default behavior of NMAP is to do both an ICMP ping sweep (the usual kind of ping) and a TCP port 80 ACK ping sweep. If an admin is logging these this will be fairly characteristic of NMAP.

Question No: 574 – (Topic 6)

A very useful resource for passively gathering information about a target company is:

  1. Host scanning

  2. Whois search

  3. Traceroute

  4. Ping sweep

Answer: B

Explanation: A, C amp; D are quot;Activequot; scans, the question says: quot;Passivelyquot;

Question No: 575 – (Topic 6)

What is the proper response for a FIN scan if the port is closed?

  1. SYN

  2. ACK

  3. FIN

  4. PSH

  5. RST

Answer: E Explanation:

Closed ports respond to a FIN scan with a RST.

Question No: 576 – (Topic 6)

MX record priority increases as the number increases. (True/False.

  1. True

  2. False

Answer: B

Explanation: The highest priority MX record has the lowest number.

Question No: 577 – (Topic 6)

At a Windows Server command prompt, which command could be used to list the running services?

  1. Sc query type= running

  2. Sc query \\servername

  3. Sc query

  4. Sc config

Answer: C

Question No: 578 – (Topic 6)

You are scanning into the target network for the first time. You find very few conventional ports open. When you attempt to perform traditional service identification by connecting to

the open ports, it yields either unreliable or no results. You are unsure of which protocols are being used. You need to discover as many different protocols as possible.

Which kind of scan would you use to achieve this? (Choose the best answer)

  1. Nessus scan with TCP based pings.

  2. Nmap scan with the -sP (Ping scan) switch.

  3. Netcat scan with the -u -e switches.

  4. Nmap with the -sO (Raw IP packets) switch.

Answer: D

Explanation: Running Nmap with the -sO switch will do a IP Protocol Scan. The IP protocol scan is a bit different than the other nmap scans. The IP protocol scan is searching for additional IP protocols in use by the remote station, such as ICMP, TCP, and UDP. If a router is scanned, additional IP protocols such as EGP or IGP may be identified.

Question No: 579 – (Topic 6)

You are having problems while retrieving results after performing port scanning during internal testing. You verify that there are no security devices between you and the target system. When both stealth and connect scanning do not work, you decide to perform a NULL scan with NMAP. The first few systems scanned shows all ports open.

Which one of the following statements is probably true?

  1. The systems have all ports open.

  2. The systems are running a host based IDS.

  3. The systems are web servers.

  4. The systems are running Windows.

Answer: D

Explanation: The null scan turns off all flags, creating a lack of TCP flags that should never occur in the real world. If the port is closed, a RST frame should be returned and a null scan to an open port results in no response. Unfortunately Microsoft (like usual) decided to completely ignore the standard and do things their own way. Thus this scan type will not work against systems running Windows as they choose not to response at all. This is a good way to distinguish that the system being scanned is running Microsoft Windows.

Question No: 580 – (Topic 6)

What is quot;Hacktivismquot;?

  1. Hacking for a cause

  2. Hacking ruthlessly

  3. An association which groups activists

  4. None of the above

Answer: A

Explanation: The term was coined by author/critic Jason Logan King Sack in an article about media artist Shu Lea Cheang. Acts of hacktivism are carried out in the belief that proper use of code will have leveraged effects similar to regular activism or civil disobedience.

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.