[Free] 2018(Jan) EnsurePass Testking ECCouncil EC0-350 Dumps with VCE and PDF 361-370

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V8

Question No: 361 – (Topic 4)

A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?

  1. Perform a vulnerability scan of the system.

  2. Determine the impact of enabling the audit feature.

  3. Perform a cost/benefit analysis of the audit feature.

  4. Allocate funds for staffing of audit log review.

Answer: B

Question No: 362 – (Topic 4)

Which results will be returned with the following Google search query? site:target.com -site:Marketing.target.com accounting

  1. Results matching all words in the query

  2. Results matching “accounting” in domain target.com but not on the site Marketing.target.com

  3. Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting

  4. Results for matches on target.com and Marketing.target.com that include the word “accounting”

Answer: B

Question No: 363 – (Topic 4)

Which type of scan is used on the eye to measure the layer of blood vessels?

  1. Facial recognition scan

  2. Retinal scan

  3. Iris scan

  4. Signature kinetics scan

Answer: B

Question No: 364 – (Topic 4)

Employees in a company are no longer able to access Internet web sites on their computers. The network administrator is able to successfully ping IP address of web servers on the Internet and is able to open web sites by using an IP address in place of the URL. The administrator runs the nslookup command for www.eccouncil.org and receives an error message stating there is no response from the server. What should the administrator do next?

  1. Configure the firewall to allow traffic on TCP ports 53 and UDP port 53.

  2. Configure the firewall to allow traffic on TCP ports 80 and UDP port 443.

  3. Configure the firewall to allow traffic on TCP port 53.

  4. Configure the firewall to allow traffic on TCP port 8080.

Answer: A

Question No: 365 – (Topic 4)

Which of the following is a protocol that is prone to a man-in-the-middle (MITM) attack and maps a 32-bit address to a 48-bit address?

  1. ICPM

  2. ARP

  3. RARP

  4. ICMP

Answer: B

Explanation: Address Resolution Protocol (ARP) a stateless protocol was designed to map Internet Protocol addresses (IP) to their associated Media Access Control (MAC) addresses.

This being said, by mapping a 32 bit IP address to an associated 48 bit MAC address via attached Ethernet devices, a communication between local nodes can be made.

Source: (http://www.exploit-db.com/papers/13190/)

Question No: 366 – (Topic 4)

Which of the following is a characteristic of Public Key Infrastructure (PKI)?

  1. Public-key cryptosystems are faster than symmetric-key cryptosystems.

  2. Public-key cryptosystems distribute public-keys within digital signatures.

  3. Public-key cryptosystems do not require a secure key distribution channel.

  4. Public-key cryptosystems do not provide technical non-repudiation via digital signatures.

Answer: B

Question No: 367 – (Topic 4)

What is the outcome of the comm”nc -l -p 2222 | nc 1234quot;?

  1. Netcat will listen on the interface for 1234 seconds on port 2222.

  2. Netcat will listen on port 2222 and output anything received to a remote connection on port 1234.

  3. Netcat will listen for a connection from on port 1234 and output anything received to port 2222.

  4. Netcat will listen on port 2222 and then output anything received to local interface

Answer: B

Question No: 368 – (Topic 4)

Which of the following problems can be solved by using Wireshark?

  1. Tracking version changes of source code

  2. Checking creation dates on all webpages on a server

  3. Resetting the administrator password on multiple systems

  4. Troubleshooting communication resets between two systems

Answer: D

Question No: 369 – (Topic 4)

While conducting a penetration test, the tester determines that there is a firewall between the tester#39;s machine and the target machine. The firewall is only monitoring TCP handshaking of packets at the session layer of the OSI model. Which type of firewall is the tester trying to traverse?

  1. Packet filtering firewall

  2. Application-level firewall

  3. Circuit-level gateway firewall

  4. Stateful multilayer inspection firewall

Answer: C

Question No: 370 – (Topic 4)

Which of the following scanning tools is specifically designed to find potential exploits in Microsoft Windows products?

  1. Microsoft Security Baseline Analyzer

  2. Retina

  3. Core Impact

  4. Microsoft Baseline Security Analyzer

Answer: D

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No