[Free] 2018(Jan) EnsurePass Testking ECCouncil EC0-350 Dumps with VCE and PDF 471-480

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/EC0-350.html

Ethical Hacking and Countermeasures V8

Question No: 471 – (Topic 5)

Which of the following examples best represents a logical or technical control?

  1. Security tokens

  2. Heating and air conditioning

  3. Smoke and fire alarms

  4. Corporate security policy

Answer: A

Question No: 472 – (Topic 5)

WPA2 uses AES for wireless data encryption at which of the following encryption levels?

  1. 64 bit and CCMP

  2. 128 bit and CRC

  3. 128 bit and CCMP

  4. 128 bit and TKIP

Answer: C

Question No: 473 – (Topic 5)

While checking the settings on the internet browser, a technician finds that the proxy server settings have been checked and a computer is trying to use itself as a proxy server. What specific octet within the subnet does the technician see?

A. 10.10.10.10

B. 127.0.0.1

C. 192.168.1.1

D. 192.168.168.168

Answer: B

Question No: 474 – (Topic 5)

How can a policy help improve an employee#39;s security awareness?

  1. By implementing written security procedures, enabling employee security training, and promoting the benefits of security

  2. By using informal networks of communication, establishing secret passing procedures, and immediately terminating employees

  3. By sharing security secrets with employees, enabling employees to share secrets, and establishing a consultative help line

  4. By decreasing an employee#39;s vacation time, addressing ad-hoc employment clauses, and ensuring that managers know employee strengths

Answer: A

Question No: 475 – (Topic 5)

Which of the following programming languages is most vulnerable to buffer overflow attacks?

  1. Perl

  2. C

  3. Python

  4. Java

Answer: B

Question No: 476 – (Topic 5)

An NMAP scan of a server shows port 69 is open. What risk could this pose?

  1. Unauthenticated access

  2. Weak SSL version

  3. Cleartext login

  4. Web portal data leak

Answer: A

Question No: 477 – (Topic 5)

Which technical characteristic do Ethereal/Wireshark, TCPDump, and Snort have in common?

  1. They are written in Java.

  2. They send alerts to security monitors.

  3. They use the same packet analysis engine.

  4. They use the same packet capture utility.

Answer: D

Question No: 478 – (Topic 5)

A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?

  1. Paros Proxy

  2. BBProxy

  3. BBCrack

  4. Blooover

Answer: B

Question No: 479 – (Topic 5)

Which United States legislation mandates that the Chief Executive Officer (CEO) and the Chief Financial Officer (CFO) must sign statements verifying the completeness and accuracy of financial reports?

  1. Sarbanes-Oxley Act (SOX)

  2. Gramm-Leach-Bliley Act (GLBA)

  3. Fair and Accurate Credit Transactions Act (FACTA)

  4. Federal Information Security Management Act (FISMA)

Answer: A

Question No: 480 – (Topic 5)

When analyzing the IDS logs, the system administrator notices connections from outside of the LAN have been sending packets where the Source IP address and Destination IP address are the same. There have been no alerts sent via email or logged in the IDS. Which type of an alert is this?

  1. False positive

  2. False negative

  3. True positive

  4. True negative

Answer: B

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No