Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
EC1-350 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Dumpsleader ECCouncil EC1-350 Dumps with VCE and PDF 171-180

September 23, 2017

EnsurePass
2017 Sep ECCouncil Official New Released EC1-350
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/EC1-350.html

Ethical Hacking and Countermeasures V7

Question No: 171 – (Topic 2)

Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches. If these switches#39; ARP cache is successfully flooded, what will be the result?

  1. The switches will drop into hub mode if the ARP cache is successfully flooded.

  2. If the ARP cache is flooded, the switches will drop into pix mode making it less susceptible to attacks.

  3. Depending on the switch manufacturer, the device will either delete every entry in its ARP cache or reroute packets to the nearest switch.

  4. The switches will route all traffic to the broadcast address created collisions.

Answer: A

Question No: 172 – (Topic 2)

You are programming a buffer overflow exploit and you want to create a NOP sled of 200 bytes in the program exploit.c

Ensurepass 2017 PDF and VCE

What is the hexadecimal value of NOP instruction?

  1. 0x60

  2. 0x80

  3. 0x70

  4. 0x90

Answer: D

Question No: 173 – (Topic 2)

This TCP flag instructs the sending system to transmit all buffered data immediately.

  1. SYN

  2. RST

  3. PSH

  4. URG

  5. FIN

Answer: C

Question No: 174 – (Topic 2)

The network administrator at Spears Technology, Inc has configured the default gateway Cisco router#39;s access-list as below:

Ensurepass 2017 PDF and VCE

You are hired to conduct security testing on their network. You successfully brute-force the SNMP community string using a SNMP crack tool. The access-list configured at the router prevents you from establishing a successful connection. You want to retrieve the Cisco configuration from the router. How would you proceed?

  1. Use the Cisco#39;s TFTP default password to connect and download the configuration file

  2. Run a network sniffer and capture the returned traffic with the configuration file from the router

  3. Run Generic Routing Encapsulation (GRE) tunneling protocol from your computer to the router masking your IP address

  4. Send a customized SNMP set request with a spoofed source IP address in the range – 192.168.1.0

Answer: B,D

Question No: 175 – (Topic 2)

You work for Acme Corporation as Sales Manager. The company has tight network security restrictions. You are trying to steal data from the company#39;s Sales database (Sales.xls) and transfer them to your home computer. Your company filters and monitors traffic that leaves from the internal network to the Internet. How will you achieve this without raising suspicion?

  1. Encrypt the Sales.xls using PGP and e-mail it to your personal gmail account

  2. Package the Sales.xls using Trojan wrappers and telnet them back your home computer

  3. You can conceal the Sales.xls database in another file like photo.jpg or other files and send it out in an innocent looking email or file transfer using Steganography techniques

  4. Change the extension of Sales.xls to sales.txt and upload them as attachment to your hotmail account

Answer: C

Question No: 176 – (Topic 2)

Study the snort rule given below and interpret the rule.

alert tcp any any -gt; 192.168.1.0/24 111 (content:quot;|00 01 86 a5|quot;; msG. quot;mountd accessquot;;)

  1. An alert is generated when a TCP packet is generated from any IP on the 192.168.1.0 subnet and destined to any IP on port 111

  2. An alert is generated when any packet other than a TCP packet is seen on the network and destined for the 192.168.1.0 subnet

  3. An alert is generated when a TCP packet is originated from port 111 of any IP address to the 192.168.1.0 subnet

  4. An alert is generated when a TCP packet originating from any IP address is seen on the

network and destined for any IP address on the 192.168.1.0 subnet on port 111

Answer: D

Question No: 177 – (Topic 2)

What port number is used by LDAP protocol?

A. 110

B. 389

C. 464

D. 445

Answer: B

Question No: 178 – (Topic 2)

Fred is the network administrator for his company. Fred is testing an internal switch. From an external IP address, Fred wants to try and trick this switch into thinking it already has established a session with his computer. How can Fred accomplish this?

  1. Fred can accomplish this by sending an IP packet with the RST/SIN bit and the source address of his computer.

  2. He can send an IP packet with the SYN bit and the source address of his computer.

  3. Fred can send an IP packet with the ACK bit set to zero and the source address of the switch.

  4. Fred can send an IP packet to the switch with the ACK bit and the source address of his machine.

Answer: D

Question No: 179 – (Topic 2)

Within the context of Computer Security, which of the following statements describes Social Engineering best?

  1. Social Engineering is the act of publicly disclosing information

  2. Social Engineering is the means put in place by human resource to perform time accounting

  3. Social Engineering is the act of getting needed information from a person rather than breaking into a system

  4. Social Engineering is a training program within sociology studies

Answer: C

Question No: 180 – (Topic 2)

In Trojan terminology, what is a covert channel?

Ensurepass 2017 PDF and VCE

  1. A channel that transfers information within a computer system or network in a way that violates the security policy

  2. A legitimate communication path within a computer system or network for transfer of data

  3. It is a kernel operation that hides boot processes and services to mask detection

  4. It is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establish connections

Answer: A

100% Free Download!
Download Free Demo:EC1-350 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass EC1-350 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE