显示标签为“EC-COUNCIL”的博文。显示所有博文
显示标签为“EC-COUNCIL”的博文。显示所有博文

2014年2月17日星期一

EC0-350 latest EC-COUNCIL certification exam questions and answers published

If you use the ITCertKing EC-COUNCIL EC0-350 study materials, you can reduce the time and economic costs of the exam. It can help you to pass the exam successfully. Before you decide to buy our EC-COUNCIL EC0-350 exam materials, you can download our free test questions, including the PDF version and the software version. If you need software versions please do not hesitate to obtain a copy from our customer service staff.

If you want to through the EC-COUNCIL EC0-350 certification exam to make a stronger position in today's competitive IT industry, then you need the strong expertise knowledge and the accumulated efforts. And pass the EC-COUNCIL EC0-350 exam is not easy. Perhaps through EC-COUNCIL EC0-350 exam you can promote yourself to the IT industry. But it is not necessary to spend a lot of time and effort to learn the expertise. You can choose ITCertKing's EC-COUNCIL EC0-350 exam training materials. This is training product that specifically made for IT exam. With it you can pass the difficult EC-COUNCIL EC0-350 exam effortlessly.

Choosing to participate in EC-COUNCIL certification EC0-350 exam is a wise choice, because if you have a EC-COUNCIL EC0-350 authentication certificate, your salary and job position will be improved quickly and then your living standard will provide at the same time. But passing EC-COUNCIL certification EC0-350 exam is not very easy, it need to spend a lot of time and energy to master relevant IT professional knowledge. ITCertKing is a professional IT training website to make the training scheme for EC-COUNCIL certification EC0-350 exam. At first you can free download part of exercises questions and answers about EC-COUNCIL certification EC0-350 exam on www.ITCertKing.com as a try, so that you can check the reliability of our product. Generally, if you have tried ITCertKing's products, you'll very confident of our products.

In order to pass the EC-COUNCIL EC0-350 exam, selecting the appropriate training tools is very necessary. And the study materials of EC-COUNCIL EC0-350 exam is a very important part. ITCertKing can provide valid materials to pass the EC-COUNCIL EC0-350 exam. The IT experts in ITCertKing are all have strength aned experience. Their research materials are very similar with the real exam questions . ITCertKing is a site that provide the exam materials to the people who want to take the exam. and we can help the candidates to pass the exam effectively.

The training tools of ITCertKing contains exam experience and materials which are come up with by our IT team of experts. Also we provide exam practice questions and answers about the EC-COUNCIL EC0-350 exam certification. Our ITCertKing's high degree of credibility in the IT industry can provide 100% protection to you. In order to let you choose to buy our products more peace of mind, you can try to free download part of the exam practice questions and answers about EC-COUNCIL certification EC0-350 exam online.

Exam Code: EC0-350
Exam Name: EC-COUNCIL (Ethical hacking and countermeasures)
One year free update, No help, Full refund!
Total Q&A: 878 Questions and Answers
Last Update: 2014-02-17

EC0-350 is an EC-COUNCIL certification exam, so EC0-350 is the first step to set foot on the road of EC-COUNCIL certification. EC0-350 certification exam become more and more fiery and more and more people participate in EC0-350 exam, but passing rate of EC0-350 certification exam is not very high.When you select EC0-350 exam, do you want to choose an exam training courses?

EC0-350 Free Demo Download: http://www.itcertking.com/EC0-350_exam.html

NO.1 What type of port scan is shown below? Scan directed at open port: ClientServer
192.5.2.92:4079 ---------FIN--------->192.5.2.110:23 192.5.2.92:4079 <----NO
RESPONSE------192.5.2.110:23 Scan directed at closed port: ClientServer 192.5.2.92:4079
---------FIN--------->192.5.2.110:23 192.5.2.92:4079<-----RST/ACK----------192.5.2.110:23
A.Idle Scan
B.FIN Scan
C.XMAS Scan
D.Windows Scan
Correct:B

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.2 Clive is conducting a pen-test and has just port scanned a system on the network. He has
identified the operating system as Linux and been able to elicit responses from ports 23, 25 and
53. He infers port 23 as running Telnet service, port 25 as running SMTP service and port 53 as
running DNS service. The client confirms these findings and attests to the current availability of
the services. When he tries to telnet to port 23 or 25, he gets a blank screen in response. On
typing other commands, he sees only blank spaces or underscores symbols on the screen. What
are you most likely to infer from this?
A.The services are protected by TCP wrappers
B.There is a honeypot running on the scanned machine
C.An attacker has replaced the services with trojaned ones
D.This indicates that the telnet and SMTP server have crashed
Correct:A

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.3 What file system vulnerability does the following command take advantage of? type
c:\anyfile.exe > c:\winnt\system32\calc.exe:anyfile.exe
A.HFS
B.ADS
C.NTFS
D.Backdoor access
Correct:B

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.4 Why is Social Engineering considered attractive by hackers and commonly done by experts in
the field?
A.It is not considered illegal
B.It is done by well-known hackers
C.It is easy and extremely effective to gain information
D.It does not require a computer in order to commit a crime
Correct:C

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.5 Which of the following built-in C/C++ functions you should avoid to prevent your program from
buffer overflow attacks?
A.strcpy()
B.strcat()
C.streadd()
D.strsock()
Correct:A B C

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.6 Mark works as a contractor for the Department of Defense and is in charge of network security.
He has spent the last month securing access to his network from all possible entry points. He has
segmented his network into several subnets and has installed firewalls all over the network. He
has placed very stringent rules on all the firewalls, blocking everything in and out except ports
that must be used. He does need to have port 80 open since his company hosts a website that
must be accessed from the Internet. Mark is fairly confident of his perimeter defenses, but is still
worried about programs like Hping2 that can get into a network through covert channels. How
should mark protect his network from an attacker using Hping2 to scan his internal network?
A.Block ICMP type 13 messages
B.Block all incoming traffic on port 53
C.Block all outgoing traffic on port 53
D.Use stateful inspection on the firewalls
Correct:A

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.7 After a client sends a connection request (SYN) packet to the server, the server will respond
(SYN-ACK) with a sequence number of its choosing, which then must be acknowledged (ACK) by
the client. This sequence number is predictable; the attack connects to a service first with its own
IP address, records the sequence number chosen, and then opens a second connection from a
forged IP address. The attack doesn't see the SYN-ACK (or any other packet) from the server, but
can guess the correct responses. If the source IP address is used for authentication, then the
attacker can use the one-sided communication to break into the server. What attacks can you
successfully launch against a server using the above technique?
A.Session Hijacking attacks
B.Denial of Service attacks
C.Web page defacement attacks
D.IP spoofing attacks
Correct:A

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.8 Eric notices repeated probes to port 1080. He learns that the protocol being used is designed to
allow a host outside of a firewall to connect transparently and securely through the firewall. He
wonders if his firewall has been breached. What would be your inference?
A.Eric's network has been penetrated by a firewall breach
B.The attacker is using the ICMP protocol to have a covert channel
C.Eric has a Wingate package providing FTP redirection on his network
D.Somebody is using SOCKS on the network to communicate through the firewall
Correct:D

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.9 Bob is acknowledged as a hacker of repute and is popular among visitors of 'underground' sites.
Bob is willing to share his knowledge to those who are willing to learn, and many have expressed
their interest in learning from him. However, this knowledge has risks associated with it, as the
same knowledge can be used for malevolent attacks as well. In this context, what would be the
most effective method to bridge the knowledge gap between the "black" hats or crackers and the
"white" hats or computer security professionals?
A.Hire more computer security monitoring personnel to monitor computer systems and networks
B.Educate everyone with books, articles and training on risk analysis, vulnerabilities and safeguards
C.Train more national guard and reservist in the art of computer security to help out in times of emergency
or crises
D.Make obtaining either a computer security certification or accreditation easier to achieve so more
individuals feel that they are a part of something larger than life
Correct:B

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.10 Bill has started to notice some slowness on his network when trying to update his company's
website and while trying to access the website from the Internet. Bill asks the help desk manager
if he has received any calls about slowness from the end users, but the help desk manager says
that he has not. Bill receives a number of calls from customers that cannot access the company
website and cannot purchase anything online. Bill logs on to a couple of his routers and notices
that the logs show network traffic is at an all time high.?He also notices that almost all the traffic
is originating from a specific address. Bill decides to use Geotrace to find out where the suspect
IP is originates from. The Geotrace utility runs a traceroute and finds that the IP is coming from
Panama.?Bill knows that none of his customers are in Panama so he immediately thinks that his
company is under a Denial of Service attack. Now Bill needs to find out more about the originating
IP address. What Internet registry should Bill look in to find the IP address?
A.LACNIC
B.ARIN
C.RIPE LACNIC
D.APNIC
Correct:A

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.11 Which programming language is NOT vulnerable to buffer overflow attacks?
A.Java
B.ActiveX
C.C++
D.Assembly Language
Correct:A

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.12 Samuel is the network administrator of DataX Communications, Inc. He is trying to configure his
firewall to block password brute force attempts on his network. He enables blocking the intruder's
IP address for a period of 24 hours time after more than three unsuccessful attempts. He is
confident that this rule will secure his network from hackers on the Internet. But he still receives
hundreds of thousands brute-force attempts generated from various IP addresses around the
world. After some investigation he realizes that the intruders are using a proxy somewhere else
on the Internet which has been scripted to enable the random usage of various proxies on each
request so as not to get caught by the firewall rule. Later he adds another rule to his firewall and
enables small sleep on the password attempt so that if the password is incorrect, it would take 45
seconds to return to the user to begin another attempt. Since an intruder may use multiple
machines to brute force the password, he also throttles the number of connections that will be
prepared to accept from a particular IP address. This action will slow the intruder's attempts.
Samuel wants to completely block hackers brute force attempts on his network. What are the
alternatives to defending against possible brute-force password attacks on his site?
A.Enforce a password policy and use account lockouts after three wrong logon attempts even though this
might lock out legit users
B.Enable the IDS to monitor the intrusion attempts and alert you by e-mail about the IP address of the
intruder so that you can block them at the Firewall manually
C.Enforce complex password policy on your network so that passwords are more difficult to brute force
D.You cannot completely block the intruders attempt if they constantly switch proxies
Correct:D

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.13 Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been
able to spawn an interactive shell and plans to deface the main web page. He first attempts to use
the "Echo" command to simply overwrite index.html and remains unsuccessful. He then attempts
to delete the page and achieves no progress. Finally, he tries to overwrite it with another page in
which also he remains unsuccessful. What is the probable cause of Bill's problem?
A.The system is a honeypot
B.The HTML file has permissions of read only
C.You cannot use a buffer overflow to deface a web page
D.There is a problem with the shell and he needs to run the attack again
Correct:B

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.14 Travis works primarily from home as a medical transcriptionist. He just bought a brand new
Dual Core Pentium computer with over 3 GB of RAM. He uses voice recognition software to help
him transfer what he dictates to electronic documents. The voice recognition software is
processor intensive, which is why he bought the new computer. Travis frequently has to get on
the Internet to do research on what he is working on. After about two months of working on his
new computer, he notices that it is not running nearly as fast as it used to. Travis uses antivirus
software, anti-spyware software, and always keeps the computer up-to-date with Microsoft
patches. After another month of working on the computer, Travis' computer is even more
noticeably slow. Every once in awhile, Travis also notices a window or two pop-up on his screen,
but they quickly disappear.He has seen these windows show up, even when he has not been on
the Internet. Travis is really worried about his computer because he spent a lot of money on it, and
he depends on it to work. Travis scans his computer with all kinds of software, and cannot find
anything out of the ordinary. Travis decides to go through Windows Explorer and check out the
file system, folder by folder, to see if there is anything he can find. He spends over four hours
pouring over the files and folders and cannot find anything.But, before he gives up, he notices
that his computer only has about 10 GB of free space available.Since his hard drive is a 200 GB
hard drive, Travis thinks this is very odd. Travis downloads Space Monger and adds up the sizes
for all the folders and files on his computer. According to his calculations, he should have around
150 GB of free space. What is mostly likely the cause of Travis' problems?
A.Travis's computer is infected with stealth kernel level rootkit
B.Travis's computer is infected with Stealth Trojan Virus
C.Travis's computer is infected with Self-Replication Worm that fills the hard disk space
D.Logic Bomb is triggered at random times creating hidden data consuming junk files
Correct:A

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.15 A program that defends against a port scanner will attempt to:
A.Sends back bogus data to the port scanner
B.Log a violation and recommend use of security-auditing tools
C.Limit access by the scanning system to publicly available ports only
D.Update a firewall rule in real time to prevent the port scan from being completed
Correct:D

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.16 What is the purpose of firewalking?
A.It's a technique used to map routers on a network link
B.It's a technique used to discover Wireless network on foot
C.It's a technique used to discover interface in promiscuous mode
D.It's a technique used to discover what rules are configured on a gateway
Correct:D

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.17 Samantha has been actively scanning the client network for which she is doing a vulnerability
assessment test. While doing a port scan she notices ports open in the 135 to 139 range. What
protocol is most likely to be listening on those ports?
A.FTP
B.SMB
C.Finger
D.Samba
Correct:B

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.18 Lori has just been tasked by her supervisor toonduct vulnerability scan on the corporate
network.She has been instructed to perform a very thorough test of the network to ensure that
there are no security holes on any of the machines.Lori's company does not own any commercial
scanning products, so she decides to download a free one off the Internet.Lori has never done a
vulnerability scan before, so she is unsure of some of the settings available in the software she
downloaded.One of the options is to choose which ports that can be scanned.Lori wants to do
exactly what her boss has told her, but she does not know what ports should be scanned. If Lori is
supposed to scan all known TCP ports, how many ports should she select in the software?
A.65536
B.1024
C.1025
D.Lori should not scan TCP ports, only UDP ports
Correct:A

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.19 A client has approached you with a penetration test requirement. They are concerned with the
possibility of external threat, and have invested considerable resources in protecting their
Internet exposure. However, their main concern is the possibility of an employee elevating his/her
privileges and gaining access to information outside of their department. What kind of penetration
test would you recommend that would best address the client's concern?
A.A Grey Hat test
B.A Grey Box test
C.A Black Hat test
D.A White Hat test
E.A Black Box test
F.A White Box test
Correct:B

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

NO.20 Maurine is working as a security consultant for Hinklemeir Associates.She has asked the
Systems Administrator to create a group policy that would not allow null sessions on the network.
The Systems Administrator is fresh out of college and has never heard of null sessions and does
not know what they are used for. Maurine is trying to explain to the Systems Administrator that
hackers will try to create a null session when footprinting the network. Why would an attacker try
to create a null session with a computer on a network?
A.Enumerate users and shares
B.Install a backdoor for later attacks
C.Escalate his/her privileges on the target server
D.To create a user with administrative privileges for later use
Correct:A

EC-COUNCIL   EC0-350 braindump   EC0-350   EC0-350 exam simulations   EC0-350

ITCertKing offer the latest 000-052 exam material and high-quality C_TFIN52_66 pdf questions & answers. Our FCNSA.v5 VCE testing engine and 70-687 study guide can help you pass the real exam. High-quality 1Z0-061 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.itcertking.com/EC0-350_exam.html

2014年1月14日星期二

EC-COUNCIL certification 312-76 exam training methods

ITCertKing's EC-COUNCIL 312-76 exam training materials is no other sites in the world can match. Of course, this is not only the problem of quality, it goes without saying that our quality is certainly the best. More important is that ITCertKing's exam training materials is applicable to all the IT exam. So the website of ITCertKing can get the attention of a lot of candidates. They believe and rely on us. It is also embodied the strength of our ITCertKing site. The strength of ITCertKing is embodied in it. Our exam training materials could make you not help recommend to your friends after you buy it. Because it's really a great help to you.

