显示标签为“EC-COUNCIL”的博文。显示所有博文
显示标签为“EC-COUNCIL”的博文。显示所有博文

2014年2月12日星期三

The latest EC-COUNCIL Certification 312-50v8 exam training methods

ITCertKing's EC-COUNCIL 312-50v8 exam training materials allows candidates to learn in the case of mock examinations. You can control the kinds of questions and some of the problems and the time of each test. In the site of ITCertKing, you can prepare for the exam without stress and anxiety. At the same time, you also can avoid some common mistakes. So you will gain confidence and be able to repeat your experience in the actual test to help you to pass the exam successfully.

ITCertKing's EC-COUNCIL 312-50v8 exam training materials are bring the greatest success rate to all the candicates who want to pass the exam. EC-COUNCIL 312-50v8 exam is a challenging Certification Exam. Besides the books, internet is considered to be a treasure house of knowledge. In ITCertKing you can find your treasure house of knowledge. This is a site of great help to you. You will encounter the complex questions in the exam, but ITCertKing can help you to pass the exam easily. ITCertKing's EC-COUNCIL 312-50v8 exam training material includes all the knowledge that must be mastered for the purpose of passing the EC-COUNCIL 312-50v8 exam.

What is ITCertKing EC-COUNCIL 312-50v8 exam training materials? There are many online sites provide EC-COUNCIL 312-50v8 exam training resources. But ITCertKing provide you the most actual information. ITCertKing have professional personnel of certification experts, technical staff, and comprehensive language masters. They are always studying the latest EC-COUNCIL 312-50v8 exam. Therefore, if you want to pass the EC-COUNCIL 312-50v8 examination, please Login ITCertKing website. It will let you close to your success, and into your dream paradise step by step.

If you choose the help of ITCertKing, we will spare no effort to help you pass the exam. Moreover, we also provide you with a year of free after-sales service to update the exam practice questions and answers. Do not hesitate! Please select ITCertKing, it will be the best guarantee for you to pass 312-50v8 certification exam. Now please add ITCertKing to your shopping cart.

Exam Code: 312-50v8
Exam Name: EC-COUNCIL (Certified Ethical Hacker v8)
One year free update, No help, Full refund!
Total Q&A: 880 Questions and Answers
Last Update: 2014-02-12

ITCertKing's product is prepared for people who participate in the EC-COUNCIL certification 312-50v8 exam. ITCertKing's training materials include not only EC-COUNCIL certification 312-50v8 exam training materials which can consolidate your expertise, but also high degree of accuracy of practice questions and answers about EC-COUNCIL certification 312-50v8 exam. ITCertKing can guarantee you passe the EC-COUNCIL certification 312-50v8 exam with high score the even if you are the first time to participate in this exam.

312-50v8 Free Demo Download: http://www.itcertking.com/312-50v8_exam.html

NO.1 You are the CIO for Avantes Finance International, a global finance company based in Geneva.
You are responsible for network functions and logical security throughout the entire corporation.
Your company has over 250 servers running Windows Server, 5000 workstations running
Windows Vista, and 200 mobile users working from laptops on Windows 7.
Last week, 10 of your company's laptops were stolen from salesmen while at a conference in
Amsterdam. These laptops contained proprietary company information. While doing damage
assessment on the possible public relations nightmare this may become, a news story leaks about
the stolen laptops and also that sensitive information from those computers was posted to a blog
online.
What built-in Windows feature could you have implemented to protect the sensitive information on
these laptops?
A. You should have used 3DES which is built into Windows
B. If you would have implemented Pretty Good Privacy (PGP) which is built into Windows,the
sensitive information on the laptops would not have leaked out
C. You should have utilized the built-in feature of Distributed File System (DFS) to protect the
sensitive information on the laptops
D. You could have implemented Encrypted File System (EFS) to encrypt the sensitive files on the
laptops
Answer: D

EC-COUNCIL pdf   312-50v8 test answers   312-50v8   312-50v8 test   312-50v8 demo

NO.2 Bart is looking for a Windows NT/ 2000/XP command-line tool that can be used to assign,
display,
or modify ACL’s (access control lists) to files or folders and also one that can be used within batch
files.
Which of the following tools can be used for that purpose? (Choose the best answer)
A. PERM.exe
B. CACLS.exe
C. CLACS.exe
D. NTPERM.exe
Answer: B

EC-COUNCIL exam prep   312-50v8   312-50v8 dumps   312-50v8 demo

NO.3 Which of the following is an automated vulnerability assessment tool?
A. Whack a Mole
B. Nmap
C. Nessus
D. Kismet
E. Jill32
Answer: C

EC-COUNCIL   312-50v8 exam   312-50v8

NO.4 WEP is used on 802.11 networks, what was it designed for?
A. WEP is designed to provide a wireless local area network (WLAN) with a level of security and
privacy comparable to what it usually expected of a wired LAN.
B. WEP is designed to provide strong encryption to a wireless local area network (WLAN) with a
lever of integrity and privacy adequate for sensible but unclassified information.
C. WEP is designed to provide a wireless local area network (WLAN) with a level of availability
and privacy comparable to what is usually expected of a wired LAN.
D. WEOP is designed to provide a wireless local area network (WLAN) with a level of privacy
comparable to what it usually expected of a wired LAN.
Answer: A

EC-COUNCIL questions   312-50v8 dumps   312-50v8 pdf

NO.5 Harold is the senior security analyst for a small state agency in New York. He has no other
security professionals that work under him, so he has to do all the security-related tasks for the
agency. Coming from a computer hardware background, Harold does not have a lot of experience
with security methodologies and technologies, but he was the only one who applied for the
position. Harold is currently trying to run a Sniffer on the agency's network to get an idea of what
kind of traffic is being passed around, but the program he is using does not seem to be capturing
anything. He pours through the Sniffer's manual, but cannot find anything that directly relates to
his problem. Harold decides to ask the network administrator if he has any thoughts on the
problem. Harold is told that the Sniffer was not working because the agency's network is a
switched network, which cannot be sniffed by some programs without some tweaking. What
technique could Harold use to sniff his agency's switched network?
A. ARP spoof the default gateway
B. Conduct MiTM against the switch
C. Launch smurf attack against the switch
D. Flood the switch with ICMP packets
Answer: A

EC-COUNCIL   312-50v8 test   312-50v8   312-50v8 questions   312-50v8

NO.6 You just purchased the latest DELL computer, which comes pre-installed with Windows 7,
McAfee antivirus software and a host of other applications. You want to connect Ethernet wire to
your cable modem and start using the computer immediately. Windows is dangerously insecure
when unpacked from the box, and there are a few things that you must do before you use it.
A. New installation of Windows should be patched by installing the latest service packs and
hotfixes
B. Key applications such as Adobe Acrobat,Macromedia Flash,Java,Winzip etc.,must have the
latest security patches installed
C. Install a personal firewall and lock down unused ports from connecting to your computer
D. Install the latest signatures for Antivirus software
E. Configure "Windows Update" to automatic
F. Create a non-admin user with a complex password and logon to this account
G. You can start using your computer as vendors such as DELL,HP and IBM would have already
installed the latest service packs.
Answer: A,C,D,E,F

EC-COUNCIL questions   312-50v8   312-50v8

NO.7 A security analyst in an insurance company is assigned to test a new web application that will
be
used by clients to help them choose and apply for an insurance plan. The analyst discovers that
the application is developed in ASP scripting language and it uses MSSQL as a database
backend. The analyst locates the application's search form and introduces the following code in
the search input fielD.
IMG SRC=vbscript:msgbox("Vulnerable");> originalAttribute="SRC"
originalPath="vbscript:msgbox("Vulnerable");>"
When the analyst submits the form, the browser returns a pop-up window that says "Vulnerable".
Which web applications vulnerability did the analyst discover?
A. Cross-site request forgery
B. Command injection
C. Cross-site scripting
D. SQL injection
Answer: C

EC-COUNCIL   312-50v8   312-50v8 pdf   312-50v8   312-50v8   312-50v8

ITCertKing offer the latest 70-331 exam material and high-quality 1D0-610 pdf questions & answers. Our MB6-886 VCE testing engine and 642-996 study guide can help you pass the real exam. High-quality 78-702 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.itcertking.com/312-50v8_exam.html

2014年2月9日星期日

EC-COUNCIL 212-77 questions and answers

ITCertKing is a professional website. It can give each candidate to provide high-quality services, including pre-sales service and after-sales service. If you need ITCertKing's EC-COUNCIL 212-77 exam training materials, you can use part of our free questions and answers as a trial to sure that it is suitable for you. So you can personally check the quality of the ITCertKing EC-COUNCIL 212-77 exam training materials, and then decide to buy it. If you did not pass the exam unfortunately, we will refund the full cost of your purchase. Moreover, we can give you a year of free updates until you pass the exam.

ITCertKing EC-COUNCIL 212-77 exam information are cheap and fine. We use simulation questions and answers dedication to our candidates with ultra-low price and high quality . We sincerely hope that you can pass the exam. We provide you with a convenient online service to resolve any questions about EC-COUNCIL 212-77 exam questions for you.

In such society where all people take the time so precious, choosing ITCertKing to help you pass the EC-COUNCIL certification 212-77 exam is cost-effective. If you choose ITCertKing, we promise that we will try our best to help you pass the exam and also provide you with one year free update service. If you fail the exam, we will give you a full refund.

EC-COUNCIL certification 212-77 exam is one of the many IT employees' most wanting to participate in the certification exams. Passing the exam needs rich knowledge and experience. While accumulating these abundant knowledge and experience needs a lot of time. Maybe you can choose some training courses or training tool and spending a certain amount of money to select a high quality training institution's training program is worthful. ITCertKing is a website which can meet the needs of many IT employees who participate in EC-COUNCIL certification 212-77 exam. ITCertKing's product is a targeted training program providing for EC-COUNCIL certification 212-77 exams, which can make you master a lot of IT professional knowledge in a short time and then let you have a good preparation for EC-COUNCIL certification 212-77 exam.

ITCertKing is a professional IT certification sites, the certification success rate is 100%. This number is proved by candidates through practice. Because ITCertKing has a strong IT team of experts, they are committed to study exam questions and answers, and serve the vital interests of the majority of candidates. They use their own professional mind and experience to meet the needs of the candidates. According to the needs of the candidate, they consider the issue from all angles, and manufacturing applicability exam training materials. This material is EC-COUNCIL 212-77 exam training materials, which including questions and answers.

Exam Code: 212-77
Exam Name: EC-COUNCIL (Linux Security )
One year free update, No help, Full refund!
Total Q&A: 50 Questions and Answers
Last Update: 2014-02-09

212-77 Free Demo Download: http://www.itcertking.com/212-77_exam.html

NO.1 Which of the following statements applies to the IP address 192.168.0.1?
A. It is reserved.
B. It cannot be assigned to a host that accesses the Internet.
C. It is designated for multicast transmission.
D. It can be freely assigned to a host on a private network
Answer: A

EC-COUNCIL   212-77   212-77

NO.2 Which of the following is true of Linux passwords?
A. They are changed with the password utility.
B. They must be changed once a month.
C. They may consist only of lowercase letters and numbers.
D. They may be changed by the user who owns an account or by root.
Answer: A

EC-COUNCIL   212-77   212-77   212-77 study guide

NO.3 Which of the following are ways to disable dynamic routing?
A. The linuxconf Gated Daemon screen
B. The linuxconf Routed Daemon screen
C. echo "0" > /proc/sys/net/ipv4/dynamic_routing
D. Editing /etc/sysconfig/network-scripts
Answer: B

EC-COUNCIL certification   212-77 pdf   212-77 exam   212-77   212-77

NO.4 Which of the following measures is the most effective way to prevent attacks
through various network services?
A. Disable a service in the appropriate /etc/xinetd.d configuration file.
B. Use a firewall to drop all requests to unneeded services.
C. Block service requests with the appropriate commands in /etc/hosts.deny.
D. Uninstall unneeded network services.
Answer: D

EC-COUNCIL original questions   212-77   212-77   212-77 pdf

NO.5 Which of the following are risks of SUID and SGID programs? (Choose two)
A. Bugs in the programs may cause more damage than they would in ordinary programs.
B. The program files are large and thus may cause a disk to run out of space.
C. Because the programs require password entry, running them over an insecure network
link runs the risk of password interception.
D. Users may be able to abuse a program's features, thus doing more damage than would
otherwise be possible.
Answer: B, D

EC-COUNCIL   212-77 certification   212-77   212-77   212-77

NO.6 How should you engage users in helping to secure your computer's passwords?
A. Educate them about the importance of security, the means of choosing good
passwords, and the ways crackers can obtain passwords.
B. Instruct your users to e-mail copies of their passwords to themselves on other systems
so that they're readily available in case of an emergency.
C. Enforce password change rules but don't tell users how crackers obtain passwords
since you could be educating a future cracker.
D. Give some of your users copies of the encrypted database file as backup in case a
cracker breaks in and corrupts the original.
Answer: A

EC-COUNCIL dumps   212-77   212-77   212-77 test answers

NO.7 You are told by a co-worker that information pertaining to the syslog command can
be found in man page 3. How would you view this information?
A. man syslog 3
B. man 3 syslog
C. man syslog -3
D. man -3 syslog
Answer: B

EC-COUNCIL   212-77   212-77   212-77

NO.8 Which of the following is not a Linux DHCP client?
A. dhcpcd
B. pump
C. dhcpd
D. dhclient
Answer: A

EC-COUNCIL test questions   212-77   212-77   212-77 study guide

NO.9 Under the bash shell which is the most appropriate place to set environment
variables that apply to all users?
A. /etc/skel
B. rc.sysinit
C. /etc/profile
D. /etc/bashrc
E. rc.local
Answer: A

EC-COUNCIL original questions   212-77   212-77

NO.10 Assume that you have just logged on as a regular user. Which of the following
commands allows you to edit the file with user passwords associated with the
Shadow Password Suite?
A. vi /etc/shadow
B. sudo -c "vi /etc/shadow"
C. su -c "vi /etc/shadow"
D. visu vi /etc/passwd
Answer: B

EC-COUNCIL   212-77 practice test   212-77 test   212-77 demo

ITCertKing offer the latest MB3-700 exam material and high-quality 700-303 pdf questions & answers. Our 3103 VCE testing engine and 642-467 study guide can help you pass the real exam. High-quality 000-N32 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.itcertking.com/212-77_exam.html

EC-COUNCIL certification ECSS exam best training materials

ITCertKing's expert team has developed a latest short-term effective training scheme for EC-COUNCIL certification ECSS exam, which is a 20 hours of training for the candidates of EC-COUNCIL certification ECSS exam. After training they can not only quickly master a lot of knowledge, but also consolidate their original knowledge. So they can easily pass EC-COUNCIL certification ECSS exam and it is much more cost-effective for them than those who spend a lot of time and energy to prepare for the examination.

