[Free] 2018(Jan) EnsurePass Testking ECCouncil EC0-350 Dumps with VCE and PDF 381-390

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V8

Question No: 381 – (Topic 4)

How do employers protect assets with security policies pertaining to employee surveillance activities?

  1. Employers promote monitoring activities of employees as long as the employees demonstrate trustworthiness.

  2. Employers use informal verbal communication channels to explain employee monitoring activities to employees.

  3. Employers use network surveillance to monitor employee email traffic, network access, and to record employee keystrokes.

  4. Employers provide employees written statements that clearly discuss the boundaries of monitoring activities and consequences.

Answer: D

Question No: 382 – (Topic 4)

What is the correct PCAP filter to capture all TCP traffic going to or from host on port 25?

A. tcp.src == 25 and ip.host ==

B. host

C. port 25 and host

D. tcp.port == 25 and ip.host ==

Answer: D

Question No: 383 – (Topic 4)

Which of the following processes of PKI (Public Key Infrastructure) ensures that a trust relationship exists and that a certificate is still valid for specific operations?

  1. Certificate issuance

  2. Certificate validation

  3. Certificate cryptography

  4. Certificate revocation

Answer: B

Question No: 384 – (Topic 4)

How does an operating system protect the passwords used for account logins?

  1. The operating system performs a one-way hash of the passwords.

  2. The operating system stores the passwords in a secret file that users cannot find.

  3. The operating system encrypts the passwords, and decrypts them when needed.

  4. The operating system stores all passwords in a protected segment of non-volatile memory.

Answer: A

Question No: 385 – (Topic 4)

An attacker has been successfully modifying the purchase price of items purchased on the company#39;s web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the Intrusion Detection System (IDS) logs and found no attacks that could have caused this. What is the mostly likely way the attacker has been able to modify the purchase price?

  1. By using SQL injection

  2. By changing hidden form values

  3. By using cross site scripting

  4. By utilizing a buffer overflow attack

Answer: B

Question No: 386 – (Topic 4)

Which of the following is an advantage of utilizing security testing methodologies to conduct a security audit?

  1. They provide a repeatable framework.

  2. Anyone can run the command line scripts.

  3. They are available at low cost.

  4. They are subject to government regulation.

Answer: A

Question No: 387 – (Topic 4)

A computer technician is using a new version of a word processing software package when it is discovered that a special sequence of characters causes the entire computer to crash. The technician researches the bug and discovers that no one else experienced the problem. What is the appropriate next step?

  1. Ignore the problem completely and let someone else deal with it.

  2. Create a document that will crash the computer when opened and send it to friends.

  3. Find an underground bulletin board and attempt to sell the bug to the highest bidder.

  4. Notify the vendor of the bug and do not disclose it until the vendor gets a chance to issue a fix.

Answer: D

Question No: 388 – (Topic 4)

Which type of security document is written with specific step-by-step details?

  1. Process

  2. Procedure

  3. Policy

  4. Paradigm

Answer: B

Question No: 389 – (Topic 4)

An attacker has captured a target file that is encrypted with public key cryptography. Which of the attacks below is likely to be used to crack the target file?

  1. Timing attack

  2. Replay attack

  3. Memory trade-off attack

  4. Chosen plain-text attack

Answer: D

Question No: 390 – (Topic 4)

Which type of access control is used on a router or firewall to limit network activity?

  1. Mandatory

  2. Discretionary

  3. Rule-based

  4. Role-based

Answer: C

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No