[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil EC1-350 Dumps with VCE and PDF 201-210

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC1-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V7

Question No: 201 – (Topic 3)

To see how some of the hosts on your network react, Winston sends out SYN packets to an IP range. A number of IPs respond with a SYN/ACK response. Before the connection is established he sends RST packets to those hosts to stop the session. Winston has done this to see how his intrusion detection system will log the traffic. What type of scan is Winston attempting here?

  1. Winston is attempting to find live hosts on your company#39;s network by using an XMAS scan.

  2. He is utilizing a SYN scan to find live hosts that are listening on your network.

  3. This type of scan he is using is called a NULL scan.

  4. He is using a half-open scan to find live hosts on your network.

Answer: D

Question No: 202 – (Topic 3)

John runs a Web server, IDS and firewall on his network. Recently his Web server has been under constant hacking attacks. He looks up the IDS log files and sees no intrusion attempts but the Web server constantly locks up and needs rebooting due to various brute force and buffer overflow attacks but still the IDS alerts no intrusion whatsoever. John becomes suspicious and views the Firewall logs and he notices huge SSL connections constantly hitting his Web server. Hackers have been using the encrypted HTTPS protocol to send exploits to the Web server and that was the reason the IDS did not detect the intrusions. How would John protect his network from these types of attacks?

  1. Install a proxy server and terminate SSL at the proxy

  2. Enable the IDS to filter encrypted HTTPS traffic

  3. Install a hardware SSL quot;acceleratorquot; and terminate SSL at this layer

  4. Enable the Firewall to filter encrypted HTTPS traffic

Answer: A,C

Question No: 203 – (Topic 3)

Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be monitoring the communication link and could inspect captured traffic. She would like to tunnel the information to the remote end but does not have VPN capabilities to do so. Which of the following tools can she use to protect the link?

  1. MD5

  2. PGP

  3. RSA

  4. SSH

Answer: D

Question No: 204 – (Topic 3)

NTP allows you to set the clocks on your systems very accurately, to within 100ms and sometimes-even 10ms. Knowing the exact time is extremely important for enterprise security. Various security protocols depend on an accurate source of time information in order to prevent quot;playbackquot; attacks. These protocols tag their communications with the current time, to prevent attackers from replaying the same communications, e.g., a login/password interaction or even an entire communication, at a later date. One can circumvent this tagging, if the clock can be set back to the time the communication was recorded. An attacker attempts to try corrupting the clocks on devices on your network. You run Wireshark to detect the NTP traffic to see if there are any irregularities on the network. What port number you should enable in Wireshark display filter to view NTP packets?

  1. TCP Port 124

  2. UDP Port 125

  3. UDP Port 123

  4. TCP Port 126

Answer: C

Question No: 205 – (Topic 3)

Bill is a security analyst for his company. All the switches used in the company#39;s office are Cisco switches. Bill wants to make sure all switches are safe from ARP poisoning. How can Bill accomplish this?

  1. Bill can use the command: ip dhcp snooping.

  2. Bill can use the command: no ip snoop.

  3. Bill could use the command: ip arp no flood.

  4. He could use the command: ip arp no snoop.

Answer: A

Question No: 206 – (Topic 3)

You generate MD5 128-bit hash on all files and folders on your computer to keep a baseline check for security reasons?

Ensurepass 2018 PDF and VCE

What is the length of the MD5 hash?

  1. 32 character

  2. 64 byte

  3. 48 char

  4. 128 kb

Answer: A

Question No: 207 – (Topic 3)

Which type of password cracking technique works like dictionary attack but adds some numbers and symbols to the words from the dictionary and tries to crack the password?

  1. Dictionary attack

  2. Brute forcing attack

  3. Hybrid attack

  4. Syllable attack

  5. Rule-based attack

Answer: C

Question No: 208 – (Topic 3)

What command would you type to OS fingerprint a server using the command line?

Ensurepass 2018 PDF and VCE

Ensurepass 2018 PDF and VCE

  1. Option A

  2. Option B

  3. Option C

  4. Option D

Answer: C

Question No: 209 – (Topic 3)

What do you call a pre-computed hash?

  1. Sun tables

  2. Apple tables

  3. Rainbow tables

  4. Moon tables

Answer: C

Question No: 210 – (Topic 3)

Why attackers use proxy servers?

  1. To ensure the exploits used in the attacks always flip reverse vectors

  2. Faster bandwidth performance and increase in attack speed

  3. Interrupt the remote victim#39;s network traffic and reroute the packets to attackers machine

  4. To hide the source IP address so that an attacker can hack without any legal corollary

Answer: D

100% Ensurepass Free Download!
Download Free Demo:EC1-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC1-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.