[Free] 2018(Jan) EnsurePass Testking ECCouncil EC0-350 Dumps with VCE and PDF 141-150

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/EC0-350.html

Ethical Hacking and Countermeasures V8

Question No: 141 – (Topic 2)

Within the context of Computer Security, which of the following statements describes Social Engineering best?

  1. Social Engineering is the act of publicly disclosing information

  2. Social Engineering is the means put in place by human resource to perform time accounting

  3. Social Engineering is the act of getting needed information from a person rather than breaking into a system

  4. Social Engineering is a training program within sociology studies

Answer: C

Question No: 142 – (Topic 2)

Study the snort rule given below and interpret the rule.

alert tcp any any -gt; 192.168.1.0/24 111 (content:quot;|00 01 86 a5|quot;; msG. quot;mountd accessquot;;)

  1. An alert is generated when a TCP packet is generated from any IP on the 192.168.1.0 subnet and destined to any IP on port 111

  2. An alert is generated when any packet other than a TCP packet is seen on the network and destined for the 192.168.1.0 subnet

  3. An alert is generated when a TCP packet is originated from port 111 of any IP address to the 192.168.1.0 subnet

  4. An alert is generated when a TCP packet originating from any IP address is seen on the network and destined for any IP address on the 192.168.1.0 subnet on port 111

Answer: D

Question No: 143 – (Topic 2)

ViruXine.W32 virus hides their presence by changing the underlying executable code. This Virus code mutates while keeping the original algorithm intact, the code changes itself each time it runs, but the function of the code (its semantics) will not change at all.

Ensurepass 2018 PDF and VCE

Here is a section of the Virus code:

Ensurepass 2018 PDF and VCE

What is this technique called?

  1. Polymorphic Virus

  2. Metamorphic Virus

  3. Dravidic Virus

  4. Stealth Virus

Answer: A

Question No: 144 – (Topic 2)

You have successfully gained access to a victim#39;s computer using Windows 2003 Server SMB Vulnerability. Which command will you run to disable auditing from the cmd?

  1. stoplog stoplog ?

  2. EnterPol /nolog

  3. EventViewer o service

  4. auditpol.exe /disable

Answer: D

Question No: 145 – (Topic 2)

You want to know whether a packet filter is in front of 192.168.1.10. Pings to 192.168.1.10 don#39;t get answered. A basic nmap scan of 192.168.1.10 seems to hang without returning any information. What should you do next?

  1. Run NULL TCP hping2 against 192.168.1.10

  2. Run nmap XMAS scan against 192.168.1.10

  3. The firewall is blocking all the scans to 192.168.1.10

  4. Use NetScan Tools Pro to conduct the scan

Answer: A

Question No: 146 – (Topic 2)

You are footprinting an organization and gathering competitive intelligence. You visit the

company#39;s website for contact information and telephone numbers but do not find them listed there. You know they had the entire staff directory listed on their website 12 months ago but now it is not there. Is there any way you can retrieve information from a website that is outdated?

  1. Visit Google#39;s search engine and view the cached copy

  2. Crawl the entire website and store them into your computer

  3. Visit Archive.org web site to retrieve the Internet archive of the company#39;s website

  4. Visit the company#39;s partners and customers website for this information

Answer: C Explanation:

The Internet Archive (IA) is a non-profit organization dedicated to maintaining an archive of Web and multimedia resources. Located at the Presidio in San Francisco, California, this archive includes quot;snapshots of the World Wide Webquot; (archived copies of pages, taken at various points in time), software, movies, books, and audio recordings (including recordings of live concerts from bands that allow it). This site is found at www.archive.org.

Question No: 147 – (Topic 2)

In TCP communications there are 8 flags; FIN, SYN, RST, PSH, ACK, URG, ECE, CWR. These flags have decimal numbers assigned to them:

FIN = 1

SYN = 2

RST = 4

PSH = 8

ACK = 16

URG = 32

ECE = 64

CWR =128

Example: To calculate SYN/ACK flag decimal value, add 2 (which is the decimal value of

the SYN flag) to 16 (which is the decimal value of the ACK flag), so the result would be 18. Based on the above calculation, what is the decimal value for XMAS scan?

  1. 23

  2. 24

  3. 41

  4. 64

Answer: C

Question No: 148 – (Topic 2)

Which of the following steganography utilities exploits the nature of white space and allows the user to conceal information in these white spaces?

  1. Image Hide

  2. Snow

  3. Gif-It-Up

  4. NiceText

Answer: B

Question No: 149 – (Topic 2)

John the hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct MiTM attack. What is the destination MAC address of a broadcast frame?

  1. 0xFFFFFFFFFFFF

  2. 0xDDDDDDDDDDDD

  3. 0xAAAAAAAAAAAA

  4. 0xBBBBBBBBBBBB

Answer: A

Question No: 150 – (Topic 2)

Your company has blocked all the ports via external firewall and only allows port 80/443 to connect to the Internet. You want to use FTP to connect to some remote server on the Internet. How would you accomplish this?

  1. Use HTTP Tunneling

  2. Use Proxy Chaining

  3. Use TOR Network

  4. Use Reverse Chaining

Answer: A

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No