[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil EC1-350 Dumps with VCE and PDF 261-270

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC1-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V7

Question No: 261 – (Topic 3)

A security engineer is attempting to map a company’s internal network. The engineer enters in the following NMAP commanD.

NMAP -n -sS -P0 -p 80 ***.***.**.** What type of scan is this?

  1. Quick scan

  2. Intense scan

  3. Stealth scan

  4. Comprehensive scan

Answer: C

Question No: 262 – (Topic 3)

Which of the following is a hashing algorithm?

  1. MD5

  2. PGP

  3. DES

  4. ROT13

Answer: A

Question No: 263 – (Topic 3)

Which of the following identifies the three modes in which Snort can be configured to run?

  1. Sniffer, Packet Logger, and Network Intrusion Detection System

  2. Sniffer, Network Intrusion Detection System, and Host Intrusion Detection System

  3. Sniffer, Host Intrusion Prevention System, and Network Intrusion Prevention System

  4. Sniffer, Packet Logger, and Host Intrusion Prevention System

Answer: A

Question No: 264 – (Topic 3)

Which of the following is a common Service Oriented Architecture (SOA) vulnerability?

  1. Cross-site scripting

  2. SQL injection

  3. VPath injection

  4. XML denial of service issues

Answer: D

Question No: 265 – (Topic 3)

A company has five different subnets:,,, and How can NMAP be used to scan these adjacent Class C networks?

A. NMAP -P 192.168.1-5.


C. NMAP -P,2.0,3.0,4.0,5.0

D. NMAP -P 192.168.1/17

Answer: A

Question No: 266 – (Topic 3)

Which vital role does the U.S. Computer Security Incident Response Team (CSIRT) provide?

  1. Incident response services to any user, company, government agency, or organization in partnership with the Department of Homeland Security

  2. Maintenance of the nation’s Internet infrastructure, builds out new Internet infrastructure, and decommissions old Internet infrastructure

  3. Registration of critical penetration testing for the Department of Homeland Security and public and private sectors

  4. Measurement of key vulnerability assessments on behalf of the Department of Defense (DOD) and State Department, as well as private sectors

Answer: A

Question No: 267 – (Topic 3)

When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?

  1. Vulnerability scanning

  2. Social engineering

  3. Application security testing

  4. Network sniffing

Answer: B

Question No: 268 – (Topic 3)

What is the broadcast address for the subnet





Answer: C

Question No: 269 – (Topic 3)

Which of the following are valid types of rootkits? (Choose three.)

  1. Hypervisor level

  2. Network level

  3. Kernel level

  4. Application level

  5. Physical level

  6. Data access level

Answer: A,C,D

Question No: 270 – (Topic 3)

John the Ripper is a technical assessment tool used to test the weakness of which of the following?

  1. Usernames

  2. File permissions

  3. Firewall rulesets

  4. Passwords

Answer: D

100% Ensurepass Free Download!
Download Free Demo:EC1-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC1-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.