[Free] 2018(Jan) EnsurePass Testking ECCouncil EC0-350 Dumps with VCE and PDF 251-260

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V8

Question No: 251 – (Topic 3)

Blane is a security analyst for a law firm. One of the lawyers needs to send out an email to a client but he wants to know if the email is forwarded on to any other recipients. The client is explicitly asked not to re-send the email since that would be a violation of the lawyer#39;s and client#39;s agreement for this particular case. What can Blane use to accomplish this?

  1. He can use a split-DNS service to ensure the email is not forwarded on.

  2. A service such as HTTrack would accomplish this.

  3. Blane could use MetaGoofil tracking tool.

  4. Blane can use a service such as ReadNotify tracking tool.

Answer: D

Question No: 252 – (Topic 3)

Which of the following is a common Service Oriented Architecture (SOA) vulnerability?

  1. Cross-site scripting

  2. SQL injection

  3. VPath injection

  4. XML denial of service issues

Answer: D

Question No: 253 – (Topic 3)

Which of the following Registry location does a Trojan add entries to make it persistent on Windows 7? (Select 2 answers)

Ensurepass 2018 PDF and VCE

  1. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

  2. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\System32\CurrentVersion\ Run

  3. HKEY_CURRENT_USER\Software\Microsoft\Windows\System32\CurrentVersion\Run

  4. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

Answer: A,D

Question No: 254 – (Topic 3)

Which of the following techniques can be used to mitigate the risk of an on-site attacker from connecting to an unused network port and gaining full access to the network? (Choose three.)

  1. Port Security

  2. IPSec Encryption

  3. Network Admission Control (NAC)

  4. 802.1q Port Based Authentication

  5. 802.1x Port Based Authentication

  6. Intrusion Detection System (IDS)

Answer: A,C,E

Question No: 255 – (Topic 3)

A covert channel is a channel that

  1. transfers information over, within a computer system, or network that is outside of the security policy.

  2. transfers information over, within a computer system, or network that is within the security policy.

  3. transfers information via a communication path within a computer system, or network for transfer of data.

  4. transfers information over, within a computer system, or network that is encrypted.

Answer: A

Question No: 256 – (Topic 3)

A majority of attacks come from insiders, people who have direct access to a company#39;s computer system as part of their job function or a business relationship. Who is considered an insider?

  1. A competitor to the company because they can directly benefit from the publicity generated by making such an attack

  2. Disgruntled employee, customers, suppliers, vendors, business partners, contractors, temps, and consultants

  3. The CEO of the company because he has access to all of the computer systems

  4. A government agency since they know the company#39;s computer system strengths and weaknesses

Answer: B

Question No: 257 – (Topic 3)

Blake is in charge of securing all 20 of his company#39;s servers. He has enabled hardware and software firewalls, hardened the operating systems, and disabled all unnecessary services on all the servers. Unfortunately, there is proprietary AS400 emulation software that must run on one of the servers that requires the telnet service to function properly. Blake is especially concerned about this since telnet can be a very large security risk in an organization. Blake is concerned about how this particular server might look to an outside attacker so he decides to perform some footprinting, scanning, and penetration tests on the server. Blake telnets into the server using Port 80 and types in the following command:


After pressing enter twice, Blake gets the following results: What has Blake just accomplished?

Ensurepass 2018 PDF and VCE

  1. Downloaded a file to his local computer

  2. Submitted a remote command to crash the server

  3. Poisoned the local DNS cache of the server

  4. Grabbed the Operating System banner

Answer: D

Question No: 258 – (Topic 3)

What is the broadcast address for the subnet





Answer: C

Question No: 259 – (Topic 3)

A company has five different subnets:,,, and How can NMAP be used to scan these adjacent Class C networks?

A. NMAP -P 192.168.1-5.


C. NMAP -P, 2.0, 3.0, 4.0, 5.0

D. NMAP -P 192.168.1/17

Answer: A

Question No: 260 – (Topic 3)

Wayne is the senior security analyst for his company. Wayne is examining some traffic logs on a server and came across some inconsistencies. Wayne finds some IP packets from a computer purporting to be on the internal network. The packets originate from with a TTL of 15. The server replied to this computer and received a response from with a TTL of 21. What can Wayne infer from this traffic log?

  1. The initial traffic from was being spoofed.

  2. The traffic from is from a Linux computer.

  3. The TTL of 21 means that the client computer is on wireless.

  4. The client computer at is a zombie computer.

Answer: A

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No