[Free] 2018(Jan) EnsurePass Testking ECCouncil EC1-350 Dumps with VCE and PDF 271-280

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC1-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V7

Question No: 271 – (Topic 3)

A company has made the decision to host their own email and basic web services. The administrator needs to set up the external firewall to limit what protocols should be allowed to get to the public part of the company#39;s network. Which ports should the administrator open? (Choose three.)

  1. Port 22

  2. Port 23

  3. Port 25

  4. Port 53

  5. Port 80

  6. Port 139

  7. Port 445

Answer: C,D,E

Question No: 272 – (Topic 3)

Which type of scan measures a person#39;s external features through a digital video camera?

  1. Iris scan

  2. Retinal scan

  3. Facial recognition scan

  4. Signature kinetics scan

Answer: C

Question No: 273 – (Topic 3)

In order to show improvement of security over time, what must be developed?

  1. Reports

  2. Testing tools

  3. Metrics

  4. Taxonomy of vulnerabilities

Answer: C

Question No: 274 – (Topic 3)

In the software security development life cyle process, threat modeling occurs in which phase?

  1. Design

  2. Requirements

  3. Verification

  4. Implementation

Answer: A

Question No: 275 – (Topic 3)

Which of the following items of a computer system will an anti-virus program scan for viruses?

  1. Boot Sector

  2. Deleted Files

  3. Windows Process List

  4. Password Protected Files

Answer: A

Question No: 276 – (Topic 3)

Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?

  1. SHA-1

  2. MD5

  3. HAVAL

  4. MD4

Answer: A

Question No: 277 – (Topic 3)

A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.

Which cryptography attack is the student attempting?

  1. Man-in-the-middle attack

  2. Brute-force attack

  3. Dictionary attack

  4. Session hijacking

Answer: C

Question No: 278 – (Topic 3)

A hacker, who posed as a heating and air conditioning specialist, was able to install a sniffer program in a switched environment network. Which attack could the hacker use to sniff all of the packets in the network?

  1. Fraggle

  2. MAC Flood

  3. Smurf

  4. Tear Drop

Answer: B

Question No: 279 – (Topic 3)

Which of the following conditions must be given to allow a tester to exploit a Cross-Site Request Forgery (CSRF) vulnerable web application?

  1. The victim user must open the malicious link with an Internet Explorer prior to version 8.

  2. The session cookies generated by the application do not have the HttpOnly flag set.

  3. The victim user must open the malicious link with a Firefox prior to version 3.

  4. The web application should not use random tokens.

Answer: D

Question No: 280 – (Topic 3)

During a wireless penetration test, a tester detects an access point using WPA2 encryption.

Which of the following attacks should be used to obtain the key?

  1. The tester must capture the WPA2 authentication handshake and then crack it.

  2. The tester must use the tool inSSIDer to crack it using the ESSID of the network.

  3. The tester cannot crack WPA2 because it is in full compliance with the IEEE 802.11i standard.

  4. The tester must change the MAC address of the wireless network card and then use the AirTraf tool to obtain the key.

Answer: A

100% Ensurepass Free Download!
Download Free Demo:EC1-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC1-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No