[Free] 2018(Jan) EnsurePass Pass4sure ECCouncil EC1-350 Dumps with VCE and PDF 151-160

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC1-350
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/EC1-350.html

Ethical Hacking and Countermeasures V7

Question No: 151 – (Topic 2)

Attackers send an ACK probe packet with random sequence number, no response means port is filtered (Stateful firewall is present) and RST response means the port is not filtered. What type of Port Scanning is this?

  1. RST flag scanning

  2. FIN flag scanning

  3. SYN flag scanning

  4. ACK flag scanning

Answer: D

Question No: 152 – (Topic 2)

What is the command used to create a binary log file using tcpdump?

  1. tcpdump -w ./log

  2. tcpdump -r log

  3. tcpdump -vde logtcpdump -vde ? log

  4. tcpdump -l /var/log/

Answer: A

Question No: 153 – (Topic 2)

Which port, when configured on a switch receives a copy of every packet that passes through it?

Ensurepass 2018 PDF and VCE

  1. R-DUPE Port

  2. MIRROR port

  3. SPAN port

  4. PORTMON

Answer: C

Question No: 154 – (Topic 2)

What is the IV key size used in WPA2?

  1. 32

  2. 24

  3. 16

  4. 48

E. 128

Answer: B Explanation:

A 256-bit WEP system is available from some vendors.

As with the other WEP-variants 24 bits of that is for IV, leaving 232 bits for actual protection.

These 232 bits are typically entered as 58 hexadecimal charcters ((58 x 4 bits) 232 bits) 24 IV bits =256-bit WEP key.

Question No: 155 – (Topic 2)

What type of session hijacking attack is shown in the exhibit?

Ensurepass 2018 PDF and VCE

  1. Session Sniffing Attack

  2. Cross-site scripting Attack

  3. SQL Injection Attack

  4. Token sniffing Attack

Answer: A

Question No: 156 – (Topic 2)

What is the default Password Hash Algorithm used by NTLMv2?

  1. MD4

  2. DES

  3. SHA-1

  4. MD5

Answer: D

Question No: 157 – (Topic 2)

Gerald, the Systems Administrator for Hyped Enterprises, has just discovered that his network has been breached by an outside attacker. After performing routine maintenance on his servers, he discovers numerous remote tools were installed that no one claims to have knowledge of in his department. Gerald logs onto the management console for his IDS and discovers an unknown IP address that scanned his network constantly for a week

and was able to access his network through a high-level port that was not closed. Gerald traces the IP address he found in the IDS log to a proxy server in Brazil. Gerald calls the company that owns the proxy server and after searching through their logs, they trace the source to another proxy server in Switzerland. Gerald calls the company in Switzerland that owns the proxy server and after scanning through the logs again, they trace the source back to a proxy server in China. What proxy tool has Gerald#39;s attacker used to cover their tracks?

  1. ISA proxy

  2. IAS proxy

  3. TOR proxy

  4. Cheops proxy

Answer: C

Question No: 158 – (Topic 2)

Frederickson Security Consultants is currently conducting a security audit on the networks of Hawthorn Enterprises, a contractor for the Department of Defense. Since Hawthorn Enterprises conducts business daily with the federal government, they must abide by very stringent security policies. Frederickson is testing all of Hawthorn#39;s physical and logical security measures including biometrics, passwords, and permissions. The federal government requires that all users must utilize random, non-dictionary passwords that must take at least 30 days to crack. Frederickson has confirmed that all Hawthorn employees use a random password generator for their network passwords. The Frederickson consultants have saved off numerous SAM files from Hawthorn#39;s servers using Pwdump6 and are going to try and crack the network passwords. What method of attack is best suited to crack these passwords in the shortest amount of time?

  1. Brute force attack

  2. Birthday attack

  3. Dictionary attack

  4. Brute service attack

Answer: A

Question No: 159 – (Topic 2)

You want to know whether a packet filter is in front of 192.168.1.10. Pings to 192.168.1.10 don#39;t get answered. A basic nmap scan of 192.168.1.10 seems to hang without returning

any information. What should you do next?

  1. Run NULL TCP hping2 against 192.168.1.10

  2. Run nmap XMAS scan against 192.168.1.10

  3. The firewall is blocking all the scans to 192.168.1.10

  4. Use NetScan Tools Pro to conduct the scan

Answer: A

Question No: 160 – (Topic 2)

An Attacker creates a zuckerjournals.com website by copying and mirroring HACKERJOURNALS.COM site to spread the news that Hollywood actor Jason Jenkins died in a car accident. The attacker then submits his fake site for indexing in major search engines. When users search for quot;Jason Jenkinsquot;, attacker#39;s fake site shows up and dupes victims by the fake news.

Ensurepass 2018 PDF and VCE

This is another great example that some people do not know what URL#39;s are. Real website:

Fake website: http://www.zuckerjournals.com

Ensurepass 2018 PDF and VCE

The website is clearly not WWW.HACKERJOURNALS.COM. It is obvious for many, but unfortunately some people still do not know what an URL is. It#39;s the address that you enter into the address bar at the top your browser and this is clearly not legit site, its www.zuckerjournals.com

How would you verify if a website is authentic or not?

  1. Visit the site using secure HTTPS protocol and check the SSL certificate for authenticity

  2. Navigate to the site by visiting various blogs and forums for authentic links

  3. Enable Cache on your browser and lookout for error message warning on the screen

  4. Visit the site by clicking on a link from Google search engine

Answer: D

100% Ensurepass Free Download!
Download Free Demo:EC1-350 Demo PDF
100% Ensurepass Free Guaranteed!
EC1-350 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No