[Free] 2018(Jan) EnsurePass Testking ECCouncil EC0-350 Dumps with VCE and PDF 431-440

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V8

Question No: 431 – (Topic 5)

Which of the following does proper basic configuration of snort as a network intrusion detection system require?

  1. Limit the packets captured to the snort configuration file.

  2. Capture every packet on the network segment.

  3. Limit the packets captured to a single segment.

  4. Limit the packets captured to the /var/log/snort directory.

Answer: A

Question No: 432 – (Topic 5)

A penetration tester is hired to do a risk assessment of a company#39;s DMZ. The rules of engagement states that the penetration test be done from an external IP address with no prior knowledge of the internal IT systems. What kind of test is being performed?

  1. white box

  2. grey box

  3. red box

  4. black box

Answer: D

Question No: 433 – (Topic 5)

What are the three types of compliance that the Open Source Security Testing Methodology Manual (OSSTMM) recognizes?

  1. Legal, performance, audit

  2. Audit, standards based, regulatory

  3. Contractual, regulatory, industry

  4. Legislative, contractual, standards based

Answer: D

Question No: 434 – (Topic 5)

Fingerprinting VPN firewalls is possible with which of the following tools?

  1. Angry IP

  2. Nikto

  3. Ike-scan

  4. Arp-scan

Answer: C

Question No: 435 – (Topic 5)

Which statement is TRUE regarding network firewalls preventing Web Application attacks?

  1. Network firewalls can prevent attacks because they can detect malicious HTTP traffic.

  2. Network firewalls cannot prevent attacks because ports 80 and 443 must be opened.

  3. Network firewalls can prevent attacks if they are properly configured.

  4. Network firewalls cannot prevent attacks because they are too complex to configure.

Answer: B

Question No: 436 – (Topic 5)

What is one thing a tester can do to ensure that the software is trusted and is not changing or tampering with critical data on the back end of a system it is loaded on?

  1. Proper testing

  2. Secure coding principles

  3. Systems security and architecture review

  4. Analysis of interrupts within the software

Answer: D

Question No: 437 – (Topic 5)

While performing data validation of web content, a security technician is required to restrict malicious input. Which of the following processes is an efficient way of restricting malicious input?

  1. Validate web content input for query strings.

  2. Validate web content input with scanning tools.

  3. Validate web content input for type, length, and range.

  4. Validate web content input for extraneous queries.

Answer: C

Question No: 438 – (Topic 5)

An organization hires a tester to do a wireless penetration test. Previous reports indicate that the last test did not contain management or control packets in the submitted

traces. Which of the following is the most likely reason for lack of management or control packets?

  1. The wireless card was not turned on.

  2. The wrong network card drivers were in use by Wireshark.

  3. On Linux and Mac OS X, only 802.11 headers are received in promiscuous mode.

  4. Certain operating systems and adapters do not collect the management or control packets.

Answer: D

Question No: 439 – (Topic 5)

Which cipher encrypts the plain text digit (bit or byte) one by one?

  1. Classical cipher

  2. Block cipher

  3. Modern cipher

  4. Stream cipher

Answer: D

Question No: 440 – (Topic 5)

An attacker uses a communication channel within an operating system that is neither designed nor intended to transfer information. What is the name of the communications channel?

  1. Classified

  2. Overt

  3. Encrypted

  4. Covert

Answer: D

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No