ITCertKing provide a good after-sales service for all customers. If you choose to purchase ITCertKing products, ITCertKing will provide you with online service for 24 hours a day and one year free update service, which timely inform you the latest exam information to let you have a fully preparation. We can let you spend a small amount of time and money and pass the IT certification exam at the same time. Selecting the products of ITCertKing to help you pass your first time EC-COUNCIL certification 312-76 exam is very cost-effective.

Exam Code: 312-76
Exam Name: EC-COUNCIL (Disaster Recovery Professional Practice Test)
One year free update, No help, Full refund!
Total Q&A: 290 Questions and Answers
Last Update: 2014-01-14

When we started offering EC-COUNCIL 312-76 exam questions and answers and exam simulator, we did not think that we will get such a big reputation. What we are doing now is incredible form of a guarantee. ITCertKing guarantee passing rate of 100%, you use your EC-COUNCIL 312-76 exam to try our EC-COUNCIL 312-76 training products, this is correct, we can guarantee your success.

Do you want to pass the EC-COUNCIL 312-76 exam better and faster? Then please select the ITCertKing. It can help you achieve your dreams. ITCertKing is a website that provide accurate exam materials for people who want to participate in the IT certification. ITCertKing can help a lot of IT professionals to enhance their career blueprint. Our strength will make you incredible. You can try a part of the questions and answers about EC-COUNCIL 312-76 exam to test our reliability.

If you want to achieve maximum results with minimum effort in a short period of time, and want to pass the EC-COUNCIL 312-76 exam. You can use ITCertKing's EC-COUNCIL 312-76 exam training materials. The training materials of ITCertKing are the product that through the test of practice. Many candidates proved it does 100% pass the exam. With it, you will reach your goal, and can get the best results.

312-76 Free Demo Download: http://www.itcertking.com/312-76_exam.html

NO.1 Della works as a security manager for SoftTech Inc. She is training some of the newly recruited
personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major
goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event
occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited
personnel in SoftTech Inc, what will be your answer for her question?
Each correct answer represents a part of the solution. Choose three.
A. Guarantee the reliability of standby systems through testing and simulation.
B. Protect an organization from major computer services failure.
C. Minimize the risk to the organization from delays in providing services.
D. Maximize the decision-making required by personnel during a disaster.
Answer: A,B,C

EC-COUNCIL   312-76 questions   312-76

NO.2 Fill in the blank with the appropriate number:
RAID-________ is a combination of RAID-1 and RAID-0.
A. 10
Answer: A

EC-COUNCIL test questions   312-76 practice test   312-76   312-76 original questions

NO.3 Which of the following control measures are considered while creating a disaster recovery plan?
Each correct answer represents a part of the solution. Choose three.
A. Detective measures
B. Supportive measures
C. Corrective measures
D. Preventive measures
Answer: A,C,D

EC-COUNCIL certification   312-76 test questions   312-76   312-76   312-76 demo

NO.4 Which of the following roles is responsible for the review and risk analysis of all the contracts on
regular basis?
A. The IT Service Continuity Manager
B. The Configuration Manager
C. The Supplier Manager
D. The Service Catalogue Manager
Answer: C

EC-COUNCIL   312-76   312-76

NO.5 You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify
the risks that will need a more in-depth analysis. Which of the following activities will help you in this?
A. Quantitative analysis
B. Estimate activity duration
C. Risk identification
D. Qualitative analysis
Answer: D

EC-COUNCIL study guide   312-76   312-76   312-76 test   312-76 test

NO.6 Which of the following types of attacks occurs when an attacker successfully inserts an intermediary
software or program between two communicating hosts?
A. Password guessing attack
B. Dictionary attack
C. Man-in-the-middle attack
D. Denial-of-service attack
Answer: C

EC-COUNCIL exam   312-76   312-76   312-76 original questions

NO.7 Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The
specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of
the following techniques will he use to fulfill this requirement?
A. AES
B. DES
C. IDEA
D. PGP
Answer: B

EC-COUNCIL   312-76   312-76 answers real questions   312-76

NO.8 Which of the following options is an intellectual property right to protect inventions?
A. Snooping
B. Patent
C. Copyright
D. Utility model
Answer: D

EC-COUNCIL certification   312-76 test questions   312-76 exam   312-76   312-76 practice test

NO.9 Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen months
and six months already passed. Management asks Mark that how often the project team is participating in
the risk reassessment of this project. What should Mark tell management if he is following the best
practices for risk management.?
A. At every status meeting of the project team, project risk management is an agenda item.
B. Project risk management happens at every milestone.
C. Project risk management has been concluded with the project planning.
D. Project risk management is scheduled for every month in the 18-month project.
Answer: A

EC-COUNCIL test   312-76   312-76   312-76   312-76   312-76

NO.10 Which of the following levels of RAID provides security features that are availability, enhanced
performance, and fault tolerance?
A. RAID-10
B. RAID-5
C. RAID-0
D. RAID-1
Answer: A

EC-COUNCIL   312-76 study guide   312-76   312-76 dumps   312-76 certification

NO.11 Which of the following BCP teams is the first responder and deals with the immediate effects of the
disaster?
A. Emergency action team
B. Emergency-management team
C. Damage-assessment team
D. Off-site storage team
Answer: A

EC-COUNCIL test answers   312-76 certification training   312-76

NO.12 You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the
network of your company. You develop a signature based on the characteristics of the detected virus.
Which of the following phases in the Incident handling process will utilize the signature to resolve this
incident?
A. Eradication
B. Identification
C. Containment
D. Recovery
Answer: A

EC-COUNCIL braindump   312-76 exam   312-76 test answers

NO.13 Which of the following statements about disaster recovery plan documentation are true?
Each correct answer represents a complete solution. Choose all that apply.
A. The documentation regarding a disaster recovery plan should be stored in backup tapes.
B. The documentation regarding a disaster recovery plan should be stored in floppy disks.
C. The disaster recovery plan documentation should be stored onsite only.
D. The disaster recovery plan documentation should be stored offsite only.
Answer: A,D

EC-COUNCIL   312-76 dumps   312-76 original questions

NO.14 Which of the following is the duration of time and a service level within which a business process must
be restored after a disaster in order to avoid unacceptable consequences associated with a break in
business continuity?
A. RTA
B. RPO
C. RCO
D. RTO
Answer: D

EC-COUNCIL dumps   312-76   312-76 original questions   312-76 braindump   312-76 questions   312-76 test

NO.15 Which of the following statements best describes the difference between the role of a data owner and
the role of a data custodian?
A. The custodian makes the initial information classification assignments and the operations manager
implements the scheme.
B. The custodian implements the information classification scheme after the initial assignment by the
operations manager.
C. The data custodian implements the information classification scheme after the initial assignment by the
data owner.
D. The data owner implements the information classification scheme after the initial assignment by the
custodian.
Answer: C

EC-COUNCIL   312-76   312-76 certification   312-76   312-76

NO.16 Which of the following statements are true about classless routing protocols?
Each correct answer represents a complete solution. Choose two.
A. The same subnet mask is used everywhere on the network.
B. They extend the IP addressing scheme.
C. IGRP is a classless routing protocol.
D. They support VLSM and discontiguous networks.
Answer: B,D

EC-COUNCIL   312-76   312-76   312-76 practice test

NO.17 Which of the following is established during the Business Impact Analysis by the owner of a process in
accepted business continuity planning methodology?
A. Recovery Consistency Objective
B. Recovery Time Objective
C. Recovery Point Objective
D. Recovery Time Actual
Answer: B

EC-COUNCIL   312-76   312-76 original questions

NO.18 Which of the following BCP teams is the first responder and deals with the immediate effects of the
disaster?
A. Emergency management team
B. Damage assessment team
C. Off-site storage team
D. Emergency action team
Answer: D

EC-COUNCIL   312-76 braindump   312-76   312-76   312-76

NO.19 Which of the following backup sites takes the longest recovery time?
A. Cold backup site
B. Hot backup site
C. Warm backup site
D. Mobile backup site
Answer: A

EC-COUNCIL   312-76   312-76 original questions

NO.20 Which of the following response teams aims to foster cooperation and coordination in incident
prevention, to prompt rapid reaction to incidents, and to promote information sharing among members
and the community at large?
A. CERT
B. CSIRT
C. FedCIRC
D. FIRST
Answer: D

EC-COUNCIL   312-76 demo   312-76   312-76 test answers   312-76

NO.21 IT Service Continuity Management (ITSCM) is used to support the overall Business Continuity
Management (BCM) in order to ensure that the required IT infrastructure and the IT service provision are
recovered within an agreed business time scales. Which of the following are the benefits of implementing
IT Service Continuity Management?
Each correct answer represents a complete solution. Choose all that apply.
A. It prioritizes the recovery of IT services by working with BCM and SLM.
B. It minimizes costs related with recovery plans using proper proactive planning and testing.
C. It confirms competence, impartiality, and performance capability of an organization that performs
audits.
D. It minimizes disruption in IT services when it follows a major interruption or disaster.
Answer: A,B,D

EC-COUNCIL   312-76   312-76 exam prep   312-76   312-76 answers real questions

NO.22 Availability Management deals with the day-to-day availability of services. Which of the following takes
over when a 'disaster' situation occurs?
A. Capacity Management
B. Service Level Management
C. Service Continuity Management
D. Service Reporting
Answer: C

EC-COUNCIL certification training   312-76   312-76   312-76

NO.23 You work as the project manager for Bluewell Inc. Your project has several risks that will affect several
stakeholder requirements. Which project management plan will define who will be available to share
information on the project risks?
A. Communications Management Plan
B. Resource Management Plan
C. Risk Management Plan
D. Stakeholder management strategy
Answer: A

EC-COUNCIL pdf   312-76 demo   312-76 answers real questions   312-76   312-76 pdf

NO.24 Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a
fixed period of time in exchange for the disclosure of an invention?
A. Snooping
B. Patent
C. Utility model
D. Copyright
Answer: B

EC-COUNCIL demo   312-76 exam simulations   312-76

NO.25 Which of the following tools in Helix Windows Live is used to reveal the database password of password
protected MDB files created using Microsoft Access or with Jet Database Engine?
A. Asterisk logger
B. FAU
C. Access Pass View
D. Galleta
Answer: C

EC-COUNCIL braindump   312-76 questions   312-76 original questions

NO.26 Which of the following is the simulation of the disaster recovery plans?
A. Walk-through test
B. Full operational test
C. Paper test
D. Preparedness test
Answer: B

EC-COUNCIL questions   312-76 practice test   312-76 original questions   312-76 answers real questions   312-76 certification training

NO.27 Which of the following cryptographic system services assures the receiver that the received message
has not been altered?
A. Authentication
B. Confidentiality
C. Non-repudiation
D. Integrity
Answer: D

EC-COUNCIL   312-76   312-76   312-76

NO.28 You are responsible for network and information security at a large hospital. It is a significant concern
that any change to any patient record can be easily traced back to the person who made that change.
What is this called?
A. Availability
B. Non repudiation
C. Confidentiality
D. Data Protection
Answer: B

EC-COUNCIL   312-76   312-76   312-76 dumps

NO.29 You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005
computer. The company asks you to implement a RAID system to provide fault tolerance to a database.
You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the
task?
A. RAID-5
B. RAID-0
C. RAID-1
D. RAID-10
Answer: C

EC-COUNCIL   312-76 test questions   312-76

NO.30 Which of the following are some of the parts of a project plan?
Each correct answer represents a complete solution. Choose all that apply.
A. Risk identification
B. Team members list
C. Risk analysis
D. Project schedule
Answer: A,B,C,D

EC-COUNCIL test answers   312-76 answers real questions   312-76   312-76 questions

ITCertKing offer the latest BAS-002 exam material and high-quality HP2-K34 pdf questions & answers. Our DC0-260 VCE testing engine and HP0-J65 study guide can help you pass the real exam. High-quality 000-129 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.itcertking.com/312-76_exam.html

312-49v8 best EC-COUNCIL certification exam questions and answers free download

ITCertKing can not only save you valuable time, but also make you feel at ease to participate in the exam and pass it successfully. ITCertKing has good reliability and a high reputation in the IT professionals. You can free download the part of EC-COUNCIL 312-49v8 exam questions and answers ITCertKing provide as an attempt to determine the reliability of our products. I believe you will be very satisfied of our products. I have confidence in our ITCertKing products that soon ITCertKing's exam questions and answers about EC-COUNCIL 312-49v8 will be your choice and you will pass EC-COUNCIL certification 312-49v8 exam successfully. It is wise to choose our ITCertKing and ITCertKing will prove to be the most satisfied product you want.

What is your dream? Don't you want to make a career? The answer must be ok. Then, you need to upgrade and develop yourself. You worked in the IT industry, through what methods can you realize your dream? Taking IT certification exam and getting the certificate are the way to upgrade yourself. At present, EC-COUNCIL 312-49v8 exam is very popular. Do you want to get EC-COUNCIL 312-49v8 certificate? If it is ok, don't hesitate to sign up for the exam. And don't worry about how to pass the test, ITCertKing certification training will be with you.

Exam Code: 312-49v8
Exam Name: EC-COUNCIL (Computer Hacking Forensic Investigator Exam)
One year free update, No help, Full refund!
Total Q&A: 180 Questions and Answers
Last Update: 2014-01-14

If you have a faith, then go to defend it. Gorky once said that faith is a great emotion, a creative force. My dream is to become a top IT expert. I think that for me is nowhere in sight. But to succeed you can have a shortcut, as long as you make the right choice. I took advantage of ITCertKing's EC-COUNCIL 312-49v8 exam training materials, and passed the EC-COUNCIL 312-49v8 exam. ITCertKing EC-COUNCIL 312-49v8 exam training materials is the best training materials. If you're also have an IT dream. Then go to buy ITCertKing's EC-COUNCIL 312-49v8 exam training materials, it will help you achieve your dreams.

With ITCertKing's EC-COUNCIL 312-49v8 exam training materials, you can get the latest EC-COUNCIL 312-49v8 exam questions and answers. It can make you pass the EC-COUNCIL 312-49v8 exam. EC-COUNCIL 312-49v8 exam certification can help you to develop your career. ITCertKing's EC-COUNCIL 312-49v8 exam training materials is ensure that you fully understand the questions and issues behind the concept. t can help you pass the exam easily.

312-49v8 Free Demo Download: http://www.itcertking.com/312-49v8_exam.html

NO.1 Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to
advertise open Wi-Fi networks?
A. WarWalking
B. WarFlying
C. WarChalking
D. WarDhving
Answer: C

EC-COUNCIL test answers   312-49v8 test questions   312-49v8   312-49v8 demo   312-49v8

NO.2 Computer forensics report provides detailed information on complete computer forensics
investigation process. It should explain how the incident occurred, provide technical details of the
incident and should be clear to understand. Which of the following attributes of a forensics report
can render it inadmissible in a court of law?
A. It includes metadata about the incident
B. It includes relevant extracts referred to In the report that support analysis or conclusions
C. It is based on logical assumptions about the incident timeline
D. It maintains a single document style throughout the text
Answer: C

EC-COUNCIL   312-49v8   312-49v8 original questions   312-49v8 pdf   312-49v8   312-49v8 original questions

NO.3 Networks are vulnerable to an attack which occurs due to overextension of bandwidth,
bottlenecks, network data interception, etc.
Which of the following network attacks refers to a process in which an attacker changes his or her
IP address so that he or she appears to be someone else?
A. IP address spoofing
B. Man-in-the-middle attack
C. Denial of Service attack
D. Session sniffing
Answer: A

EC-COUNCIL   312-49v8   312-49v8   312-49v8 test questions   312-49v8   312-49v8

NO.4 When collecting electronic evidence at the crime scene, the collection should proceed from
the
most volatile to the least volatile
A. True
B. False
Answer: A

EC-COUNCIL test   312-49v8   312-49v8   312-49v8   312-49v8

NO.5 Which of the following statements is not a part of securing and evaluating electronic crime
scene
checklist?
A. Locate and help the victim
B. Transmit additional flash messages to other responding units
C. Request additional help at the scene if needed
D. Blog about the incident on the internet
Answer: D

EC-COUNCIL   312-49v8 dumps   312-49v8 certification

ITCertKing offer the latest 156-215.13 exam material and high-quality 644-068 pdf questions & answers. Our MB5-705 VCE testing engine and 700-505 study guide can help you pass the real exam. High-quality 74-324 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.itcertking.com/312-49v8_exam.html

2013年12月25日星期三

ITCertKing EC-COUNCIL EC0-350 exam practice questions and answers

ITCertKing's training materials can test your knowledge in preparing for the exam, and can evaluate your performance within a fixed time. The instructions given to you for your weak link, so that you can prepare for the exam better. The ITCertKing's EC-COUNCIL EC0-350 exam training materials introduce you many themes that have different logic. So that you can learn the various technologies and subjects. We guarantee that our training materials has tested through the practice. ITCertKing have done enough to prepare for your exam. Our material is comprehensive, and the price is reasonable.

What do you think of using ITCertKing EC-COUNCIL EC0-350 exam dumps? ITCertKing EC-COUNCIL EC0-350 certification training dumps, it may be said, is the most excellent reference materials among all exam-related reference materials. Why? There are four reasons in the following. Firstly, ITCertKing exam dumps are researched by IT experts who used their experience for years and can figure out accurately the scope of the examinations. Secondly, ITCertKing exam dumps conclude all questions that can appear in the real exam. Thirdly, ITCertKing exam dumps ensures the candidate will pass their exam at the first attempt. If the candidate fails the exam, ITCertKing will give him FULL REFUND. Fourthly, ITCertKing exam dumps have two versions: PDF and SOFT version. With the two versions, the candidates can pass their exam with ease.

From the view of specialized examination point, it is necessary to teach you tips about the exam. You need to outsmart, and do not give your future the chance of failure. ITCertKing is a great resource site. It includes EC-COUNCIL EC0-350 Exam Materials, study materials and technical materials, as well as exam training and detailed explanation and answers. The website which provide exam information are surged in recent years. This may cause you clueless when you prepare the EC-COUNCIL EC0-350 exam. ITCertKing's EC-COUNCIL EC0-350 exam training materials are effective training materials that proven by professionals and the candidates who passed the exam. It can help you to pass the exam certification easily.

In ITCertKing's website you can free download study guide, some exercises and answers about EC-COUNCIL certification EC0-350 exam as an attempt.

Exam Code: EC0-350
Exam Name: EC-COUNCIL (Ethical hacking and countermeasures)
One year free update, No help, Full refund!
Total Q&A: 878 Questions and Answers
Last Update: 2013-12-25

ITCertKing's EC-COUNCIL EC0-350 exam training materials is the best training materials. If you are an IT staff, it will be your indispensable training materials. Do not take your future betting on tomorrow. ITCertKing's EC-COUNCIL EC0-350 exam training materials are absolutely trustworthy. We are dedicated to provide the materials to the world of the candidates who want to participate in IT exam. To get the EC-COUNCIL EC0-350 exam certification is the goal of many IT people & Network professionals. The pass rate of ITCertKing is incredibly high. We are committed to your success.

In order to pass the EC-COUNCIL EC0-350 exam, selecting the appropriate training tools is very necessary. And the study materials of EC-COUNCIL EC0-350 exam is a very important part. ITCertKing can provide valid materials to pass the EC-COUNCIL EC0-350 exam. The IT experts in ITCertKing are all have strength aned experience. Their research materials are very similar with the real exam questions . ITCertKing is a site that provide the exam materials to the people who want to take the exam. and we can help the candidates to pass the exam effectively.

ITCertKing is a professional website to specially provide training tools for IT certification exams and a good choice to help you pass EC0-350 exam,too. ITCertKing provide exam materials about EC0-350 certification exam for you to consolidate learning opportunities. ITCertKing will provide all the latest and accurate exam practice questions and answers for the staff to participate in EC0-350 certification exam.

EC0-350 Free Demo Download: http://www.itcertking.com/EC0-350_exam.html

NO.1 Which programming language is NOT vulnerable to buffer overflow attacks?
A.Java
B.ActiveX
C.C++
D.Assembly Language
Correct:A

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.2 Why is Social Engineering considered attractive by hackers and commonly done by experts in
the field?
A.It is not considered illegal
B.It is done by well-known hackers
C.It is easy and extremely effective to gain information
D.It does not require a computer in order to commit a crime
Correct:C

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.3 Maurine is working as a security consultant for Hinklemeir Associates.She has asked the
Systems Administrator to create a group policy that would not allow null sessions on the network.
The Systems Administrator is fresh out of college and has never heard of null sessions and does
not know what they are used for. Maurine is trying to explain to the Systems Administrator that
hackers will try to create a null session when footprinting the network. Why would an attacker try
to create a null session with a computer on a network?
A.Enumerate users and shares
B.Install a backdoor for later attacks
C.Escalate his/her privileges on the target server
D.To create a user with administrative privileges for later use
Correct:A

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.4 After a client sends a connection request (SYN) packet to the server, the server will respond
(SYN-ACK) with a sequence number of its choosing, which then must be acknowledged (ACK) by
the client. This sequence number is predictable; the attack connects to a service first with its own
IP address, records the sequence number chosen, and then opens a second connection from a
forged IP address. The attack doesn't see the SYN-ACK (or any other packet) from the server, but
can guess the correct responses. If the source IP address is used for authentication, then the
attacker can use the one-sided communication to break into the server. What attacks can you
successfully launch against a server using the above technique?
A.Session Hijacking attacks
B.Denial of Service attacks
C.Web page defacement attacks
D.IP spoofing attacks
Correct:A

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.5 Bob is acknowledged as a hacker of repute and is popular among visitors of 'underground' sites.
Bob is willing to share his knowledge to those who are willing to learn, and many have expressed
their interest in learning from him. However, this knowledge has risks associated with it, as the
same knowledge can be used for malevolent attacks as well. In this context, what would be the
most effective method to bridge the knowledge gap between the "black" hats or crackers and the
"white" hats or computer security professionals?
A.Hire more computer security monitoring personnel to monitor computer systems and networks
B.Educate everyone with books, articles and training on risk analysis, vulnerabilities and safeguards
C.Train more national guard and reservist in the art of computer security to help out in times of emergency
or crises
D.Make obtaining either a computer security certification or accreditation easier to achieve so more
individuals feel that they are a part of something larger than life
Correct:B

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.6 A client has approached you with a penetration test requirement. They are concerned with the
possibility of external threat, and have invested considerable resources in protecting their
Internet exposure. However, their main concern is the possibility of an employee elevating his/her
privileges and gaining access to information outside of their department. What kind of penetration
test would you recommend that would best address the client's concern?
A.A Grey Hat test
B.A Grey Box test
C.A Black Hat test
D.A White Hat test
E.A Black Box test
F.A White Box test
Correct:B

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.7 Which of the following built-in C/C++ functions you should avoid to prevent your program from
buffer overflow attacks?
A.strcpy()
B.strcat()
C.streadd()
D.strsock()
Correct:A B C

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.8 Clive is conducting a pen-test and has just port scanned a system on the network. He has
identified the operating system as Linux and been able to elicit responses from ports 23, 25 and
53. He infers port 23 as running Telnet service, port 25 as running SMTP service and port 53 as
running DNS service. The client confirms these findings and attests to the current availability of
the services. When he tries to telnet to port 23 or 25, he gets a blank screen in response. On
typing other commands, he sees only blank spaces or underscores symbols on the screen. What
are you most likely to infer from this?
A.The services are protected by TCP wrappers
B.There is a honeypot running on the scanned machine
C.An attacker has replaced the services with trojaned ones
D.This indicates that the telnet and SMTP server have crashed
Correct:A

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.9 Travis works primarily from home as a medical transcriptionist. He just bought a brand new
Dual Core Pentium computer with over 3 GB of RAM. He uses voice recognition software to help
him transfer what he dictates to electronic documents. The voice recognition software is
processor intensive, which is why he bought the new computer. Travis frequently has to get on
the Internet to do research on what he is working on. After about two months of working on his
new computer, he notices that it is not running nearly as fast as it used to. Travis uses antivirus
software, anti-spyware software, and always keeps the computer up-to-date with Microsoft
patches. After another month of working on the computer, Travis' computer is even more
noticeably slow. Every once in awhile, Travis also notices a window or two pop-up on his screen,
but they quickly disappear.He has seen these windows show up, even when he has not been on
the Internet. Travis is really worried about his computer because he spent a lot of money on it, and
he depends on it to work. Travis scans his computer with all kinds of software, and cannot find
anything out of the ordinary. Travis decides to go through Windows Explorer and check out the
file system, folder by folder, to see if there is anything he can find. He spends over four hours
pouring over the files and folders and cannot find anything.But, before he gives up, he notices
that his computer only has about 10 GB of free space available.Since his hard drive is a 200 GB
hard drive, Travis thinks this is very odd. Travis downloads Space Monger and adds up the sizes
for all the folders and files on his computer. According to his calculations, he should have around
150 GB of free space. What is mostly likely the cause of Travis' problems?
A.Travis's computer is infected with stealth kernel level rootkit
B.Travis's computer is infected with Stealth Trojan Virus
C.Travis's computer is infected with Self-Replication Worm that fills the hard disk space
D.Logic Bomb is triggered at random times creating hidden data consuming junk files
Correct:A

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.10 Samantha has been actively scanning the client network for which she is doing a vulnerability
assessment test. While doing a port scan she notices ports open in the 135 to 139 range. What
protocol is most likely to be listening on those ports?
A.FTP
B.SMB
C.Finger
D.Samba
Correct:B

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.11 What type of port scan is shown below? Scan directed at open port: ClientServer
192.5.2.92:4079 ---------FIN--------->192.5.2.110:23 192.5.2.92:4079 <----NO
RESPONSE------192.5.2.110:23 Scan directed at closed port: ClientServer 192.5.2.92:4079
---------FIN--------->192.5.2.110:23 192.5.2.92:4079<-----RST/ACK----------192.5.2.110:23
A.Idle Scan
B.FIN Scan
C.XMAS Scan
D.Windows Scan
Correct:B

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.12 Bill has started to notice some slowness on his network when trying to update his company's
website and while trying to access the website from the Internet. Bill asks the help desk manager
if he has received any calls about slowness from the end users, but the help desk manager says
that he has not. Bill receives a number of calls from customers that cannot access the company
website and cannot purchase anything online. Bill logs on to a couple of his routers and notices
that the logs show network traffic is at an all time high.?He also notices that almost all the traffic
is originating from a specific address. Bill decides to use Geotrace to find out where the suspect
IP is originates from. The Geotrace utility runs a traceroute and finds that the IP is coming from
Panama.?Bill knows that none of his customers are in Panama so he immediately thinks that his
company is under a Denial of Service attack. Now Bill needs to find out more about the originating
IP address. What Internet registry should Bill look in to find the IP address?
A.LACNIC
B.ARIN
C.RIPE LACNIC
D.APNIC
Correct:A

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.13 Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been
able to spawn an interactive shell and plans to deface the main web page. He first attempts to use
the "Echo" command to simply overwrite index.html and remains unsuccessful. He then attempts
to delete the page and achieves no progress. Finally, he tries to overwrite it with another page in
which also he remains unsuccessful. What is the probable cause of Bill's problem?
A.The system is a honeypot
B.The HTML file has permissions of read only
C.You cannot use a buffer overflow to deface a web page
D.There is a problem with the shell and he needs to run the attack again
Correct:B

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.14 Mark works as a contractor for the Department of Defense and is in charge of network security.
He has spent the last month securing access to his network from all possible entry points. He has
segmented his network into several subnets and has installed firewalls all over the network. He
has placed very stringent rules on all the firewalls, blocking everything in and out except ports
that must be used. He does need to have port 80 open since his company hosts a website that
must be accessed from the Internet. Mark is fairly confident of his perimeter defenses, but is still
worried about programs like Hping2 that can get into a network through covert channels. How
should mark protect his network from an attacker using Hping2 to scan his internal network?
A.Block ICMP type 13 messages
B.Block all incoming traffic on port 53
C.Block all outgoing traffic on port 53
D.Use stateful inspection on the firewalls
Correct:A

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.15 Samuel is the network administrator of DataX Communications, Inc. He is trying to configure his
firewall to block password brute force attempts on his network. He enables blocking the intruder's
IP address for a period of 24 hours time after more than three unsuccessful attempts. He is
confident that this rule will secure his network from hackers on the Internet. But he still receives
hundreds of thousands brute-force attempts generated from various IP addresses around the
world. After some investigation he realizes that the intruders are using a proxy somewhere else
on the Internet which has been scripted to enable the random usage of various proxies on each
request so as not to get caught by the firewall rule. Later he adds another rule to his firewall and
enables small sleep on the password attempt so that if the password is incorrect, it would take 45
seconds to return to the user to begin another attempt. Since an intruder may use multiple
machines to brute force the password, he also throttles the number of connections that will be
prepared to accept from a particular IP address. This action will slow the intruder's attempts.
Samuel wants to completely block hackers brute force attempts on his network. What are the
alternatives to defending against possible brute-force password attacks on his site?
A.Enforce a password policy and use account lockouts after three wrong logon attempts even though this
might lock out legit users
B.Enable the IDS to monitor the intrusion attempts and alert you by e-mail about the IP address of the
intruder so that you can block them at the Firewall manually
C.Enforce complex password policy on your network so that passwords are more difficult to brute force
D.You cannot completely block the intruders attempt if they constantly switch proxies
Correct:D

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.16 A program that defends against a port scanner will attempt to:
A.Sends back bogus data to the port scanner
B.Log a violation and recommend use of security-auditing tools
C.Limit access by the scanning system to publicly available ports only
D.Update a firewall rule in real time to prevent the port scan from being completed
Correct:D

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.17 What file system vulnerability does the following command take advantage of? type
c:\anyfile.exe > c:\winnt\system32\calc.exe:anyfile.exe
A.HFS
B.ADS
C.NTFS
D.Backdoor access
Correct:B

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.18 What is the purpose of firewalking?
A.It's a technique used to map routers on a network link
B.It's a technique used to discover Wireless network on foot
C.It's a technique used to discover interface in promiscuous mode
D.It's a technique used to discover what rules are configured on a gateway
Correct:D

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.19 Eric notices repeated probes to port 1080. He learns that the protocol being used is designed to
allow a host outside of a firewall to connect transparently and securely through the firewall. He
wonders if his firewall has been breached. What would be your inference?
A.Eric's network has been penetrated by a firewall breach
B.The attacker is using the ICMP protocol to have a covert channel
C.Eric has a Wingate package providing FTP redirection on his network
D.Somebody is using SOCKS on the network to communicate through the firewall
Correct:D

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

NO.20 Lori has just been tasked by her supervisor toonduct vulnerability scan on the corporate
network.She has been instructed to perform a very thorough test of the network to ensure that
there are no security holes on any of the machines.Lori's company does not own any commercial
scanning products, so she decides to download a free one off the Internet.Lori has never done a
vulnerability scan before, so she is unsure of some of the settings available in the software she
downloaded.One of the options is to choose which ports that can be scanned.Lori wants to do
exactly what her boss has told her, but she does not know what ports should be scanned. If Lori is
supposed to scan all known TCP ports, how many ports should she select in the software?
A.65536
B.1024
C.1025
D.Lori should not scan TCP ports, only UDP ports
Correct:A

EC-COUNCIL pdf   EC0-350   EC0-350   EC0-350   EC0-350

ITCertKing offer the latest HP0-Y46 exam material and high-quality 70-461 pdf questions & answers. Our 000-224 VCE testing engine and 000-225 study guide can help you pass the real exam. High-quality 000-226 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.itcertking.com/EC0-350_exam.html

2013年12月23日星期一

ITCertKing provides to EC-COUNCIL 312-50 test materials

You can free download part of practice questions and answers about EC-COUNCIL certification 312-50 exam to test our quality. ITCertKing can help you 100% pass EC-COUNCIL certification 312-50 exam, and if you carelessly fail to pass EC-COUNCIL certification 312-50 exam, we will guarantee a full refund for you.

The life which own the courage to pursue is wonderful life. Someday when you're sitting in a rocking chair to recall your past, and then with smile in your face. Then your life is successful. Do you want to be successful in life? Then use ITCertKing's EC-COUNCIL 312-50 exam training materials quickly. This material including questions and answers and every IT certification candidates is very applicable. The success rate can reach up to 100%. Why not action? Quickly to buy it please.

Exam Code: 312-50
Exam Name: EC-COUNCIL (Ethical Hacker Certified)
One year free update, No help, Full refund!
Total Q&A: 765 Questions and Answers
Last Update: 2013-12-23

ITCertKing have a strong It expert team to constantly provide you with an effective training resource. They continue to use their rich experience and knowledge to study the real exam questions of the past few years. Finally ITCertKing's targeted practice questions and answers have advent, which will give a great help to a lot of people participating in the IT certification exams. You can free download part of ITCertKing's simulation test questions and answers about EC-COUNCIL certification 312-50 exam as a try. Through the proof of many IT professionals who have use ITCertKing's products, ITCertKing is very reliable for you. Generally, if you use ITCertKing's targeted review questions, you can 100% pass EC-COUNCIL certification 312-50 exam. Please Add ITCertKing to your shopping cart now! Maybe the next successful people in the IT industry is you.

ITCertKing is the best catalyst to help IT personage be successful. Many people who have passed some IT related certification exams used our ITCertKing's training tool. Our ITCertKing expert team use their experience for many people participating in EC-COUNCIL certification 312-50 exam to develope the latest effective training tools, which includes EC-COUNCIL 312-50 certification simulation test, the current exam and answers . Our ITCertKing's test questions and answers have 95% similarity with the real exam. With ITCertKing's training tool your EC-COUNCIL certification 312-50 exams can be easy passed.

About the 312-50 exam certification, reliability can not be ignored. 312-50 exam training materials of ITCertKing are specially designed. It can maximize the efficiency of your work. We are the best worldwide materials provider about this exam.

ITCertKing has been to make the greatest efforts to provide the best and most convenient service for our candidates. High speed and high efficiency are certainly the most important points. In today's society, high efficiency is hot topic everywhere. So we designed training materials which have hign efficiency for the majority of candidates. It allows candidates to grasp the knowledge quickly, and achieved excellent results in the exam. ITCertKing's EC-COUNCIL 312-50 exam training materials can help you to save a lot of time and effort. You can also use the extra time and effort to earn more money.

Selecting the products of ITCertKing which provide the latest and the most accurate information about EC-COUNCIL 312-50, your success is not far away.

312-50 Free Demo Download: http://www.itcertking.com/312-50_exam.html

NO.1 Snort has been used to capture packets on the network. On studying the packets, the
penetration tester finds it to be abnormal. If you were the penetration tester, why
would you find this abnormal?
(Note: The student is being tested on concept learnt during passive OS
fingerprinting, basic TCP/IP connection concepts and the ability to read packet
signatures from a sniff dumo.)
05/20-17:06:45.061034 192.160.13.4:31337 -> 172.16.1.101:1
TCP TTL:44 TOS:0x10 ID:242
***FRP** Seq: 0XA1D95 Ack: 0x53 Win: 0x400
...
05/20-17:06:58.685879 192.160.13.4:31337 ->
172.16.1.101:1024
TCP TTL:44 TOS:0x10 ID:242
***FRP** Seg: 0XA1D95 Ack: 0x53 Win: 0x400
What is odd about this attack? (Choose the most appropriate statement)
A. This is not a spoofed packet as the IP stack has increasing numbers for the three flags.
B. This is back orifice activity as the scan comes from port 31337.
C. The attacker wants to avoid creating a sub-carrier connection that is not normally
valid.
D. There packets were created by a tool; they were not created by a standard IP stack.
Answer: B

EC-COUNCIL questions   312-50   312-50

NO.2 Who is an Ethical Hacker?
A. A person whohacksfor ethical reasons
B. A person whohacksfor an ethical cause
C. A person whohacksfor defensive purposes
D. A person whohacksfor offensive purposes
Answer: C

EC-COUNCIL   312-50 exam simulations   312-50 exam simulations

NO.3 User which Federal Statutes does FBI investigate for computer crimes involving
e-mail scams and mail fraud?
A. 18 U.S.C 1029 Possession of Access Devices
B. 18 U.S.C 1030 Fraud and related activity in connection with computers
C. 18 U.S.C 1343 Fraud by wire, radio or television
D. 18 U.S.C 1361 Injury to Government Property
E. 18 U.S.C 1362 Government communication systems
F. 18 U.S.C 1831 Economic Espionage Act
G. 18 U.S.C 1832 Trade Secrets Act
Answer: B

EC-COUNCIL   312-50   312-50 certification training   312-50   312-50 braindump

NO.4 Which of the following tools are used for footprinting?(Choose four.
A. Sam Spade
B. NSLookup
C. Traceroute
D. Neotrace
E. Cheops
Answer: A, B, C, D

