Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
EC0-350 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Dumpsleader ECCouncil EC0-350 Dumps with VCE and PDF 81-90

September 23, 2017

EnsurePass
2017 Sep ECCouncil Official New Released EC0-350
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/EC0-350.html

Ethical Hacking and Countermeasures V8

Question No: 81 – (Topic 1)

In what stage of Virus life does a stealth virus gets activated with the user performing certain actions such as running an infected program?

  1. Design

  2. Elimination

  3. Incorporation

  4. Replication

  5. Launch

  6. Detection

Answer: E

Question No: 82 – (Topic 1)

You receive an e-mail with the following text message.

quot;Microsoft and HP today warned all customers that a new, highly dangerous virus has been discovered which will erase all your files at midnight. If there#39;s a file called hidserv.exe on your computer, you have been infected and your computer is now running a hidden server that allows hackers to access your computer. Delete the file immediately. Please also pass this message to all your friends and colleagues as soon as possible.quot;

You launch your antivirus software and scan the suspicious looking file hidserv.exe located in c:\windows directory and the AV comes out clean meaning the file is not infected. You view the file signature and confirm that it is a legitimate Windows system file quot;Human Interface Device Servicequot;.

What category of virus is this?

  1. Virus hoax

  2. Spooky Virus

  3. Stealth Virus

  4. Polymorphic Virus

Answer: A

Question No: 83 – (Topic 1)

XSS attacks occur on Web pages that do not perform appropriate bounds checking on data entered by users. Characters like lt; gt; that mark the beginning/end of a tag should be converted into HTML entities.

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

What is the correct code when converted to html entities?

Ensurepass 2017 PDF and VCE

  1. Option A

  2. Option B

  3. Option C

  4. Option D

Answer: D

Question No: 84 – (Topic 1)

Google uses a unique cookie for each browser used by an individual user on a computer. This cookie contains information that allows Google to identify records about that user on its database. This cookie is submitted every time a user launches a Google search, visits a site using AdSense etc. The information stored in Google#39;s database, identified by the cookie, includes

->Everything you search for using Google

->Every web page you visit that has Google Adsense ads

How would you prevent Google from storing your search keywords?

  1. Block Google Cookie by applying Privacy and Security settings in your web browser

  2. Disable the Google cookie using Google Advanced Search settings on Google Search page

  3. Do not use Google but use another search engine Bing which will not collect and store your search keywords

  4. Use MAC OS X instead of Windows 7. Mac OS has higher level of privacy controls by default.

Answer: A

Question No: 85 – (Topic 1)

Attacking well-known system defaults is one of the most common hacker attacks. Most software is shipped with a default configuration that makes it easy to install and setup the application. You should change the default settings to secure the system.

Which of the following is NOT an example of default installation?

  1. Many systems come with default user accounts with well-known passwords that administrators forget to change

  2. Often, the default location of installation files can be exploited which allows a hacker to retrieve a file from the system

  3. Many software packages come with quot;samplesquot; that can be exploited, such as the sample programs on IIS web services

  4. Enabling firewall and anti-virus software on the local system

Answer: D

Question No: 86 – (Topic 1)

Which of the following tool would be considered as Signature Integrity Verifier (SIV)?

  1. Nmap

  2. SNORT

  3. VirusSCAN

  4. Tripwire

Answer: D

Question No: 87 – (Topic 1)

Choose one of the following pseudo codes to describe this statement:

quot;If we have written 200 characters to the buffer variable, the stack should stop because it cannot hold any more data.quot;

  1. If (I gt; 200) then exit (1)

  2. If (I lt; 200) then exit (1)

  3. If (I lt;= 200) then exit (1)

  4. If (I gt;= 200) then exit (1)

Answer: D

Question No: 88 – (Topic 1)

What type of attack is shown in the following diagram?

Ensurepass 2017 PDF and VCE

  1. Man-in-the-Middle (MiTM) Attack

  2. Session Hijacking Attack

  3. SSL Spoofing Attack

  4. Identity Stealing Attack

Answer: A

Question No: 89 – (Topic 1)

This tool is widely used for ARP Poisoning attack. Name the tool.

Ensurepass 2017 PDF and VCE

  1. Cain and Able

  2. Beat Infector

  3. Poison Ivy

  4. Webarp Infector

Answer: A

Question No: 90 – (Topic 1)

You are the Security Administrator of Xtrinity, Inc. You write security policies and conduct assessments to protect the company#39;s network. During one of your periodic checks to see how well policy is being observed by the employees, you discover an employee has attached cell phone 3G modem to his telephone line and workstation. He has used this cell phone 3G modem to dial in to his workstation, thereby bypassing your firewall. A security breach has occurred as a direct result of this activity. The employee explains that he used the modem because he had to download software for a department project. How would you resolve this situation?

  1. Reconfigure the firewall

  2. Enforce the corporate security policy

  3. Install a network-based IDS

  4. Conduct a needs analysis

Answer: B

100% Free Download!
Download Free Demo:EC0-350 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass EC0-350 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE