[Free] 2018(Jan) EnsurePass Testking ECCouncil EC0-350 Dumps with VCE and PDF 371-380

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V8

Question No: 371 – (Topic 4)

Which command lets a tester enumerate alive systems in a class C network via ICMP using native Windows tools?

A. ping 192.168.2.

B. ping

C. for %V in (1 1 255) do PING 192.168.2.%V

D. for /L %V in (1 1 254) do PING -n 1 192.168.2.%V | FIND /I quot;Replyquot;

Answer: D

Question No: 372 – (Topic 4)

A security consultant decides to use multiple layers of anti-virus defense, such as end user desktop anti-virus and E-mail gateway. This approach can be used to mitigate which kind of attack?

  1. Forensic attack

  2. ARP spoofing attack

  3. Social engineering attack

  4. Scanning attack

Answer: C

Question No: 373 – (Topic 4)

Which types of detection methods are employed by Network Intrusion Detection Systems (NIDS)? (Choose two.)

  1. Signature

  2. Anomaly

  3. Passive

  4. Reactive

Answer: A,B

Question No: 374 – (Topic 4)

Data hiding analysis can be useful in

  1. determining the level of encryption used to encrypt the data.

  2. detecting and recovering data that may indicate knowledge, ownership or intent.

  3. identifying the amount of central processing unit (cpu) usage over time to process the data.

  4. preventing a denial of service attack on a set of enterprise servers to prevent users from accessing the data.

Answer: B

Question No: 375 – (Topic 4)

If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?

  1. Hping

  2. Traceroute

  3. TCP ping

  4. Broadcast ping

Answer: A

Question No: 376 – (Topic 4)

Which NMAP command combination would let a tester scan every TCP port from a class C network that is blocking ICMP with fingerprinting and service detection?

A. NMAP -PN -A -O -sS

B. NMAP -P0 -A -O -p1-65535 192.168.0/24 C. NMAP -P0 -A -sT -p0-65535 192.168.0/16 D. NMAP -PN -O -sS -p 1-1024 192.168.0/8

Answer: B

Question No: 377 – (Topic 4)

Which element of Public Key Infrastructure (PKI) verifies the applicant?

  1. Certificate authority

  2. Validation authority

  3. Registration authority

  4. Verification authority

Answer: C

Question No: 378 – (Topic 4)

Which of the following is an example of two factor authentication?

  1. PIN Number and Birth Date

  2. Username and Password

  3. Digital Certificate and Hardware Token

  4. Fingerprint and Smartcard ID

Answer: D

Question No: 379 – (Topic 4)

Which tool can be used to silently copy files from USB devices?

  1. USB Grabber

  2. USB Dumper

  3. USB Sniffer

  4. USB Snoopy

Answer: B

Question No: 380 – (Topic 4)

Bluetooth uses which digital modulation technique to exchange information between paired devices?

  1. PSK (phase-shift keying)

  2. FSK (frequency-shift keying)

  3. ASK (amplitude-shift keying)

  4. QAM (quadrature amplitude modulation)

Answer: A

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No