[Free] 2018(Jan) EnsurePass Testking ECCouncil EC1-350 Dumps with VCE and PDF 291-300

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC1-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V7

Question No: 291 – (Topic 3)

Which of the following describes a component of Public Key Infrastructure (PKI) where a copy of a private key is stored to provide third-party access and to facilitate recovery operations?

  1. Key registry

  2. Recovery agent

  3. Directory

  4. Key escrow

Answer: D

Question No: 292 – (Topic 3)

Which tool would be used to collect wireless packet data?

  1. NetStumbler

  2. John the Ripper

  3. Nessus

  4. Netcat

Answer: A

Question No: 293 – (Topic 3)

Which of the following processes evaluates the adherence of an organization to its stated security policy?

  1. Vulnerability assessment

  2. Penetration testing

  3. Risk assessment

  4. Security auditing

Answer: D

Question No: 294 – (Topic 3)

Which of the following statements are true regarding N-tier architecture? (Choose two.)

  1. Each layer must be able to exist on a physically independent system.

  2. The N-tier architecture must have at least one logical layer.

  3. Each layer should exchange information only with the layers above and below it.

  4. When a layer is changed or updated, the other layers must also be recompiled or modified.

Answer: A,C

Question No: 295 – (Topic 3)

Some passwords are stored using specialized encryption algorithms known as hashes. Why is this an appropriate method?

  1. It is impossible to crack hashed user passwords unless the key used to encrypt them is obtained.

  2. If a user forgets the password, it can be easily retrieved using the hash key stored by administrators.

  3. Hashing is faster compared to more traditional encryption algorithms.

  4. Passwords stored using hashes are non-reversible, making finding the password much more difficult.

Answer: D

Question No: 296 – (Topic 3)

What is the main disadvantage of the scripting languages as opposed to compiled programming languages?

  1. Scripting languages are hard to learn.

  2. Scripting languages are not object-oriented.

  3. Scripting languages cannot be used to create graphical user interfaces.

  4. Scripting languages are slower because they require an interpreter to run the code.

Answer: D

Question No: 297 – (Topic 3)

Which of the following are password cracking tools? (Choose three.)

  1. BTCrack

  2. John the Ripper

  3. KerbCrack

  4. Nikto

  5. Cain and Abel

  6. Havij

Answer: B,C,E

Question No: 298 – (Topic 3)

Which of the following techniques can be used to mitigate the risk of an on-site attacker from connecting to an unused network port and gaining full access to the network? (Choose three.)

  1. Port Security

  2. IPSec Encryption

  3. Network Admission Control (NAC)

  4. 802.1q Port Based Authentication

  5. 802.1x Port Based Authentication

  6. Intrusion Detection System (IDS)

Answer: A,C,E

Question No: 299 – (Topic 3)

When does the Payment Card Industry Data Security Standard (PCI-DSS) require organizations to perform external and internal penetration testing?

  1. At least once a year and after any significant upgrade or modification

  2. At least once every three years or after any significant upgrade or modification

  3. At least twice a year or after any significant upgrade or modification

  4. At least once every two years and after any significant upgrade or modification

Answer: A

Question No: 300 – (Topic 3)

Which type of antenna is used in wireless communication?

  1. Omnidirectional

  2. Parabolic

  3. Uni-directional

  4. Bi-directional

Answer: A

Topic 4, Volume D

100% Ensurepass Free Download!
Download Free Demo:EC1-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC1-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No