EC-COUNCIL   312-50 exam simulations   312-50 exam dumps

NO.5 Your Certkiller trainee Sandra asks you which are the four existing Regional
Internet Registry (RIR's)?
A. APNIC, PICNIC, ARIN, LACNIC
B. RIPE NCC, LACNIC, ARIN, APNIC
C. RIPE NCC, NANIC, ARIN, APNIC
D. RIPE NCC, ARIN, APNIC, LATNIC
Answer: B

EC-COUNCIL   312-50 certification training   312-50

NO.6 Where should a security tester be looking for information that could be used by an
attacker against an organization? (Select all that apply)
A. CHAT rooms
B. WHOIS database
C. News groups
D. Web sites
E. Search engines
F. Organization's own web site
Answer: A, B, C, D, E, F

EC-COUNCIL demo   312-50   312-50

NO.7 What does the term "Ethical Hacking" mean?
A. Someone who is hacking for ethical reasons.
B. Someone who is using his/her skills for ethical reasons.
C. Someone who is using his/her skills for defensive purposes.
D. Someone who is using his/her skills for offensive purposes.
Answer: C

EC-COUNCIL   312-50 answers real questions   312-50 dumps

NO.8 What is "Hacktivism"?
A. Hacking for a cause
B. Hacking ruthlessly
C. An association which groups activists
D. None of the above
Answer: A

EC-COUNCIL answers real questions   312-50 test answers   312-50 exam dumps

NO.9 A very useful resource for passively gathering information about a target company
is:
A. Host scanning
B. Whois search
C. Traceroute
D. Ping sweep
Answer: B

EC-COUNCIL exam simulations   312-50   312-50 practice test

NO.10 What are the two basic types of attacks?(Choose two.
A. DoS
B. Passive
C. Sniffing
D. Active
E. Cracking
Answer: B, D

EC-COUNCIL   312-50 test   312-50   312-50 test questions

NO.11 How does Traceroute map the route that a packet travels from point A to point B?
A. It uses a TCP Timestamp packet that will elicit a time exceed in transit message.
B. It uses a protocol that will be rejected at the gateways on its way to its destination.
C. It manipulates the value of time to live (TTL) parameter packet to elicit a time
exceeded in transit message.
D. It manipulated flags within packets to force gateways into generating error messages.
Answer: C

EC-COUNCIL exam dumps   312-50 dumps   312-50 study guide   312-50 test answers

NO.12 Which of the following activities will NOT be considered as passive footprinting?
A. Go through the rubbish to find out any information that might have been discarded.
B. Search on financial site such as Yahoo Financial to identify assets.
C. Scan the range of IP address found in the target DNS database.
D. Perform multiples queries using a search engine.
Answer: C

EC-COUNCIL dumps   312-50 questions   312-50   312-50 dumps   312-50 original questions

NO.13 You are footprinting an organization to gather competitive intelligence. You visit
the company's website for contact information and telephone numbers but do not
find it listed there. You know that they had the entire staff directory listed on their
website 12 months ago but not it is not there.
How would it be possible for you to retrieve information from the website that is
outdated?
A. Visit google's search engine and view the cached copy.
B. Visit Archive.org web site to retrieve the Internet archive of the company's website.
C. Crawl the entire website and store them into your computer.
D. Visit the company's partners and customers website for this information.
Answer: B

EC-COUNCIL   312-50   312-50 questions   312-50 braindump   312-50   312-50

NO.14 To what does "message repudiation" refer to what concept in the realm of email
security?
A. Message repudiation means a user can validate which mail server or servers a message
was passed through.
B. Message repudiation means a user can claim damages for a mail message that
damaged their reputation.
C. Message repudiation means a recipient can be sure that a message was sent from a
particular person.
D. Message repudiation means a recipient can be sure that a message was sent from a
certain host.
E. Message repudiation means a sender can claim they did not actually send a particular
message.
Answer: E

EC-COUNCIL   312-50   312-50 test questions   312-50 exam prep

NO.15 You are footprinting Acme.com to gather competitive intelligence. You visit the
acme.com websire for contact information and telephone number numbers but do
not find it listed there. You know that they had the entire staff directory listed on
their website 12 months ago but now it is not there. How would it be possible for you
to retrieve information from the website that is outdated?
A. Visit google search engine and view the cached copy.
B. Visit Archive.org site to retrieve the Internet archive of the acme website.
C. Crawl the entire website and store them into your computer.
D. Visit the company's partners and customers website for this information.
Answer: B

EC-COUNCIL test   312-50   312-50   312-50 practice test   312-50   312-50

NO.16 A Certkiller security System Administrator is reviewing the network system log files.
He notes the following:
- Network log files are at 5 MB at 12:00 noon.
-At 14:00 hours, the log files at 3 MB.
What should he assume has happened and what should he do about the situation?
A. He should contact the attacker's ISP as soon as possible and have the connection
disconnected.
B. He should log the event as suspicious activity, continue to investigate, and take further
steps according to site security policy.
C. He should log the file size, and archive the information, because the router crashed.
D. He should run a file system check, because the Syslog server has a self correcting file
system problem.
E. He should disconnect from the Internet discontinue any further unauthorized use,
because an attack has taken place.
Answer: B

EC-COUNCIL exam simulations   312-50 practice test   312-50 exam prep   312-50 test questions

NO.17 You receive an email with the following message:
Hello Steve,
We are having technical difficulty in restoring user database record after the recent
blackout. Your account data is corrupted. Please logon to the SuperEmailServices.com
and change your password.
http://www.supermailservices.com@0xde.0xad.0xbe.0xef/support/logon.htm
If you do not reset your password within 7 days, your account will be permanently
disabled locking you out from our e-mail services.
Sincerely,
Technical Support
SuperEmailServices
From this e-mail you suspect that this message was sent by some hacker since you
have been using their e-mail services for the last 2 years and they have never sent
out an e-mail such as this. You also observe the URL in the message and confirm
your suspicion about 0xde.0xad.0xbde.0xef which looks like hexadecimal numbers.
You immediately enter the following at Windows 2000 command prompt:
Ping0xde.0xad.0xbe.0xef
You get a response with a valid IP address.
What is the obstructed IP address in the e-mail URL?
A. 222.173.190.239
B. 233.34.45.64
C. 54.23.56.55
D. 199.223.23.45
Answer: A

EC-COUNCIL   312-50 dumps   312-50   312-50 pdf   312-50

NO.18 Which one of the following is defined as the process of distributing incorrect
Internet Protocol (IP) addresses/names with the intent of diverting traffic?
A. Network aliasing
B. Domain Name Server (DNS) poisoning
C. Reverse Address Resolution Protocol (ARP)
D. Port scanning
Answer: B

EC-COUNCIL questions   312-50   312-50   312-50   312-50   312-50

NO.19 What is the essential difference between an 'Ethical Hacker' and a 'Cracker'?
A. The ethical hacker does not use the same techniques or skills as a cracker.
B. The ethical hacker does it strictly for financial motives unlike a cracker.
C. The ethical hacker has authorization from the owner of the target.
D. The ethical hacker is just a cracker who is getting paid.
Answer: C

EC-COUNCIL practice test   312-50   312-50   312-50 test questions   312-50   312-50 certification

NO.20 According to the CEH methodology, what is the next step to be performed after
footprinting?
A. Enumeration
B. Scanning
C. System Hacking
D. Social Engineering
E. Expanding Influence
Answer: B

EC-COUNCIL exam simulations   312-50 exam simulations   312-50   312-50 exam simulations

ITCertKing offer the latest 850-001 exam material and high-quality E20-891 pdf questions & answers. Our HP5-T01D VCE testing engine and HP2-B100 study guide can help you pass the real exam. High-quality 000-052 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.itcertking.com/312-50_exam.html