Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
EC0-350 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Dumpsleader ECCouncil EC0-350 Dumps with VCE and PDF 21-30

September 23, 2017

EnsurePass
2017 Sep ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/EC0-350.html

Ethical Hacking and Countermeasures V8

Question No: 21 – (Topic 1)

TCP/IP Session Hijacking is carried out in which OSI layer?

  1. Datalink layer

  2. Transport layer

  3. Network layer

  4. Physical layer

Answer: B

Question No: 22 – (Topic 1)

BankerFox is a Trojan that is designed to steal users#39; banking data related to certain banking entities.

When they access any website of the affected banks through the vulnerable Firefox 3.5 browser, the Trojan is activated and logs the information entered by the user. All the information entered in that website will be logged by the Trojan and transmitted to the attacker#39;s machine using covert channel.

BankerFox does not spread automatically using its own means. It needs an attacking user#39;s intervention in order to reach the affected computer.

Ensurepass 2017 PDF and VCE

What is the most efficient way an attacker located in remote location to infect this banking Trojan on a victim#39;s machine?

  1. Physical access – the attacker can simply copy a Trojan horse to a victim#39;s hard disk infecting the machine via Firefox add-on extensions

  2. Custom packaging – the attacker can create a custom Trojan horse that mimics the appearance of a program that is unique to that particular computer

  3. Custom packaging – the attacker can create a custom Trojan horse that mimics the appearance of a program that is unique to that particular computer

  4. Custom packaging – the attacker can create a custom Trojan horse that mimics the appearance of a program that is unique to that particular computer

  5. Downloading software from a website? An attacker can offer free software, such as shareware programs and pirated mp3 files

Answer: E

Question No: 23 – (Topic 1)

What type of port scan is shown below?

Ensurepass 2017 PDF and VCE

  1. Idle Scan

  2. FIN Scan

  3. XMAS Scan

  4. Windows Scan

Answer: B

Question No: 24 – (Topic 1)

SNMP is a connectionless protocol that uses UDP instead of TCP packets (True or False)

  1. true

  2. false

Answer: A

Question No: 25 – (Topic 1)

Attackers footprint target Websites using Google Hacking techniques. Google hacking is a term that refers to the art of creating complex search engine queries. It detects websites that are vulnerable to numerous exploits and vulnerabilities. Google operators are used to locate specific strings of text within the search results.

The configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database. WordPress uses config.php that stores the database Username and Password.

Which of the below Google search string brings up sites with quot;config.phpquot; files?

Ensurepass 2017 PDF and VCE

  1. Search:index config/php

  2. WordPress:index config.php

  3. intitle:index.of config.php

  4. Config.php:index list

Answer: C

Question No: 26 – (Topic 1)

Which of the following statement correctly defines ICMP Flood Attack? (Select 2 answers)

Ensurepass 2017 PDF and VCE

  1. Bogus ECHO reply packets are flooded on the network spoofing the IP and MAC address

  2. The ICMP packets signal the victim system to reply and the combination of traffic saturates the bandwidth of the victim#39;s network

  3. ECHO packets are flooded on the network saturating the bandwidth of the subnet causing denial of service

  4. A DDoS ICMP flood attack occurs when the zombies send large volumes of ICMP_ECHO_REPLY packets to the victim system.

Answer: B,D

Question No: 27 – (Topic 1)

In which part of OSI layer, ARP Poisoning occurs?

Ensurepass 2017 PDF and VCE

  1. Transport Layer

  2. Datalink Layer

  3. Physical Layer

  4. Application layer

Answer: B

Question No: 28 – (Topic 1)

Web servers often contain directories that do not need to be indexed. You create a text file with search engine indexing restrictions and place it on the root directory of the Web Server.

User-agent: * Disallow: /images/ Disallow: /banners/ Disallow: /Forms/

Disallow: /Dictionary/ Disallow: /_borders/ Disallow: /_fpclass/ Disallow: /_overlay/ Disallow: /_private/ Disallow: /_themes/

What is the name of this file?

  1. robots.txt

  2. search.txt

  3. blocklist.txt

  4. spf.txt

Answer: A

Question No: 29 – (Topic 1)

You run nmap port Scan on 10.0.0.5 and attempt to gain banner/server information from services running on ports 21, 110 and 123.

Here is the output of your scan results:

Ensurepass 2017 PDF and VCE

Which of the following nmap command did you run?

A. nmap -A -sV -p21, 110, 123 10.0.0.5

B. nmap -F -sV -p21, 110, 123 10.0.0.5

C. nmap -O -sV -p21, 110, 123 10.0.0.5

D. nmap -T -sV -p21, 110, 123 10.0.0.5

Answer: C

Question No: 30 – (Topic 1)

Which type of hacker represents the highest risk to your network?

  1. black hat hackers

  2. grey hat hackers

  3. disgruntled employees

  4. script kiddies

Answer: C

100% Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass EC0-350 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE