Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
EC0-350 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Dumpsleader ECCouncil EC0-350 Dumps with VCE and PDF 511-520

September 23, 2017

EnsurePass
2017 Sep ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/EC0-350.html

Ethical Hacking and Countermeasures V8

Question No: 511 – (Topic 6)

Which of the following Nmap commands would be used to perform a stack fingerprinting?

  1. Nmap -O -p80 lt;host(s.gt;

  2. Nmap -hU -Qlt;host(s.gt;

  3. Nmap -sT -p lt;host(s.gt;

  4. Nmap -u -o -w2 lt;hostgt;

  5. Nmap -sS -0p target

Answer: A

Explanation: This option activates remote host identification via TCP/IP fingerprinting. In other words, it uses a bunch of techniques to detect subtlety in the underlying operating system network stack of the computers you are scanning. It uses this information to create a quot;fingerprintquot; which it compares with its database of known OS fingerprints (the nmap-os- fingerprints file. to decide what type of system you are scanning.

Question No: 512 – (Topic 6)

While attempting to discover the remote operating system on the target computer, you receive the following results from an nmap scan:

Ensurepass 2017 PDF and VCE

Remote operating system guess: Too many signatures match to reliably guess the OS. Nmap run completed – 1 IP address (1 host up) scanned in 277.483 seconds

What should be your next step to identify the OS?

  1. Perform a firewalk with that system as the target IP

  2. Perform a tcp traceroute to the system using port 53

  3. Run an nmap scan with the -v-v option to give a better output

  4. Connect to the active services and review the banner information

Answer: D Explanation:

Most people don’t care about changing the banners presented by applications listening to open ports and therefore you should get fairly accurate information when grabbing banners from open ports with, for example, a telnet application.

Question No: 513 – (Topic 6)

What is the proper response for a NULL scan if the port is closed?

  1. SYN

  2. ACK

  3. FIN

  4. PSH

  5. RST

  6. No response

Answer: E

Explanation: Closed ports respond to a NULL scan with a reset.

Question No: 514 – (Topic 6)

What are two types of ICMP code used when using the ping command?

  1. It uses types 0 and 8.

  2. It uses types 13 and 14.

  3. It uses types 15 and 17.

  4. The ping command does not use ICMP but uses UDP.

Answer: A

Explanation: ICMP Type 0 = Echo Reply, ICMP Type 8 = Echo

Question No: 515 – (Topic 6)

User which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?

  1. 18 U.S.C 1029 Possession of Access Devices

  2. 18 U.S.C 1030 Fraud and related activity in connection with computers

  3. 18 U.S.C 1343 Fraud by wire, radio or television

  4. 18 U.S.C 1361 Injury to Government Property

  5. 18 U.S.C 1362 Government communication systems

  6. 18 U.S.C 1831 Economic Espionage Act

  7. 18 U.S.C 1832 Trade Secrets Act

Answer: B

Explanation: http://www.law.cornell.edu/uscode/html/uscode18/usc_sec_18_00001030– 000-.html

Question No: 516 – (Topic 6)

Because UDP is a connectionless protocol: (Select 2)

  1. UDP recvfrom() and write() scanning will yield reliable results

  2. It can only be used for Connect scans

  3. It can only be used for SYN scans

  4. There is no guarantee that the UDP packets will arrive at their destination

  5. ICMP port unreachable messages may not be returned successfully

Answer: D,E Explanation:

Neither UDP packets, nor the ICMP errors are guaranteed to arrive, so UDP scanners must also implement retransmission of packets that appear to be lost (or you will get a bunch of false positives).

Question No: 517 – (Topic 6)

What ICMP message types are used by the ping command?

  1. Timestamp request (13) and timestamp reply (14)

  2. Echo request (8) and Echo reply (0)

  3. Echo request (0) and Echo reply (1)

  4. Ping request (1) and Ping reply (2)

Answer: B

Explanation: ICMP Type 0 = Echo Reply, ICMP Type 8 = Echo

Question No: 518 – (Topic 6)

You are conducting a port scan on a subnet that has ICMP blocked. You have discovered 23 live systems and after scanning each of them you notice that they all show port 21 in closed state.

What should be the next logical step that should be performed?

  1. Connect to open ports to discover applications.

  2. Perform a ping sweep to identify any additional systems that might be up.

  3. Perform a SYN scan on port 21 to identify any additional systems that might be up.

  4. Rescan every computer to verify the results.

Answer: C

Explanation: As ICMP is blocked you’ll have trouble determining which computers are up and running by using a ping sweep. As all the 23 computers that you had discovered earlier

had port 21 closed, probably any additional, previously unknown, systems will also have port 21 closed. By running a SYN scan on port 21 over the target network you might get replies from additional systems.

Question No: 519 – (Topic 6)

Exhibit

Ensurepass 2017 PDF and VCE

Joe Hacker runs the hping2 hacking tool to predict the target host’s sequence numbers in one of the hacking session.

What does the first and second column mean? Select two.

  1. The first column reports the sequence number

  2. The second column reports the difference between the current and last sequence number

  3. The second column reports the next sequence number

  4. The first column reports the difference between current and last sequence number

Answer: A,B

Question No: 520 – (Topic 6)

A person approaches a network administrator and wants advice on how to send encrypted email from home. The end user does not want to have to pay for any license fees or manage server services. Which of the following is the most secure encryption protocol that the network administrator should recommend?

  1. IP Security (IPSEC)

  2. Multipurpose Internet Mail Extensions (MIME)

  3. Pretty Good Privacy (PGP)

  4. Hyper Text Transfer Protocol with Secure Socket Layer (HTTPS)

    Answer: C

    100% Free Download!
    Download Free Demo:EC0-350 Demo PDF
    100% Pass Guaranteed!
    Download 2017 EnsurePass EC0-350 Full Exam PDF and VCE

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

    2017 EnsurePass IT Certification PDF and VCE