The site of ITCertKing is well-known on a global scale. Because the training materials it provides to the IT industry have no-limited applicability. This is the achievement made by IT experts in ITCertKing after a long period of time. They used their knowledge and experience as well as the ever-changing IT industry to produce the material. The effect of ITCertKing's EC-COUNCIL ECSS exam training materials is reflected particularly good by the use of the many candidates. If you participate in the IT exam, you should not hesitate to choose ITCertKing's EC-COUNCIL ECSS exam training materials. After you use, you will know that it is really good.

Are you facing challenges in your career? Would you like to better prove yourself to others by improving your ability? Would you like to have more opportunities to get promoted? Hurry to sign up for IT certification exam and get the IT certificate. EC-COUNCIL certification exam is one of the important exams. If you obtain EC-COUNCIL certificate, you will get a great help. Because EC-COUNCIL ECSS certification test is a very important exam, you can begin with passing ECSS test. Are you wandering how to pass rapidly ECSS certification exam? ITCertKing certification training dumps can help you to achieve your goals.

ITCertKing.com won a good reputation by these candidates that have passed EC-COUNCIL ECSS certification exam. ITCertKing gets approve from the people with its powerful exam dumps. As long as you choose our dumps as review tool before the exam, you will have a happy result in ECSS exam, which is perfectly obvious. Now hurry to download free demo, you will believe your choice can't be wrong.

Exam Code: ECSS
Exam Name: EC-COUNCIL (EC-Council Certified Security Specialist Practice Test)
One year free update, No help, Full refund!
Total Q&A: 337 Questions and Answers
Last Update: 2014-02-09

You can free download part of ITCertKing's exercises and answers about EC-COUNCIL certification ECSS exam as a try, then you will be more confident to choose our ITCertKing's products to prepare your EC-COUNCIL certification ECSS exam. Please add ITCertKing's products in you cart quickly.

How far the distance between words and deeds? It depends to every person. If a person is strong-willed, it is close at hand. I think you should be such a person. Since to choose to participate in the EC-COUNCIL ECSS certification exam, of course, it is necessary to have to go through. This is also the performance that you are strong-willed. ITCertKing EC-COUNCIL ECSS exam training materials is the best choice to help you pass the exam. The training materials of ITCertKing website have a unique good quality on the internet. If you want to pass the EC-COUNCIL ECSS exam, you'd better to buy ITCertKing's exam training materials quickly.

Selecting the products of ITCertKing which provide the latest and the most accurate information about EC-COUNCIL ECSS, your success is not far away.

ECSS Free Demo Download: http://www.itcertking.com/ECSS_exam.html

NO.1 John works as a professional Ethical Hacker. He has been assigned the project of testing the security
of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of
the tool is as follows:
Which of the following tools is John using to crack the wireless encryption keys?
A. AirSnort
B. Kismet
C. PsPasswd
D. Cain
Answer: A

EC-COUNCIL   ECSS   ECSS test answers   ECSS dumps

NO.2 Which of the following statements best describes a certification authority?
A. A certification authority is a type of encryption that uses a public key and a private key pair fordata
encryption.
B. A certification authority is an entity that issues digital certificates for use by other parties.
C. A certification authority is a technique to authenticate digital documents by using
computercryptography.
D. A certification authority is a type of encryption that uses a single key to encrypt and decryp t data.
Answer: B

EC-COUNCIL   ECSS original questions   ECSS exam dumps   ECSS certification   ECSS

NO.3 You are responsible for security at a company that uses a lot of Web applications. You are most
concerned about flaws in those applications allowing some attacker to get into your network. What
method would be best for finding such flaws?
A. Vulnerability scanning
B. Manual penetration testing
C. Automated penetration testing
D. Code review
Answer: A

EC-COUNCIL certification training   ECSS practice test   ECSS pdf   ECSS   ECSS

NO.4 Which of the following OSI layers is responsible for protocol conversion, data encryption/decryption,
and data compression?
A. Transport layer
B. Presentation layer
C. Data-link layer
D. Network layer
Answer: B

EC-COUNCIL   ECSS certification   ECSS exam simulations   ECSS exam simulations

NO.5 Which of the following security protocols are based on the 802.11i standard.?
Each correct answer represents a complete solution. Choose all that apply.
A. WEP
B. WPA2
C. WPA
D. WEP2
Answer: B,C

EC-COUNCIL   ECSS answers real questions   ECSS test questions

NO.6 Firewalking is a technique that can be used to gather information about a remote network protected by a
firewall. This technique can be used effectively to perform information gathering attacks. In this technique,
an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall. Which
of the following are pre-requisites for an attacker to conduct firewalking?
Each correct answer represents a complete solution. Choose all that apply.
A. ICMP packets leaving the network should be allowed.
B. An attacker should know the IP address of the last known gateway before the firewall.
C. There should be a backdoor installed on the network.
D. An attacker should know the IP address of a host located behind the firewall.
Answer: A,B,D

EC-COUNCIL test   ECSS   ECSS   ECSS test questions   ECSS test questions

NO.7 Which of the following attacks CANNOT be detected by an Intrusion Detection System (IDS)?
Each correct answer represents a complete solution. Choose all that apply.
A. Denial-of-Service (DoS) attack
B. E-mail spoofing
C. Port scan attack
D. Shoulder surfing
Answer: B,D

EC-COUNCIL   ECSS exam   ECSS exam prep   ECSS braindump   ECSS certification

NO.8 Which of the following proxy servers is also referred to as transparent proxies or forced proxies?
A. Intercepting proxy server
B. Anonymous proxy server
C. Reverse proxy server
D. Tunneling proxy server
Answer: A

EC-COUNCIL original questions   ECSS test   ECSS

NO.9 Fill in the blank with the appropriate word ___is software that is a subcategory of malware and refers to
unwanted software that performs malicious actions on a user's computer. Some its examples are Trojan,
adware, and spyware.
A. Crimeware
Answer: A

EC-COUNCIL   ECSS original questions   ECSS

NO.10 Which of the following needs to be documented to preserve evidences for presentation in court?
A. Incident response policy
B. Account lockout policy
C. Separation of duties
D. Chain of custody
Answer: D

EC-COUNCIL   ECSS   ECSS   ECSS   ECSS

NO.11 Which of the following representatives of incident response team takes forensic backups of the systems
that are the focus of the incident?
A. Lead investigator
B. Information security representative
C. Technical representative
D. Legal representative
Answer: C

EC-COUNCIL   ECSS exam dumps   ECSS braindump   ECSS practice test

NO.12 Which of the following types of attacks cannot be prevented by technical measures only?
A. Brute force
B. Ping flood attack
C. Smurf DoS
D. Social engineering
Answer: D

EC-COUNCIL   ECSS certification training   ECSS   ECSS questions   ECSS study guide

NO.13 Which of the following is the first computer virus that was used to infect the boot sector of storage
media formatted with the DOS File Allocation Table (FAT) file system?
A. I love you
B. Melissa
C. Tequila
D. Brain
Answer: D

EC-COUNCIL exam prep   ECSS exam simulations   ECSS test

NO.14 Kerberos is a computer network authentication protocol that allows individuals communicating over a
non-secure network to prove their identity to one another in a secure manner. Which of the following
statements are true about the Kerberos authentication scheme?
Each correct answer represents a complete solution. Choose all that apply.
A. Kerberos requires continuous availability of a central server.
B. Kerberos builds on Asymmetric key cryptography and requires a trusted third party.
C. Dictionary and brute force attacks on the initial TGS response to a client may reveal the
subject'spasswords.
D. Kerberos requires the clocks of the involved hosts to be synchronized.
Answer: A,C,D

EC-COUNCIL study guide   ECSS answers real questions   ECSS answers real questions   ECSS

NO.15 Which of the following security policies will you implement to keep safe your data when you connect
your Laptop to the office network over IEEE 802.11 WLANs?
Each correct answer represents a complete solution. Choose two.
A. Using a protocol analyzer on your Laptop to monitor for risks.
B. Using an IPSec enabled VPN for remote connectivity.
C. Using portscanner like nmap in your network.
D. Using personal firewall software on your Laptop.
Answer: B,D

EC-COUNCIL answers real questions   ECSS   ECSS   ECSS original questions   ECSS pdf   ECSS certification

NO.16 You have just set up a wireless network for customers at a coffee shop. Which of the following are
good security measures to implement?
Each correct answer represents a complete solution. Choose two.
A. Using WEP encryption
B. Using WPA encryption
C. Not broadcasting SSID
D. MAC filtering the router
Answer: A,B

EC-COUNCIL certification   ECSS test answers   ECSS

NO.17 Which of the following statements are true about routers?
Each correct answer represents a complete solution. Choose all that apply.
A. Routers are responsible for making decisions about which of several paths network (orInternet)traffic
will follow.
B. Routers do not limit physical broadcast traffic.
C. Routers organize addresses into classes, which are used to determine how to move packets fromone
network to another.
D. Routers act as protocol translators and bind dissimilar networks.
Answer: A,C,D

EC-COUNCIL exam dumps   ECSS exam   ECSS dumps

NO.18 John works as an Office Assistant in DataSoft Inc. He has received an e-mail from
duesoft_lotterygroup@us.com with the following message:
The DueSoft Lottery Incorporation
This is to inform you that you have just won a prize of $7,500.00 for this year's Annual Lottery promotion,
which was organized by Msn/Yahoo Lottery in conjunction with DueSoft. We collect active online e-mails
and select five people every year as our winners through an electronic balloting machine. Please reply
within three days of receiving this e-mail with your full details like Name, Address, Sex, Occupation, Age,
State, Telephone number, and Country to claim your prize.
If John replies to this e-mail, which of the following attacks may he become vulnerable to?
A. Salami attack
B. Man-in-the-Middle attack
C. Phishing attack
D. DoS attack
Answer: C

EC-COUNCIL   ECSS questions   ECSS exam prep   ECSS   ECSS study guide

NO.19 Linux traffic monitoring tools are used to monitor and quickly detect faults in the network or a system.
Which of the following tools are used to monitor traffic of the Linux operating system?
Each correct answer represents a complete solution. Choose all that apply.
A. PsExec
B. IPTraf
C. MRTG
D. PsLogList
E. Ntop
Answer: B,C,E

EC-COUNCIL   ECSS   ECSS exam simulations   ECSS

NO.20 You work as a Network Administrator for Tech Perfect Inc. The company requires a secure wireless
network. To provide security, you are configuring ISA Server 2006 as a firewall. While configuring
ISA Server 2006, which of the following is NOT necessary?
A. Defining how ISA Server would cache Web contents
B. Defining ISA Server network configuration
C. Setting up of monitoring on ISA Server
D. Configuration of VPN access
Answer: D

EC-COUNCIL   ECSS questions   ECSS pdf   ECSS study guide   ECSS

ITCertKing offer the latest 70-342 exam material and high-quality 9L0-620 pdf questions & answers. Our 200-101 VCE testing engine and 000-503 study guide can help you pass the real exam. High-quality C_TFIN52_66 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.itcertking.com/ECSS_exam.html

2014年1月31日星期五

ITCertKing provides information on the latest EC-COUNCIL EC0-350 examination training

Every person in IT industry should not just complacent with own life. . Now the competitive pressures in various industries are self-evident , and the IT industry is no exception. So if you have a goal, then come true it courageously. Pass the EC-COUNCIL EC0-350 exam is a competition. If you passed the exam, then you will have a brighter future. ITCertKing can provide you with the true and accurate training materials to help you pass the exam. And then you can achieve your ideal.

If you buy the ITCertKing's products, we will not only spare no effort to help you pass the certification exam, but also provide a free update and upgrade service. If the official change the outline of the certification exam, we will notify customers immediately. If we have any updated version of test software, it will be immediately pushed to customers. ITCertKing can promise to help you succeed to pass your first EC-COUNCIL certification EC0-350 exam.

Exam Code: EC0-350
Exam Name: EC-COUNCIL (Ethical hacking and countermeasures)
One year free update, No help, Full refund!
Total Q&A: 878 Questions and Answers
Last Update: 2014-01-31

There are many ways to help you prepare for your EC-COUNCIL EC0-350 exam. ITCertKing provide a reliable training tools to help you prepare for your EC-COUNCIL EC0-350 exam certification. The ITCertKing EC-COUNCIL EC0-350 exam materials are including test questions and answers. Our materials are very good sofeware that through the practice test. Our materials will meet all of theIT certifications.

Maybe on other web sites or books, you can also see the related training materials. But as long as you compare ITCertKing's product with theirs, you will find that our product has a broader coverage of the certification exam's outline. You can free download part of exam practice questions and answers about EC-COUNCIL certification EC0-350 exam from ITCertKing website as a try to detect the quality of our products. Why ITCertKing can provide the comprehensive and high-quality information uniquely? Because we have a professional team of IT experts. They continue to use their IT knowledge and rich experience to study the previous years exams of EC-COUNCIL EC0-350 and have developed practice questions and answers about EC-COUNCIL EC0-350 exam certification exam. So ITCertKing's newest exam practice questions and answers about EC-COUNCIL certification EC0-350 exam are so popular among the candidates participating in the EC-COUNCIL certification EC0-350 exam.

EC0-350 Free Demo Download: http://www.itcertking.com/EC0-350_exam.html

NO.1 Bill has started to notice some slowness on his network when trying to update his company's
website and while trying to access the website from the Internet. Bill asks the help desk manager
if he has received any calls about slowness from the end users, but the help desk manager says
that he has not. Bill receives a number of calls from customers that cannot access the company
website and cannot purchase anything online. Bill logs on to a couple of his routers and notices
that the logs show network traffic is at an all time high.?He also notices that almost all the traffic
is originating from a specific address. Bill decides to use Geotrace to find out where the suspect
IP is originates from. The Geotrace utility runs a traceroute and finds that the IP is coming from
Panama.?Bill knows that none of his customers are in Panama so he immediately thinks that his
company is under a Denial of Service attack. Now Bill needs to find out more about the originating
IP address. What Internet registry should Bill look in to find the IP address?
A.LACNIC
B.ARIN
C.RIPE LACNIC
D.APNIC
Correct:A

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.2 Travis works primarily from home as a medical transcriptionist. He just bought a brand new
Dual Core Pentium computer with over 3 GB of RAM. He uses voice recognition software to help
him transfer what he dictates to electronic documents. The voice recognition software is
processor intensive, which is why he bought the new computer. Travis frequently has to get on
the Internet to do research on what he is working on. After about two months of working on his
new computer, he notices that it is not running nearly as fast as it used to. Travis uses antivirus
software, anti-spyware software, and always keeps the computer up-to-date with Microsoft
patches. After another month of working on the computer, Travis' computer is even more
noticeably slow. Every once in awhile, Travis also notices a window or two pop-up on his screen,
but they quickly disappear.He has seen these windows show up, even when he has not been on
the Internet. Travis is really worried about his computer because he spent a lot of money on it, and
he depends on it to work. Travis scans his computer with all kinds of software, and cannot find
anything out of the ordinary. Travis decides to go through Windows Explorer and check out the
file system, folder by folder, to see if there is anything he can find. He spends over four hours
pouring over the files and folders and cannot find anything.But, before he gives up, he notices
that his computer only has about 10 GB of free space available.Since his hard drive is a 200 GB
hard drive, Travis thinks this is very odd. Travis downloads Space Monger and adds up the sizes
for all the folders and files on his computer. According to his calculations, he should have around
150 GB of free space. What is mostly likely the cause of Travis' problems?
A.Travis's computer is infected with stealth kernel level rootkit
B.Travis's computer is infected with Stealth Trojan Virus
C.Travis's computer is infected with Self-Replication Worm that fills the hard disk space
D.Logic Bomb is triggered at random times creating hidden data consuming junk files
Correct:A

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.3 Which of the following built-in C/C++ functions you should avoid to prevent your program from
buffer overflow attacks?
A.strcpy()
B.strcat()
C.streadd()
D.strsock()
Correct:A B C

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.4 What file system vulnerability does the following command take advantage of? type
c:\anyfile.exe > c:\winnt\system32\calc.exe:anyfile.exe
A.HFS
B.ADS
C.NTFS
D.Backdoor access
Correct:B

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.5 Clive is conducting a pen-test and has just port scanned a system on the network. He has
identified the operating system as Linux and been able to elicit responses from ports 23, 25 and
53. He infers port 23 as running Telnet service, port 25 as running SMTP service and port 53 as
running DNS service. The client confirms these findings and attests to the current availability of
the services. When he tries to telnet to port 23 or 25, he gets a blank screen in response. On
typing other commands, he sees only blank spaces or underscores symbols on the screen. What
are you most likely to infer from this?
A.The services are protected by TCP wrappers
B.There is a honeypot running on the scanned machine
C.An attacker has replaced the services with trojaned ones
D.This indicates that the telnet and SMTP server have crashed
Correct:A

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.6 Eric notices repeated probes to port 1080. He learns that the protocol being used is designed to
allow a host outside of a firewall to connect transparently and securely through the firewall. He
wonders if his firewall has been breached. What would be your inference?
A.Eric's network has been penetrated by a firewall breach
B.The attacker is using the ICMP protocol to have a covert channel
C.Eric has a Wingate package providing FTP redirection on his network
D.Somebody is using SOCKS on the network to communicate through the firewall
Correct:D

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.7 Which programming language is NOT vulnerable to buffer overflow attacks?
A.Java
B.ActiveX
C.C++
D.Assembly Language
Correct:A

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.8 Maurine is working as a security consultant for Hinklemeir Associates.She has asked the
Systems Administrator to create a group policy that would not allow null sessions on the network.
The Systems Administrator is fresh out of college and has never heard of null sessions and does
not know what they are used for. Maurine is trying to explain to the Systems Administrator that
hackers will try to create a null session when footprinting the network. Why would an attacker try
to create a null session with a computer on a network?
A.Enumerate users and shares
B.Install a backdoor for later attacks
C.Escalate his/her privileges on the target server
D.To create a user with administrative privileges for later use
Correct:A

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.9 A client has approached you with a penetration test requirement. They are concerned with the
possibility of external threat, and have invested considerable resources in protecting their
Internet exposure. However, their main concern is the possibility of an employee elevating his/her
privileges and gaining access to information outside of their department. What kind of penetration
test would you recommend that would best address the client's concern?
A.A Grey Hat test
B.A Grey Box test
C.A Black Hat test
D.A White Hat test
E.A Black Box test
F.A White Box test
Correct:B

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.10 A program that defends against a port scanner will attempt to:
A.Sends back bogus data to the port scanner
B.Log a violation and recommend use of security-auditing tools
C.Limit access by the scanning system to publicly available ports only
D.Update a firewall rule in real time to prevent the port scan from being completed
Correct:D

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.11 Lori has just been tasked by her supervisor toonduct vulnerability scan on the corporate
network.She has been instructed to perform a very thorough test of the network to ensure that
there are no security holes on any of the machines.Lori's company does not own any commercial
scanning products, so she decides to download a free one off the Internet.Lori has never done a
vulnerability scan before, so she is unsure of some of the settings available in the software she
downloaded.One of the options is to choose which ports that can be scanned.Lori wants to do
exactly what her boss has told her, but she does not know what ports should be scanned. If Lori is
supposed to scan all known TCP ports, how many ports should she select in the software?
A.65536
B.1024
C.1025
D.Lori should not scan TCP ports, only UDP ports
Correct:A

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.12 What type of port scan is shown below? Scan directed at open port: ClientServer
192.5.2.92:4079 ---------FIN--------->192.5.2.110:23 192.5.2.92:4079 <----NO
RESPONSE------192.5.2.110:23 Scan directed at closed port: ClientServer 192.5.2.92:4079
---------FIN--------->192.5.2.110:23 192.5.2.92:4079<-----RST/ACK----------192.5.2.110:23
A.Idle Scan
B.FIN Scan
C.XMAS Scan
D.Windows Scan
Correct:B

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.13 Bob is acknowledged as a hacker of repute and is popular among visitors of 'underground' sites.
Bob is willing to share his knowledge to those who are willing to learn, and many have expressed
their interest in learning from him. However, this knowledge has risks associated with it, as the
same knowledge can be used for malevolent attacks as well. In this context, what would be the
most effective method to bridge the knowledge gap between the "black" hats or crackers and the
"white" hats or computer security professionals?
A.Hire more computer security monitoring personnel to monitor computer systems and networks
B.Educate everyone with books, articles and training on risk analysis, vulnerabilities and safeguards
C.Train more national guard and reservist in the art of computer security to help out in times of emergency
or crises
D.Make obtaining either a computer security certification or accreditation easier to achieve so more
individuals feel that they are a part of something larger than life
Correct:B

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.14 Mark works as a contractor for the Department of Defense and is in charge of network security.
He has spent the last month securing access to his network from all possible entry points. He has
segmented his network into several subnets and has installed firewalls all over the network. He
has placed very stringent rules on all the firewalls, blocking everything in and out except ports
that must be used. He does need to have port 80 open since his company hosts a website that
must be accessed from the Internet. Mark is fairly confident of his perimeter defenses, but is still
worried about programs like Hping2 that can get into a network through covert channels. How
should mark protect his network from an attacker using Hping2 to scan his internal network?
A.Block ICMP type 13 messages
B.Block all incoming traffic on port 53
C.Block all outgoing traffic on port 53
D.Use stateful inspection on the firewalls
Correct:A

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.15 What is the purpose of firewalking?
A.It's a technique used to map routers on a network link
B.It's a technique used to discover Wireless network on foot
C.It's a technique used to discover interface in promiscuous mode
D.It's a technique used to discover what rules are configured on a gateway
Correct:D

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.16 Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been
able to spawn an interactive shell and plans to deface the main web page. He first attempts to use
the "Echo" command to simply overwrite index.html and remains unsuccessful. He then attempts
to delete the page and achieves no progress. Finally, he tries to overwrite it with another page in
which also he remains unsuccessful. What is the probable cause of Bill's problem?
A.The system is a honeypot
B.The HTML file has permissions of read only
C.You cannot use a buffer overflow to deface a web page
D.There is a problem with the shell and he needs to run the attack again
Correct:B

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.17 Why is Social Engineering considered attractive by hackers and commonly done by experts in
the field?
A.It is not considered illegal
B.It is done by well-known hackers
C.It is easy and extremely effective to gain information
D.It does not require a computer in order to commit a crime
Correct:C

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.18 Samuel is the network administrator of DataX Communications, Inc. He is trying to configure his
firewall to block password brute force attempts on his network. He enables blocking the intruder's
IP address for a period of 24 hours time after more than three unsuccessful attempts. He is
confident that this rule will secure his network from hackers on the Internet. But he still receives
hundreds of thousands brute-force attempts generated from various IP addresses around the
world. After some investigation he realizes that the intruders are using a proxy somewhere else
on the Internet which has been scripted to enable the random usage of various proxies on each
request so as not to get caught by the firewall rule. Later he adds another rule to his firewall and
enables small sleep on the password attempt so that if the password is incorrect, it would take 45
seconds to return to the user to begin another attempt. Since an intruder may use multiple
machines to brute force the password, he also throttles the number of connections that will be
prepared to accept from a particular IP address. This action will slow the intruder's attempts.
Samuel wants to completely block hackers brute force attempts on his network. What are the
alternatives to defending against possible brute-force password attacks on his site?
A.Enforce a password policy and use account lockouts after three wrong logon attempts even though this
might lock out legit users
B.Enable the IDS to monitor the intrusion attempts and alert you by e-mail about the IP address of the
intruder so that you can block them at the Firewall manually
C.Enforce complex password policy on your network so that passwords are more difficult to brute force
D.You cannot completely block the intruders attempt if they constantly switch proxies
Correct:D

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.19 Samantha has been actively scanning the client network for which she is doing a vulnerability
assessment test. While doing a port scan she notices ports open in the 135 to 139 range. What
protocol is most likely to be listening on those ports?
A.FTP
B.SMB
C.Finger
D.Samba
Correct:B

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

NO.20 After a client sends a connection request (SYN) packet to the server, the server will respond
(SYN-ACK) with a sequence number of its choosing, which then must be acknowledged (ACK) by
the client. This sequence number is predictable; the attack connects to a service first with its own
IP address, records the sequence number chosen, and then opens a second connection from a
forged IP address. The attack doesn't see the SYN-ACK (or any other packet) from the server, but
can guess the correct responses. If the source IP address is used for authentication, then the
attacker can use the one-sided communication to break into the server. What attacks can you
successfully launch against a server using the above technique?
A.Session Hijacking attacks
B.Denial of Service attacks
C.Web page defacement attacks
D.IP spoofing attacks
Correct:A

EC-COUNCIL original questions   EC0-350   EC0-350   EC0-350

ITCertKing offer the latest 1z0-465 exam material and high-quality HP2-H29 pdf questions & answers. Our 000-455 VCE testing engine and C_TERP10_65 study guide can help you pass the real exam. High-quality 000-614 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.itcertking.com/EC0-350_exam.html

EC-COUNCIL EC1-350 the latest exam practice questions and answers

IT industry is growing very rapidly in the past few years, so a lot of people start to learn IT knowledge, so that keep them for future success efforts. EC-COUNCIL EC1-350 certification exam is essential certification of the IT industry, many people frustrated by this certification. Today, I will tell you a good way to pass the exam which is to choose ITCertKing EC-COUNCIL EC1-350 exam training materials. It can help you to pass the exam, and we can guarantee 100% pass rate. If you do not pass, we will guarantee to refund the full purchase cost. So you will have no losses.

Now IT industry is more and more competitive. Passing EC-COUNCIL EC1-350 exam certification can effectively help you entrench yourself and enhance your status in this competitive IT area. In our ITCertKing you can get the related EC-COUNCIL EC1-350 exam certification training tools. Our ITCertKing IT experts team will timely provide you the accurate and detailed training materials about EC-COUNCIL certification EC1-350 exam. Through the learning materials and exam practice questions and answers provided by ITCertKing, we can ensure you have a successful challenge when you are the first time to participate in the EC-COUNCIL certification EC1-350 exam. Above all, using ITCertKing you do not spend a lot of time and effort to prepare for the exam.

In this competitive society, being good at something is able to take up a large advantage, especially in the IT industry. Gaining some IT authentication certificate is very useful. EC-COUNCIL EC1-350 is a certification exam to test the IT professional knowledge level and has a Pivotal position in the IT industry. While EC-COUNCIL EC1-350 exam is very difficult to pass, so in order to pass the EC-COUNCIL certification EC1-350 exam a lot of people spend a lot of time and effort to learn the related knowledge, but in the end most of them do not succeed. Therefore ITCertKing is to analyze the reasons for their failure. The conclusion is that they do not take a pertinent training course. Now ITCertKing experts have developed a pertinent training program for EC-COUNCIL certification EC1-350 exam, which can help you spend a small amount of time and money and 100% pass the exam at the same time.

If you buy ITCertKing EC-COUNCIL EC1-350 exam training materials, you will solve the problem of your test preparation. You will get the training materials which have the highest quality. Buy our products today, and you will open a new door, and you will get a better future. We can make you pay a minimum of effort to get the greatest success.

If you want to sail through the difficult EC-COUNCIL EC1-350 exam, it would never do to give up using exam-related materials when you prepare for your exam. If you would like to find the best certification training dumps that suit you, ITCertKing is the best place to go. ITCertKing is a well known and has many excellent exam dumps that relate to IT certification test. Moreover all exam dumps give free demo download. If you want to know whether ITCertKing practice test dumps suit you, you can download free demo to experience it in advance.

Exam Code: EC1-350
Exam Name: EC-COUNCIL (Ethical Hacking and Countermeasures V7)
One year free update, No help, Full refund!
Total Q&A: 514 Questions and Answers
Last Update: 2014-01-31

EC1-350 Free Demo Download: http://www.itcertking.com/EC1-350_exam.html

NO.1 This type of Port Scanning technique splits TCP header into several packets so that the packet filters
are not able to detect what the packets intends to do.
A. UDP Scanning
B. IP Fragment Scanning
C. Inverse TCP flag scanning
D. ACK flag scanning
Answer: B

EC-COUNCIL certification   EC1-350 study guide   EC1-350   EC1-350

NO.2 Which of the following countermeasure can specifically protect against both the MAC Flood and MAC
Spoofing attacks?
A. Configure Port Security on the switch
B. Configure Port Recon on the switch
C. Configure Switch Mapping
D. Configure Multiple Recognition on the switch
Answer: A

EC-COUNCIL   EC1-350   EC1-350 exam prep   EC1-350   EC1-350 test questions

NO.3 This IDS defeating technique works by splitting a datagram (or packet) into multiple fragments and the
IDS will not spot the true nature of the fully assembled datagram. The datagram is not reassembled until it
reaches its final destination. It would be a processor-intensive task for IDS to reassemble all fragments
itself, and on a busy system the packet will slip through the IDS onto the network. What is this technique
called?
A. IP Routing or Packet Dropping
B. IDS Spoofing or Session Assembly
C. IP Fragmentation or Session Splicing
D. IP Splicing or Packet Reassembly
Answer: C

EC-COUNCIL braindump   EC1-350   EC1-350 dumps

NO.4 Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines to
create or alter SQL commands to gain access to private data or execute commands in the database.
What technique does Jimmy use to compromise a database.?
A. Jimmy can submit user input that executes an operating system command to compromise a target
system
B. Jimmy can gain control of system to flood the target system with requests, preventing legitimate users
from gaining access
C. Jimmy can utilize an incorrect configuration that leads to access with higher-than expected privilege of
the database
D. Jimmy can utilize this particular database threat that is an SQL injection technique to penetrate a target
system
Answer: D

EC-COUNCIL   EC1-350 exam prep   EC1-350   EC1-350 dumps

NO.5 Dan is conducting penetration testing and has found a vulnerability in a Web Application which gave
him the sessionID token via a cross site scripting vulnerability. Dan wants to replay this token. However,
the session ID manager (on the server) checks the originating IP address as well. Dan decides to spoof
his IP address in order to replay the sessionID. Why do you think Dan might not be able to get an
interactive session?
A. Dan cannot spoof his IP address over TCP network
B. The scenario is incorrect as Dan can spoof his IP and get responses
C. The server will send replies back to the spoofed IP address
D. Dan can establish an interactive session only if he uses a NAT
Answer: C

EC-COUNCIL exam simulations   EC1-350   EC1-350   EC1-350 exam simulations   EC1-350 answers real questions   EC1-350 dumps

NO.6 Lori is a Certified Ethical Hacker as well as a Certified Hacking Forensics Investigator working as an IT
security consultant. Lori has been hired on by Kiley Innovators, a large marketing firm that recently
underwent a string of thefts and corporate espionage incidents. Lori is told that a rival marketing company
came out with an exact duplicate product right before Kiley Innovators was about to release it. The
executive team believes that an employee is leaking information to the rival company. Lori questions all
employees, reviews server logs, and firewall logs; after which she finds nothing. Lori is then given
permission to search through the corporate email system. She searches by email being sent to and sent
from the rival marketing company.
She finds one employee that appears to be sending very large email to this other marketing company,
even though they should have no reason to be communicating with them. Lori tracks down the actual
emails sent and upon opening them, only finds picture files attached to them.
These files seem perfectly harmless, usually containing some kind of joke. Lori decides to use some
special software to further examine the pictures and finds that each one had hidden text that was stored in
each picture.
What technique was used by the Kiley Innovators employee to send information to the rival marketing
company?
A. The Kiley Innovators employee used cryptography to hide the information in the emails sent
B. The method used by the employee to hide the information was logical watermarking
C. The employee used steganography to hide information in the picture attachments
D. By using the pictures to hide information, the employee utilized picture fuzzing
Answer: C

EC-COUNCIL   EC1-350   EC1-350   EC1-350 original questions   EC1-350 pdf   EC1-350

NO.7 Stephanie works as senior security analyst for a manufacturing company in Detroit. Stephanie
manages network security throughout the organization. Her colleague Jason told her in confidence that
he was able to see confidential corporate information posted on the external website
http://www.jeansclothesman.com. He tries random URLs on the company's website and finds confidential
information leaked over the web. Jason says this happened about a month ago. Stephanie visits the said
URLs, but she finds nothing. She is very concerned about this, since someone should be held
accountable if there was sensitive information posted on the website.
Where can Stephanie go to see past versions and pages of a website?
A. She should go to the web page Samspade.org to see web pages that might no longer be on the
website
B. If Stephanie navigates to Search.com; she will see old versions of the company website
C. Stephanie can go to Archive.org to see past versions of the company website
D. AddressPast.com would have any web pages that are no longer hosted on the company's website
Answer: C

EC-COUNCIL   EC1-350 original questions   EC1-350   EC1-350   EC1-350

NO.8 The following script shows a simple SQL injection. The script builds an SQL query by
concatenating hard-coded strings together with a string entered by the user:
The user is prompted to enter the name of a city on a Web form. If she enters Chicago, the query
assembled by the script looks similar to the following:
SELECT * FROM OrdersTable WHERE ShipCity = 'Chicago'
How will you delete the OrdersTable from the database using SQL Injection?
A. Chicago'; drop table OrdersTable -B.
Delete table'blah'; OrdersTable -C.
EXEC; SELECT * OrdersTable > DROP -D.
cmdshell'; 'del c:\sql\mydb\OrdersTable' //
Answer: A

EC-COUNCIL   EC1-350   EC1-350 test questions   EC1-350 study guide   EC1-350 study guide

NO.9 Jack Hacker wants to break into Brown Co.'s computers and obtain their secret double fudge cookie
recipe. Jack calls Jane, an accountant at Brown Co., pretending to be an administrator from Brown Co.
Jack tells Jane that there has been a problem with some accounts and asks her to verify her password
with him ''just to double check our records.'' Jane does not suspect anything amiss, and parts with her
password. Jack can now access Brown Co.'s computers with a valid user name and password, to steal
the cookie recipe. What kind of attack is being illustrated here?
A. Reverse Psychology
B. Reverse Engineering
C. Social Engineering
D. Spoofing Identity
E. Faking Identity
Answer: C

