[Free] 2018(Jan) EnsurePass Testking ECCouncil EC0-350 Dumps with VCE and PDF 91-100

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V8

Question No: 91 – (Topic 1)

Peter extracts the SID list from Windows 2008 Server machine using the hacking tool quot;SIDExtracterquot;. Here is the output of the SIDs:

Ensurepass 2018 PDF and VCE

From the above list identify the user account with System Administrator privileges?

  1. John

  2. Rebecca

  3. Sheela

  4. Shawn

  5. Somia

  6. Chang

  7. Micah

Answer: F

Question No: 92 – (Topic 1)

You want to capture Facebook website traffic in Wireshark. What display filter should you use that shows all TCP packets that contain the word #39;facebook#39;?

  1. display==facebook

  2. traffic.content==facebook

  3. tcp contains facebook

  4. list.display.facebook

Answer: C

Question No: 93 – (Topic 1)

The following script shows a simple SQL injection. The script builds an SQL query by concatenating hard-coded strings together with a string entered by the user:

Ensurepass 2018 PDF and VCE

The user is prompted to enter the name of a city on a Web form. If she enters Chicago, the query assembled by the script looks similar to the following:

SELECT * FROM OrdersTable WHERE ShipCity = #39;Chicago#39;

How will you delete the OrdersTable from the database using SQL Injection?

  1. Chicago#39;; drop table OrdersTable –

  2. Delete table#39;blah#39;; OrdersTable –

  3. EXEC; SELECT * OrdersTable gt; DROP –

  4. cmdshell#39;; #39;del c:\sql\mydb\OrdersTable#39; //

Answer: A

Question No: 94 – (Topic 1)

Jason works in the sales and marketing department for a very large advertising agency located in Atlanta. Jason is working on a very important marketing campaign for his company#39;s largest client. Before the project could be completed and implemented, a competing advertising company comes out with the exact same marketing materials and advertising, thus rendering all the work done for Jason#39;s client unusable. Jason is questioned about this and says he has no idea how all the material ended up in the hands of a competitor.

Without any proof, Jason#39;s company cannot do anything except move on. After working on another high profile client for about a month, all the marketing and sales material again ends up in the hands of another competitor and is released to the public before Jason#39;s company can finish the project. Once again, Jason says that he had nothing to do with it and does not know how this could have happened. Jason is given leave with pay until they can figure out what is going on.

Jason#39;s supervisor decides to go through his email and finds a number of emails that were sent to the competitors that ended up with the marketing material. The only items in the emails were attached jpg files, but nothing else. Jason#39;s supervisor opens the picture files, but cannot find anything out of the ordinary with them.

What technique has Jason most likely used?

  1. Stealth Rootkit Technique

  2. ADS Streams Technique

  3. Snow Hiding Technique

  4. Image Steganography Technique

Answer: D

Question No: 95 – (Topic 1)

Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in order to find some information about the target they are attempting to penetrate. How would you call this type of activity?

  1. Dumpster Diving

  2. Scanning

  3. CI Gathering

  4. Garbage Scooping

Answer: A

Question No: 96 – (Topic 1)

What type of session hijacking attack is shown in the exhibit?

Ensurepass 2018 PDF and VCE

  1. Cross-site scripting Attack

  2. SQL Injection Attack

  3. Token sniffing Attack

  4. Session Fixation Attack

Answer: D

Question No: 97 – (Topic 1)

Your computer is infected by E-mail tracking and spying Trojan. This Trojan infects the computer with a single file – emos.sys

Which step would you perform to detect this type of Trojan?

Ensurepass 2018 PDF and VCE

  1. Scan for suspicious startup programs using msconfig

  2. Scan for suspicious network activities using Wireshark

  3. Scan for suspicious device drivers in c:\windows\system32\drivers

  4. Scan for suspicious open ports using netstat

Answer: C

Question No: 98 – (Topic 1)

In TCP communications there are 8 flags; FIN, SYN, RST, PSH, ACK, URG, ECE, CWR. These flags have decimal numbers assigned to them:

FIN = 1

SYN = 2

RST = 4

PSH = 8

ACK = 16

URG = 32

ECE = 64

CWR = 128

Jason is the security administrator of ASPEN Communications. He analyzes some traffic using Wireshark and has enabled the following filters.

Ensurepass 2018 PDF and VCE

What is Jason trying to accomplish here?

  1. SYN, FIN, URG and PSH




Answer: B

Question No: 99 – (Topic 1)

Which Steganography technique uses Whitespace to hide secret messages?

  1. snow

  2. beetle

  3. magnet

  4. cat

Answer: A

Question No: 100 – (Topic 1)

Lori was performing an audit of her company#39;s internal Sharepoint pages when she came across the following codE. What is the purpose of this code?

Ensurepass 2018 PDF and VCE

  1. This JavaScript code will use a Web Bug to send information back to another server.

  2. This code snippet will send a message to a server at whenever the quot;escapequot; key is pressed.

  3. This code will log all keystrokes.

  4. This bit of JavaScript code will place a specific image on every page of the RSS feed.

Answer: C

Topic 2, Volume B

100% Ensurepass Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC0-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No