L'importance de la position de Certificat EC-COUNCIL EC0-350 dans l'industrie IT est bien claire pour tout le monde, mais c'est pas facile à obtenir ce Certificat. Il y a beaucoup de Q&As qui manquent une haute précision des réponses. Cependant, Pass4Test peut offrir des matériaux pratiques pour toutes les personnes à participer l'examen de Certification, et il peut aussi offrir à tout moment toutes les informations que vous auriez besoin à réussir l'examen EC-COUNCIL EC0-350 par votre première fois.
Le programme de formation EC-COUNCIL ECSS offert par Pass4Test comprend les exercices et les test simulation. Vous voyez aussi les autres sites d'offrir l'outil de formation, mais c'est pas difficile à découvrir une grand écart de la qualité entre Pass4Test et les autres fournisseurs. Celui de Pass4Test est plus complet et convenable pour la préparation dans une courte terme.
Pour l'instant, vous pouvez télécharger le démo gratuit de Q&A EC-COUNCIL EC0-350 dans Pass4Test pour se former avant le test EC-COUNCIL EC0-350.
Code d'Examen: EC0-350
Nom d'Examen: EC-COUNCIL (Ethical hacking and countermeasures)
Questions et réponses: 878 Q&As
Code d'Examen: ECSS
Nom d'Examen: EC-COUNCIL (EC-Council Certified Security Specialist Practice Test)
Questions et réponses: 337 Q&As
L'équipe de Pass4Test rehcerche la Q&A de test certification EC-COUNCIL EC0-350 en visant le test EC-COUNCIL EC0-350. Cet outil de formation peut vous aider à se préparer bien dans une courte terme. Vous vous renforcerez les connaissances de base et même prendrez tous essences de test Certification. Pass4Test vous assure à réussir le test EC-COUNCIL EC0-350 sans aucune doute.
Certification EC-COUNCIL ECSS est un des tests plus importants dans le système de Certification EC-COUNCIL. Les experts de Pass4Test profitent leurs expériences et connaissances professionnelles à rechercher les guides d'étude à aider les candidats du test EC-COUNCIL ECSS à réussir le test. Les Q&As offertes par Pass4Test vous assurent 100% à passer le test. D'ailleurs, la mise à jour pendant un an est gratuite.
Choisir le produit fait avec tous efforts des experts de Pass4Test vous permet à réussir 100% le test Certification IT. Le produit de Pass4Test est bien certifié par les spécialistes dans l'Industrie IT. La haute qualité du produit Pass4Test ne vous demande que 20 heures pour préparer, et vous allez réussir le test EC-COUNCIL ECSS à la première fois. Vous ne refuserez jamais pour le choix de Pass4Test, parce qu'il symbole le succès.
EC0-350 Démo gratuit à télécharger: http://www.pass4test.fr/EC0-350.html
NO.1 Which of the following built-in C/C++ functions you should avoid to prevent your program from
buffer overflow attacks?
A.strcpy()
B.strcat()
C.streadd()
D.strsock()
Correct:A B C
certification EC-COUNCIL EC0-350 certification EC0-350
NO.2 Mark works as a contractor for the Department of Defense and is in charge of network security.
He has spent the last month securing access to his network from all possible entry points. He has
segmented his network into several subnets and has installed firewalls all over the network. He
has placed very stringent rules on all the firewalls, blocking everything in and out except ports
that must be used. He does need to have port 80 open since his company hosts a website that
must be accessed from the Internet. Mark is fairly confident of his perimeter defenses, but is still
worried about programs like Hping2 that can get into a network through covert channels. How
should mark protect his network from an attacker using Hping2 to scan his internal network?
A.Block ICMP type 13 messages
B.Block all incoming traffic on port 53
C.Block all outgoing traffic on port 53
D.Use stateful inspection on the firewalls
Correct:A
certification EC-COUNCIL EC0-350 certification EC0-350
NO.3 A program that defends against a port scanner will attempt to:
A.Sends back bogus data to the port scanner
B.Log a violation and recommend use of security-auditing tools
C.Limit access by the scanning system to publicly available ports only
D.Update a firewall rule in real time to prevent the port scan from being completed
Correct:D
certification EC-COUNCIL EC0-350 certification EC0-350
NO.4 After a client sends a connection request (SYN) packet to the server, the server will respond
(SYN-ACK) with a sequence number of its choosing, which then must be acknowledged (ACK) by
the client. This sequence number is predictable; the attack connects to a service first with its own
IP address, records the sequence number chosen, and then opens a second connection from a
forged IP address. The attack doesn't see the SYN-ACK (or any other packet) from the server, but
can guess the correct responses. If the source IP address is used for authentication, then the
attacker can use the one-sided communication to break into the server. What attacks can you
successfully launch against a server using the above technique?
A.Session Hijacking attacks
B.Denial of Service attacks
C.Web page defacement attacks
D.IP spoofing attacks
Correct:A
certification EC-COUNCIL EC0-350 certification EC0-350
NO.5 Samantha has been actively scanning the client network for which she is doing a vulnerability
assessment test. While doing a port scan she notices ports open in the 135 to 139 range. What
protocol is most likely to be listening on those ports?
A.FTP
B.SMB
C.Finger
D.Samba
Correct:B
certification EC-COUNCIL EC0-350 certification EC0-350
NO.6 Travis works primarily from home as a medical transcriptionist. He just bought a brand new
Dual Core Pentium computer with over 3 GB of RAM. He uses voice recognition software to help
him transfer what he dictates to electronic documents. The voice recognition software is
processor intensive, which is why he bought the new computer. Travis frequently has to get on
the Internet to do research on what he is working on. After about two months of working on his
new computer, he notices that it is not running nearly as fast as it used to. Travis uses antivirus
software, anti-spyware software, and always keeps the computer up-to-date with Microsoft
patches. After another month of working on the computer, Travis' computer is even more
noticeably slow. Every once in awhile, Travis also notices a window or two pop-up on his screen,
but they quickly disappear.He has seen these windows show up, even when he has not been on
the Internet. Travis is really worried about his computer because he spent a lot of money on it, and
he depends on it to work. Travis scans his computer with all kinds of software, and cannot find
anything out of the ordinary. Travis decides to go through Windows Explorer and check out the
file system, folder by folder, to see if there is anything he can find. He spends over four hours
pouring over the files and folders and cannot find anything.But, before he gives up, he notices
that his computer only has about 10 GB of free space available.Since his hard drive is a 200 GB
hard drive, Travis thinks this is very odd. Travis downloads Space Monger and adds up the sizes
for all the folders and files on his computer. According to his calculations, he should have around
150 GB of free space. What is mostly likely the cause of Travis' problems?
A.Travis's computer is infected with stealth kernel level rootkit
B.Travis's computer is infected with Stealth Trojan Virus
C.Travis's computer is infected with Self-Replication Worm that fills the hard disk space
D.Logic Bomb is triggered at random times creating hidden data consuming junk files
Correct:A
certification EC-COUNCIL EC0-350 certification EC0-350
NO.7 Which programming language is NOT vulnerable to buffer overflow attacks?
A.Java
B.ActiveX
C.C++
D.Assembly Language
Correct:A
certification EC-COUNCIL EC0-350 certification EC0-350
NO.8 Samuel is the network administrator of DataX Communications, Inc. He is trying to configure his
firewall to block password brute force attempts on his network. He enables blocking the intruder's
IP address for a period of 24 hours time after more than three unsuccessful attempts. He is
confident that this rule will secure his network from hackers on the Internet. But he still receives
hundreds of thousands brute-force attempts generated from various IP addresses around the
world. After some investigation he realizes that the intruders are using a proxy somewhere else
on the Internet which has been scripted to enable the random usage of various proxies on each
request so as not to get caught by the firewall rule. Later he adds another rule to his firewall and
enables small sleep on the password attempt so that if the password is incorrect, it would take 45
seconds to return to the user to begin another attempt. Since an intruder may use multiple
machines to brute force the password, he also throttles the number of connections that will be
prepared to accept from a particular IP address. This action will slow the intruder's attempts.
Samuel wants to completely block hackers brute force attempts on his network. What are the
alternatives to defending against possible brute-force password attacks on his site?
A.Enforce a password policy and use account lockouts after three wrong logon attempts even though this
might lock out legit users
B.Enable the IDS to monitor the intrusion attempts and alert you by e-mail about the IP address of the
intruder so that you can block them at the Firewall manually
C.Enforce complex password policy on your network so that passwords are more difficult to brute force
D.You cannot completely block the intruders attempt if they constantly switch proxies
Correct:D
certification EC-COUNCIL EC0-350 certification EC0-350
没有评论:
发表评论