Latest Certified Success Dumps Download

EC0-350 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Dumpsleader ECCouncil EC0-350 Dumps with VCE and PDF 551-560

September 23, 2017

2017 Sep ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures V8

Question No: 551 – (Topic 6)

Who is an Ethical Hacker?

  1. A person who hacks for ethical reasons

  2. A person who hacks for an ethical cause

  3. A person who hacks for defensive purposes

  4. A person who hacks for offensive purposes

Answer: C

Explanation: The Ethical hacker is a security professional who applies his hacking skills for defensive purposes.

Question No: 552 – (Topic 6)

What port scanning method is the most reliable but also the most detectable?

  1. Null Scanning

  2. Connect Scanning

  3. ICMP Scanning

  4. Idlescan Scanning

  5. Half Scanning

  6. Verbose Scanning

Answer: B

Explanation: A TCP Connect scan, named after the Unix connect() system call is the most accurate scanning method. If a port is open the operating system completes the TCP three- way handshake, and the port scanner immediately closes the connection.

Question No: 553 – (Topic 6)

An nmap command that includes the host specification of 202.176.56-57.* will scan

number of hosts.

A. 2 B. 256 C. 512

D. Over 10, 000

Answer: C

Explanation: The hosts with IP address amp; will be scanned (256 256=512)

Question No: 554 – (Topic 6)

Your XYZ trainee Sandra asks you which are the four existing Regional Internet Registry (RIR#39;s)?





Answer: B Explanation:

All other answers include non existing organizations (PICNIC, NANIC, LATNIC). See

Question No: 555 – (Topic 6)

What does a type 3 code 13 represent?(Choose two.

  1. Echo request

  2. Destination unreachable

  3. Network unreachable

  4. Administratively prohibited

  5. Port unreachable

  6. Time exceeded

Answer: B,D Explanation:

Type 3 code 13 is destination unreachable administratively prohibited. This type of message is typically returned from a device blocking a port.

Question No: 556 – (Topic 6)

Use the traceroute results shown above to answer the following question:

Ensurepass 2017 PDF and VCE

The perimeter security at does not permit ICMP TTL-expired packets out.

  1. True

  2. False

Answer: A

Explanation: As seen in the exhibit there is 2 registrations with timeout, this tells us that the firewall filters packets where the TTL has reached 0, when you continue with higher starting values for TTL you will get an answer from the target of the traceroute.

Question No: 557 – (Topic 6)

What two things will happen if a router receives an ICMP packet, which has a TTL value of 1, and the destination host is several hops away? (Select 2 answers)

  1. The router will discard the packet

  2. The router will decrement the TTL value and forward the packet to the next router on the path to the destination host

  3. The router will send a time exceeded message to the source host

  4. The router will increment the TTL value and forward the packet to the next router on the path to the destination host.

  5. The router will send an ICMP Redirect Message to the source host

Answer: A,C

Question No: 558 – (Topic 6)

A specific site received 91 ICMP_ECHO packets within 90 minutes from 47 different sites. 77 of the ICMP_ECHO packets had an ICMP ID:39612 and Seq:57072. 13 of the ICMP_ECHO packets had an ICMP ID:0 and Seq:0. What can you infer from this information?

  1. The packets were sent by a worm spoofing the IP addresses of 47 infected sites

  2. ICMP ID and Seq numbers were most likely set by a tool and not by the operating system

  3. All 77 packets came from the same LAN segment and hence had the same ICMP ID and Seq number

  4. 13 packets were from an external network and probably behind a NAT, as they had an ICMP ID 0 and Seq 0

Answer: B

Question No: 559 – (Topic 6)

What are the two basic types of attacks? (Choose two.

  1. DoS

  2. Passive

  3. Sniffing

  4. Active

  5. Cracking

Answer: B,D

Explanation: Passive and active attacks are the two basic types of attacks.

Question No: 560 – (Topic 6)

What flags are set in a X-MAS scan?(Choose all that apply.

  1. SYN

  2. ACK

  3. FIN

  4. PSH

  5. RST

  6. URG

Answer: C,D,F Explanation:

FIN, URG, and PSH are set high in the TCP packet for a X-MAS scan

100% Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass EC0-350 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE