[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil EC1-350 Dumps with VCE and PDF 301-310

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC1-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V7

Question No: 301 – (Topic 4)

Employees in a company are no longer able to access Internet web sites on their computers. The network administrator is able to successfully ping IP address of web servers on the Internet and is able to open web sites by using an IP address in place of the URL. The administrator runs the nslookup command for www.eccouncil.org and receives an error message stating there is no response from the server. What should the administrator do next?

  1. Configure the firewall to allow traffic on TCP ports 53 and UDP port 53.

  2. Configure the firewall to allow traffic on TCP ports 80 and UDP port 443.

  3. Configure the firewall to allow traffic on TCP port 53.

  4. Configure the firewall to allow traffic on TCP port 8080.

Answer: A

Question No: 302 – (Topic 4)

Which initial procedure should an ethical hacker perform after being brought into an organization?

  1. Begin security testing.

  2. Turn over deliverables.

  3. Sign a formal contract with non-disclosure.

  4. Assess what the organization is trying to protect.

Answer: C

Question No: 303 – (Topic 4)

Which of the following guidelines or standards is associated with the credit card industry?

  1. Control Objectives for Information and Related Technology (COBIT)

  2. Sarbanes-Oxley Act (SOX)

  3. Health Insurance Portability and Accountability Act (HIPAA)

  4. Payment Card Industry Data Security Standards (PCI DSS)

Answer: D

Question No: 304 – (Topic 4)

An attacker has captured a target file that is encrypted with public key cryptography. Which of the attacks below is likely to be used to crack the target file?

  1. Timing attack

  2. Replay attack

  3. Memory trade-off attack

  4. Chosen plain-text attack

Answer: D

Question No: 305 – (Topic 4)

Which tool can be used to silently copy files from USB devices?

  1. USB Grabber

  2. USB Dumper

  3. USB Sniffer

  4. USB Snoopy

Answer: B

Question No: 306 – (Topic 4)

How can a rootkit bypass Windows 7 operating system’s kernel mode, code signing policy?

  1. Defeating the scanner from detecting any code change at the kernel

  2. Replacing patch system calls with its own version that hides the rootkit (attacker#39;s) actions

  3. Performing common services for the application process and replacing real applications with fake ones

  4. Attaching itself to the master boot record in a hard drive and changing the machine#39;s boot sequence/options

Answer: D

Question No: 307 – (Topic 4)

A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?

  1. Perform a vulnerability scan of the system.

  2. Determine the impact of enabling the audit feature.

  3. Perform a cost/benefit analysis of the audit feature.

  4. Allocate funds for staffing of audit log review.

Answer: B

Question No: 308 – (Topic 4)

A consultant has been hired by the V.P. of a large financial organization to assess the company#39;s security posture. During the security testing, the consultant comes across child pornography on the V.P.#39;s computer. What is the consultant#39;s obligation to the financial organization?

  1. Say nothing and continue with the security testing.

  2. Stop work immediately and contact the authorities.

  3. Delete the pornography, say nothing, and continue security testing.

  4. Bring the discovery to the financial organization#39;s human resource department.

Answer: B

Question No: 309 – (Topic 4)

How is sniffing broadly categorized?

  1. Active and passive

  2. Broadcast and unicast

  3. Unmanaged and managed

  4. Filtered and unfiltered

Answer: A

Question No: 310 – (Topic 4)

An engineer is learning to write exploits in C and is using the exploit tool Backtrack. The engineer wants to compile the newest C exploit and name it calc.exe. Which command would the engineer use to accomplish this?

  1. g hackersExploit.cpp -o calc.exe

  2. g hackersExploit.py -o calc.exe

  3. g -i hackersExploit.pl -o calc.exe

  4. g -compile -i hackersExploit.cpp -o calc.exe

Answer: A

100% Ensurepass Free Download!
Download Free Demo:EC1-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC1-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.