[Free] 2018(Jan) EnsurePass Testking ECCouncil EC0-350 Dumps with VCE and PDF 461-470

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V8

Question No: 461 – (Topic 5)

A Network Administrator was recently promoted to Chief Security Officer at a local university. One of employee#39;s new responsibilities is to manage the implementation of an RFID card access system to a new server room on campus. The server room will house

student enrollment information that is securely backed up to an off-site location.

During a meeting with an outside consultant, the Chief Security Officer explains that he is concerned that the existing security controls have not been designed properly. Currently, the Network Administrator is responsible for approving and issuing RFID card access to the server room, as well as reviewing the electronic access logs on a weekly basis.

Which of the following is an issue with the situation?

  1. Segregation of duties

  2. Undue influence

  3. Lack of experience

  4. Inadequate disaster recovery plan

Answer: A

Question No: 462 – (Topic 5)

What information should an IT system analysis provide to the risk assessor?

  1. Management buy-in

  2. Threat statement

  3. Security architecture

  4. Impact analysis

Answer: C

Question No: 463 – (Topic 5)

From the two screenshots below, which of the following is occurring?

  1. is performing an IP scan against, is performing a port scan against

  2. is performing an IP scan against, is performing a port scan against

  3. is performing an IP scan against, is performing a port scan against

  4. is performing an IP scan against, is performing a port

scan against

Answer: A

Question No: 464 – (Topic 5)

An NMAP scan of a server shows port 25 is open. What risk could this pose?

  1. Open printer sharing

  2. Web portal data leak

  3. Clear text authentication

  4. Active mail relay

Answer: D

Question No: 465 – (Topic 5)

A tester is attempting to capture and analyze the traffic on a given network and realizes that the network has several switches. What could be used to successfully sniff the traffic on this switched network? (Choose three.)

  1. ARP spoofing

  2. MAC duplication

  3. MAC flooding

  4. SYN flood

  5. Reverse smurf attack

  6. ARP broadcasting

Answer: A,B,C

Question No: 466 – (Topic 5)

Which of the following is used to indicate a single-line comment in structured query language (SQL)?

  1. ||

  2. %%

  3. #39;#39;

Answer: A

Question No: 467 – (Topic 5)

An IT security engineer notices that the company’s web server is currently being hacked. What should the engineer do next?

  1. Unplug the network connection on the company’s web server.

  2. Determine the origin of the attack and launch a counterattack.

  3. Record as much information as possible from the attack.

  4. Perform a system restart on the company’s web server.

Answer: C

Question No: 468 – (Topic 5)

Which of the following network attacks takes advantage of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?

  1. Teardrop

  2. SYN flood

  3. Smurf attack

  4. Ping of death

Answer: A

Question No: 469 – (Topic 5)

Which set of access control solutions implements two-factor authentication?

  1. USB token and PIN

  2. Fingerprint scanner and retina scanner

  3. Password and PIN

  4. Account and password

Answer: A

Question No: 470 – (Topic 5)

Pentest results indicate that voice over IP traffic is traversing a network. Which of the following tools will decode a packet capture and extract the voice conversations?

  1. Cain

  2. John the Ripper

  3. Nikto

  4. Hping

Answer: A

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No