[Free] 2018(Jan) EnsurePass Testking ECCouncil EC0-350 Dumps with VCE and PDF 171-180

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V8

Question No: 171 – (Topic 2)

File extensions provide information regarding the underlying server technology. Attackers can use this information to search vulnerabilities and launch attacks. How would you disable file extensions in Apache servers?

  1. Use disable-eXchange

  2. Use mod_negotiation

  3. Use Stop_Files

  4. Use Lib_exchanges

Answer: B

Question No: 172 – (Topic 2)

In which location, SAM hash passwords are stored in Windows 7?

  1. c:\windows\system32\config\SAM

  2. c:\winnt\system32\machine\SAM

  3. c:\windows\etc\drivers\SAM

  4. c:\windows\config\etc\SAM

Answer: A

Question No: 173 – (Topic 2)

The network administrator at Spears Technology, Inc has configured the default gateway Cisco router#39;s access-list as below:

Ensurepass 2018 PDF and VCE

You are hired to conduct security testing on their network. You successfully brute-force the SNMP community string using a SNMP crack tool. The access-list configured at the router prevents you from establishing a successful connection. You want to retrieve the Cisco configuration from the router. How would you proceed?

  1. Use the Cisco#39;s TFTP default password to connect and download the configuration file

  2. Run a network sniffer and capture the returned traffic with the configuration file from the router

  3. Run Generic Routing Encapsulation (GRE) tunneling protocol from your computer to the router masking your IP address

  4. Send a customized SNMP set request with a spoofed source IP address in the range –

Answer: B,D

Question No: 174 – (Topic 2)

Steve scans the network for SNMP enabled devices. Which port number Steve should scan?

A. 150

B. 161

C. 169

D. 69

Answer: B

Question No: 175 – (Topic 2)

When writing shellcodes, you must avoid because these will end the string.

Ensurepass 2018 PDF and VCE

  1. Root bytes

  2. Null bytes

  3. Char bytes

  4. Unicode bytes

Answer: B

Question No: 176 – (Topic 2)

One of the ways to map a targeted network for live hosts is by sending an ICMP ECHO request to the broadcast or the network address. The request would be broadcasted to all hosts on the targeted network. The live hosts will send an ICMP ECHO Reply to the attacker#39;s source IP address.

You send a ping request to the broadcast address

Ensurepass 2018 PDF and VCE

There are 40 computers up and running on the target network. Only 13 hosts send a reply while others do not. Why?

  1. Windows machines will not generate an answer (ICMP ECHO Reply) to an ICMP ECHO request aimed at the broadcast address or at the network address.

  2. Linux machines will not generate an answer (ICMP ECHO Reply) to an ICMP ECHO request aimed at the broadcast address or at the network address.

  3. You should send a ping request with this command ping ?

  4. You cannot ping a broadcast address. The above scenario is wrong.

Answer: A

Question No: 177 – (Topic 2)

Leesa is the senior security analyst for a publicly traded company. The IT department recently rolled out an intranet for company use only with information ranging from training, to holiday schedules, to human resources data. Leesa wants to make sure the site is not accessible from outside and she also wants to ensure the site is Sarbanes-Oxley (SOX) compliant. Leesa goes to a public library as she wants to do some Google searching to verify whether the company#39;s intranet is accessible from outside and has been indexed by Google. Leesa wants to search for a website title of quot;intranetquot; with part of the URL containing the word quot;intranetquot; and the words quot;human resourcesquot; somewhere in the


What Google search will accomplish this?

  1. related:intranet allinurl:intranet:quot;human resourcesquot;

  2. cache:quot;human resourcesquot; inurl:intranet(SharePoint)

  3. intitle:intranet inurl:intranet intext:quot;human resourcesquot;

  4. site:quot;human resourcesquot; intext:intranet intitle:intranet

Answer: C

Question No: 178 – (Topic 2)

What framework architecture is shown in this exhibit?

Ensurepass 2018 PDF and VCE

  1. Core Impact

  2. Metasploit

  3. Immunity Canvas

  4. Nessus

Answer: B

Question No: 179 – (Topic 2)

Charlie is the network administrator for his company. Charlie just received a new Cisco router and wants to test its capabilities out and to see if it might be susceptible to a DoS attack resulting in its locking up. The IP address of the Cisco switch is What command can Charlie use to attempt this task?

  1. Charlie can use the commanD. ping -l 56550 -t.

  2. Charlie can try using the commanD. ping 56550

  3. By using the command ping Charlie would be able to lockup the router

  4. He could use the commanD. ping -4 56550

Answer: A

Question No: 180 – (Topic 2)

How do you defend against MAC attacks on a switch?

Ensurepass 2018 PDF and VCE

  1. Disable SPAN port on the switch

  2. Enable SNMP Trap on the switch

  3. Configure IP security on the switch

  4. Enable Port Security on the switch

Answer: D

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No