Latest Certified Success Dumps Download

EC0-350 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Dumpsleader ECCouncil EC0-350 Dumps with VCE and PDF 361-370

September 23, 2017

2017 Sep ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V8

Question No: 361 – (Topic 4)

A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?

  1. Perform a vulnerability scan of the system.

  2. Determine the impact of enabling the audit feature.

  3. Perform a cost/benefit analysis of the audit feature.

  4. Allocate funds for staffing of audit log review.

Answer: B

Question No: 362 – (Topic 4)

Which results will be returned with the following Google search query? accounting

  1. Results matching all words in the query

  2. Results matching “accounting” in domain but not on the site

  3. Results from matches on the site that are in the domain but do not include the word accounting

  4. Results for matches on and that include the word “accounting”

Answer: B

Question No: 363 – (Topic 4)

Which type of scan is used on the eye to measure the layer of blood vessels?

  1. Facial recognition scan

  2. Retinal scan

  3. Iris scan

  4. Signature kinetics scan

Answer: B

Question No: 364 – (Topic 4)

Employees in a company are no longer able to access Internet web sites on their computers. The network administrator is able to successfully ping IP address of web servers on the Internet and is able to open web sites by using an IP address in place of the URL. The administrator runs the nslookup command for and receives an error message stating there is no response from the server. What should the administrator do next?

  1. Configure the firewall to allow traffic on TCP ports 53 and UDP port 53.

  2. Configure the firewall to allow traffic on TCP ports 80 and UDP port 443.

  3. Configure the firewall to allow traffic on TCP port 53.

  4. Configure the firewall to allow traffic on TCP port 8080.

Answer: A

Question No: 365 – (Topic 4)

Which of the following is a protocol that is prone to a man-in-the-middle (MITM) attack and maps a 32-bit address to a 48-bit address?

  1. ICPM

  2. ARP

  3. RARP

  4. ICMP

Answer: B

Explanation: Address Resolution Protocol (ARP) a stateless protocol was designed to map Internet Protocol addresses (IP) to their associated Media Access Control (MAC) addresses.

This being said, by mapping a 32 bit IP address to an associated 48 bit MAC address via attached Ethernet devices, a communication between local nodes can be made.

Source: (

Question No: 366 – (Topic 4)

Which of the following is a characteristic of Public Key Infrastructure (PKI)?

  1. Public-key cryptosystems are faster than symmetric-key cryptosystems.

  2. Public-key cryptosystems distribute public-keys within digital signatures.

  3. Public-key cryptosystems do not require a secure key distribution channel.

  4. Public-key cryptosystems do not provide technical non-repudiation via digital signatures.

Answer: B

Question No: 367 – (Topic 4)

What is the outcome of the comm”nc -l -p 2222 | nc 1234quot;?

  1. Netcat will listen on the interface for 1234 seconds on port 2222.

  2. Netcat will listen on port 2222 and output anything received to a remote connection on port 1234.

  3. Netcat will listen for a connection from on port 1234 and output anything received to port 2222.

  4. Netcat will listen on port 2222 and then output anything received to local interface

Answer: B

Question No: 368 – (Topic 4)

Which of the following problems can be solved by using Wireshark?

  1. Tracking version changes of source code

  2. Checking creation dates on all webpages on a server

  3. Resetting the administrator password on multiple systems

  4. Troubleshooting communication resets between two systems

Answer: D

Question No: 369 – (Topic 4)

While conducting a penetration test, the tester determines that there is a firewall between the tester#39;s machine and the target machine. The firewall is only monitoring TCP handshaking of packets at the session layer of the OSI model. Which type of firewall is the tester trying to traverse?

  1. Packet filtering firewall

  2. Application-level firewall

  3. Circuit-level gateway firewall

  4. Stateful multilayer inspection firewall

Answer: C

Question No: 370 – (Topic 4)

Which of the following scanning tools is specifically designed to find potential exploits in Microsoft Windows products?

  1. Microsoft Security Baseline Analyzer

  2. Retina

  3. Core Impact

  4. Microsoft Baseline Security Analyzer

Answer: D

100% Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass EC0-350 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE