[Free] 2018(Jan) EnsurePass Testking ECCouncil EC0-350 Dumps with VCE and PDF 191-200
Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/EC0-350.html
Ethical Hacking and Countermeasures V8
Question No: 191 – (Topic 2)
When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the quot;TCP three-way handshake.quot; While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK. How would an attacker exploit this design by launching TCP SYN attack?
-
Attacker generates TCP SYN packets with random destination addresses towards a victim host
-
Attacker floods TCP SYN packets with random source addresses towards a victim host
-
Attacker generates TCP ACK packets with random source addresses towards a victim host
-
Attacker generates TCP RST packets with random source addresses towards a victim host
Answer: B
Question No: 192 – (Topic 2)
In Trojan terminology, what is a covert channel?
-
A channel that transfers information within a computer system or network in a way that
violates the security policy
-
A legitimate communication path within a computer system or network for transfer of data
-
It is a kernel operation that hides boot processes and services to mask detection
-
It is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establish connections
Answer: A
Question No: 193 – (Topic 2)
What type of attack is shown here?
-
Bandwidth exhaust Attack
-
Denial of Service Attack
-
Cluster Service Attack
-
Distributed Denial of Service Attack
Answer: D Explanation:
We think this is a DDoS attack not DoS because the attack is initialed in multiple zombies not single machine.
Question No: 194 – (Topic 2)
In this type of Man-in-the-Middle attack, packets and authentication tokens are captured using a sniffer. Once the relevant information is extracted, the tokens are placed back on the network to gain access.
-
Token Injection Replay attacks
-
Shoulder surfing attack
-
Rainbow and Hash generation attack
-
Dumpster diving attack
Answer: A
Question No: 195 – (Topic 2)
E-mail tracking is a method to monitor and spy the delivered e-mails to the intended recipient.
Select a feature, which you will NOT be able to accomplish with this probe?
-
When the e-mail was received and read
-
Send destructive e-mails
-
GPS location and map of the recipient
-
Time spent on reading the e-mails
-
Whether or not the recipient visited any links sent to them
-
Track PDF and other types of attachments
-
Set messages to expire after specified time
-
Remote control the User#39;s E-mail client application and hijack the traffic
Answer: H
Question No: 196 – (Topic 2)
Identify SQL injection attack from the HTTP requests shown below:
-
http://www.myserver.c0m/search.asp? lname=smith’;update usertable set passwd=’hAx0r’;-