2014年5月20日星期二

Pass4Test offre une formation sur EC-COUNCIL 312-76 EC0-350 312-49v8 matériaux examen

Pass4Test est un fournisseur de formation pour une courte terme, et Pass4Test peut vous assurer le succès de test EC-COUNCIL 312-76. Si malheureusement, vous échouez le test, votre argent sera tout rendu. Vous pouvez télécharger le démo gratuit avant de choisir Pass4Test. Au moment là, vous serez confiant sur Pass4Test.

Le guide d'étude sorti de Pass4Test comprend les expériences résumées par nos experts, les matériaux et les Q&As à propos de test Certification EC-COUNCIL EC0-350. Notre bonne réputation dans l'industrie IT sera une assurance 100% à réussir le test EC-COUNCIL EC0-350. Afin de vous permettre de choisir Pass4Test, vous pouvez télécharger gratuitement le démo de Q&A tout d'abord.

Le test EC-COUNCIL 312-49v8 est une examination de techniques professionnelles dans l'Industrie IT. Pass4Test est un site qui peut vous aider à réussir le test EC-COUNCIL 312-49v8 rapidement. Si vous utiliser l'outil de formation avant le test, vous apprendrez tous essences de test Certification EC-COUNCIL 312-49v8.

Vous choisissez l'aide de Pass4Test, Pass4Test fait tous effort à vous aider à réussir le test. De plus, la mise à jour de Q&A pendant un an est gratuite pour vous. Vous n'avez plus raison à hésiter. Pass4Test est une meilleure assurance pour le succès de test EC-COUNCIL 312-49v8. Ajoutez la Q&A au panier.

Code d'Examen: 312-76
Nom d'Examen: EC-COUNCIL (Disaster Recovery Professional Practice Test)
Questions et réponses: 290 Q&As

Code d'Examen: EC0-350
Nom d'Examen: EC-COUNCIL (Ethical hacking and countermeasures)
Questions et réponses: 878 Q&As

Code d'Examen: 312-49v8
Nom d'Examen: EC-COUNCIL (Computer Hacking Forensic Investigator Exam)
Questions et réponses: 180 Q&As

Vous pouvez s'exercer en Internet avec le démo gratuit. Vous allez découvrir que la Q&A de Pass4Test est laquelle le plus complète. C'est ce que vous voulez.

Vous aurez une assurance 100% à réussir le test EC-COUNCIL 312-49v8 si vous choisissez le produit de Pass4Test. Si malheuresement, vous ne passerez pas le test, votre argent seront tout rendu.

Selon les feedbacks les professionnels bien réputés dans l'Industrie IT, Pass4Test est un bon catalyseur de leurs succès. L'outil de formation offert par Pass4Test leur aide d'économiser le temps et l'argent, le plus important est qu'ils aient passé le test EC-COUNCIL 312-49v8 avec succès. Pass4Test est un fournissur fiable. Vous allez réaliser votre rêve avec l'aide de Pass4Test.

EC0-350 Démo gratuit à télécharger: http://www.pass4test.fr/EC0-350.html

NO.1 Lori has just been tasked by her supervisor toonduct vulnerability scan on the corporate
network.She has been instructed to perform a very thorough test of the network to ensure that
there are no security holes on any of the machines.Lori's company does not own any commercial
scanning products, so she decides to download a free one off the Internet.Lori has never done a
vulnerability scan before, so she is unsure of some of the settings available in the software she
downloaded.One of the options is to choose which ports that can be scanned.Lori wants to do
exactly what her boss has told her, but she does not know what ports should be scanned. If Lori is
supposed to scan all known TCP ports, how many ports should she select in the software?
A.65536
B.1024
C.1025
D.Lori should not scan TCP ports, only UDP ports
Correct:A

certification EC-COUNCIL   certification EC0-350   certification EC0-350   certification EC0-350   certification EC0-350

NO.2 A program that defends against a port scanner will attempt to:
A.Sends back bogus data to the port scanner
B.Log a violation and recommend use of security-auditing tools
C.Limit access by the scanning system to publicly available ports only
D.Update a firewall rule in real time to prevent the port scan from being completed
Correct:D

certification EC-COUNCIL   certification EC0-350   certification EC0-350   certification EC0-350   certification EC0-350

NO.3 Clive is conducting a pen-test and has just port scanned a system on the network. He has
identified the operating system as Linux and been able to elicit responses from ports 23, 25 and
53. He infers port 23 as running Telnet service, port 25 as running SMTP service and port 53 as
running DNS service. The client confirms these findings and attests to the current availability of
the services. When he tries to telnet to port 23 or 25, he gets a blank screen in response. On
typing other commands, he sees only blank spaces or underscores symbols on the screen. What
are you most likely to infer from this?
A.The services are protected by TCP wrappers
B.There is a honeypot running on the scanned machine
C.An attacker has replaced the services with trojaned ones
D.This indicates that the telnet and SMTP server have crashed
Correct:A

certification EC-COUNCIL   certification EC0-350   certification EC0-350   certification EC0-350   certification EC0-350

NO.4 Eric notices repeated probes to port 1080. He learns that the protocol being used is designed to
allow a host outside of a firewall to connect transparently and securely through the firewall. He
wonders if his firewall has been breached. What would be your inference?
A.Eric's network has been penetrated by a firewall breach
B.The attacker is using the ICMP protocol to have a covert channel
C.Eric has a Wingate package providing FTP redirection on his network
D.Somebody is using SOCKS on the network to communicate through the firewall
Correct:D

certification EC-COUNCIL   certification EC0-350   certification EC0-350   certification EC0-350   certification EC0-350

NO.5 Why is Social Engineering considered attractive by hackers and commonly done by experts in
the field?
A.It is not considered illegal
B.It is done by well-known hackers
C.It is easy and extremely effective to gain information
D.It does not require a computer in order to commit a crime
Correct:C

certification EC-COUNCIL   certification EC0-350   certification EC0-350   certification EC0-350   certification EC0-350

NO.6 Samantha has been actively scanning the client network for which she is doing a vulnerability
assessment test. While doing a port scan she notices ports open in the 135 to 139 range. What
protocol is most likely to be listening on those ports?
A.FTP
B.SMB
C.Finger
D.Samba
Correct:B

certification EC-COUNCIL   certification EC0-350   certification EC0-350   certification EC0-350   certification EC0-350

NO.7 Travis works primarily from home as a medical transcriptionist. He just bought a brand new
Dual Core Pentium computer with over 3 GB of RAM. He uses voice recognition software to help
him transfer what he dictates to electronic documents. The voice recognition software is
processor intensive, which is why he bought the new computer. Travis frequently has to get on
the Internet to do research on what he is working on. After about two months of working on his
new computer, he notices that it is not running nearly as fast as it used to. Travis uses antivirus
software, anti-spyware software, and always keeps the computer up-to-date with Microsoft
patches. After another month of working on the computer, Travis' computer is even more
noticeably slow. Every once in awhile, Travis also notices a window or two pop-up on his screen,
but they quickly disappear.He has seen these windows show up, even when he has not been on
the Internet. Travis is really worried about his computer because he spent a lot of money on it, and
he depends on it to work. Travis scans his computer with all kinds of software, and cannot find
anything out of the ordinary. Travis decides to go through Windows Explorer and check out the
file system, folder by folder, to see if there is anything he can find. He spends over four hours
pouring over the files and folders and cannot find anything.But, before he gives up, he notices
that his computer only has about 10 GB of free space available.Since his hard drive is a 200 GB
hard drive, Travis thinks this is very odd. Travis downloads Space Monger and adds up the sizes
for all the folders and files on his computer. According to his calculations, he should have around
150 GB of free space. What is mostly likely the cause of Travis' problems?
A.Travis's computer is infected with stealth kernel level rootkit
B.Travis's computer is infected with Stealth Trojan Virus
C.Travis's computer is infected with Self-Replication Worm that fills the hard disk space
D.Logic Bomb is triggered at random times creating hidden data consuming junk files
Correct:A

certification EC-COUNCIL   certification EC0-350   certification EC0-350   certification EC0-350   certification EC0-350

NO.8 Samuel is the network administrator of DataX Communications, Inc. He is trying to configure his
firewall to block password brute force attempts on his network. He enables blocking the intruder's
IP address for a period of 24 hours time after more than three unsuccessful attempts. He is
confident that this rule will secure his network from hackers on the Internet. But he still receives
hundreds of thousands brute-force attempts generated from various IP addresses around the
world. After some investigation he realizes that the intruders are using a proxy somewhere else
on the Internet which has been scripted to enable the random usage of various proxies on each
request so as not to get caught by the firewall rule. Later he adds another rule to his firewall and
enables small sleep on the password attempt so that if the password is incorrect, it would take 45
seconds to return to the user to begin another attempt. Since an intruder may use multiple
machines to brute force the password, he also throttles the number of connections that will be
prepared to accept from a particular IP address. This action will slow the intruder's attempts.
Samuel wants to completely block hackers brute force attempts on his network. What are the
alternatives to defending against possible brute-force password attacks on his site?
A.Enforce a password policy and use account lockouts after three wrong logon attempts even though this
might lock out legit users
B.Enable the IDS to monitor the intrusion attempts and alert you by e-mail about the IP address of the
intruder so that you can block them at the Firewall manually
C.Enforce complex password policy on your network so that passwords are more difficult to brute force
D.You cannot completely block the intruders attempt if they constantly switch proxies
Correct:D

certification EC-COUNCIL   certification EC0-350   certification EC0-350   certification EC0-350   certification EC0-350

没有评论:

发表评论