EC-COUNCIL braindump   EC1-350   EC1-350   EC1-350   EC1-350 pdf

NO.10 What type of attack is shown in the following diagram?
A. Man-in-the-Middle (MiTM) Attack
B. Session Hijacking Attack
C. SSL Spoofing Attack
D. Identity Stealing Attack
Answer: A

EC-COUNCIL   EC1-350 test answers   EC1-350   EC1-350 dumps   EC1-350

NO.11 Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in order
to find some information about the target they are attempting to penetrate. How would you call this type of
activity?
A. Dumpster Diving
B. Scanning
C. CI Gathering
D. Garbage Scooping
Answer: A

EC-COUNCIL study guide   EC1-350 exam   EC1-350 exam dumps   EC1-350 exam

NO.12 How do you defend against DHCP Starvation attack?
A. Enable ARP-Block on the switch
B. Enable DHCP snooping on the switch
C. Configure DHCP-BLOCK to 1 on the switch
D. Install DHCP filters on the switch to block this attack
Answer: B

EC-COUNCIL   EC1-350 questions   EC1-350 exam   EC1-350

NO.13 You are the security administrator of Jaco Banking Systems located in Boston. You are setting up
e-banking website (http://www.ejacobank.com) authentication system. Instead of issuing banking
customer with a single password, you give them a printed list of 100 unique passwords. Each time the
customer needs to log into the e-banking system website, the customer enters the next password on the
list. If someone sees them type the password using shoulder surfing, MiTM or keyloggers, then no
damage is done because the password will not be accepted a second time.
Once the list of 100 passwords is almost finished, the system automatically sends out a new password list
by encrypted e-mail to the customer.
You are confident that this security implementation will protect the customer from password abuse.
Two months later, a group of hackers called "HackJihad" found a way to access the one-time password
list issued to customers of Jaco Banking Systems. The hackers set up a fake website
(http://www.e-jacobank.com) and used phishing attacks to direct ignorant customers to it. The fake
website asked users for their e-banking username and password, and the next unused entry from their
one-time password sheet. The hackers collected 200 customer's username/passwords this way. They
transferred money from the customer's bank account to various offshore accounts.
Your decision of password policy implementation has cost the bank with USD 925,000 to hackers.
You immediately shut down the e-banking website while figuring out the next best security solution What
effective security solution will you recommend in this case?
A. Implement Biometrics based password authentication system. Record the customers face image to the
authentication database
B. Configure your firewall to block logon attempts of more than three wrong tries
C. Enable a complex password policy of 20 characters and ask the user to change the password
immediately after they logon and do not store password histories
D. Implement RSA SecureID based authentication system
Answer: D

EC-COUNCIL   EC1-350   EC1-350   EC1-350 braindump   EC1-350

NO.14 Vulnerability scanners are automated tools that are used to identify vulnerabilities and
misconfigurations of hosts. They also provide information regarding mitigating discovered
vulnerabilities.
Which of the following statements is incorrect?
A. Vulnerability scanners attempt to identify vulnerabilities in the hosts scanned.
B. Vulnerability scanners can help identify out-of-date software versions, missing patches, or system
upgrades
C. They can validate compliance with or deviations from the organization's security policy
D. Vulnerability scanners can identify weakness and automatically fix and patch the vulnerabilities without
user intervention
Answer: D

EC-COUNCIL test answers   EC1-350   EC1-350   EC1-350 certification

NO.15 TCP SYN Flood attack uses the three-way handshake mechanism.
1. An attacker at system A sends a SYN packet to victim at system B.
2. System B sends a SYN/ACK packet to victim A.
3. As a normal three-way handshake mechanism system A should send an ACK packet to system B,
however, system A does not send an ACK packet to system B. In this case client B is waiting for an ACK
packet from client A.
This status of client B is called _________________
A. "half-closed"
B. "half open"
C. "full-open"
D. "xmas-open"
Answer: B

EC-COUNCIL original questions   EC1-350 test answers   EC1-350 certification training

NO.16 Anonymizer sites access the Internet on your behalf, protecting your personal information from
disclosure. An anonymizer protects all of your computer's identifying information while it surfs for you,
enabling you to remain at least one step removed from the sites you visit.
You can visit Web sites without allowing anyone to gather information on sites visited by you. Services
that provide anonymity disable pop-up windows and cookies, and conceal visitor's IP address.
These services typically use a proxy server to process each HTTP request. When the user requests a
Web page by clicking a hyperlink or typing a URL into their browser, the service retrieves and displays the
information using its own server. The remote server (where the requested Web page resides) receives
information on the anonymous Web surfing service in place of your information.
In which situations would you want to use anonymizer? (Select 3 answers)
A. Increase your Web browsing bandwidth speed by using Anonymizer
B. To protect your privacy and Identity on the Internet
C. To bypass blocking applications that would prevent access to Web sites or parts of sites that you want
to visit.
D. Post negative entries in blogs without revealing your IP identity
Answer: B,C,D

EC-COUNCIL   EC1-350 pdf   EC1-350   EC1-350 exam

NO.17 You run nmap port Scan on 10.0.0.5 and attempt to gain banner/server information from services
running on ports 21, 110 and 123.
Here is the output of your scan results:
Which of the following nmap command did you run?
A. nmap -A -sV -p21,110,123 10.0.0.5
B. nmap -F -sV -p21,110,123 10.0.0.5
C. nmap -O -sV -p21,110,123 10.0.0.5
D. nmap -T -sV -p21,110,123 10.0.0.5
Answer: C

EC-COUNCIL exam dumps   EC1-350 study guide   EC1-350   EC1-350 certification

NO.18 Jason works in the sales and marketing department for a very large advertising agency located in
Atlanta. Jason is working on a very important marketing campaign for his company's largest client. Before
the project could be completed and implemented, a competing advertising company comes out with the
exact same marketing materials and advertising, thus rendering all the work done for Jason's client
unusable. Jason is questioned about this and says he has no idea how all the material ended up in the
hands of a competitor.
Without any proof, Jason's company cannot do anything except move on. After working on
another high profile client for about a month, all the marketing and sales material again ends up in the
hands of another competitor and is released to the public before Jason's company can finish the project.
Once again, Jason says that he had nothing to do with it and does not know how this could have
happened. Jason is given leave with pay until they can figure out what is going on.
Jason's supervisor decides to go through his email and finds a number of emails that were sent to the
competitors that ended up with the marketing material. The only items in the emails were attached jpg
files, but nothing else. Jason's supervisor opens the picture files, but cannot find anything out of the
ordinary with them.
What technique has Jason most likely used?
A. Stealth Rootkit Technique
B. ADS Streams Technique
C. Snow Hiding Technique
D. Image Steganography Technique
Answer: D

EC-COUNCIL exam   EC1-350 questions   EC1-350   EC1-350 certification training   EC1-350 demo

NO.19 What are the limitations of Vulnerability scanners? (Select 2 answers)
A. There are often better at detecting well-known vulnerabilities than more esoteric ones
B. The scanning speed of their scanners are extremely high
C. It is impossible for any, one scanning product to incorporate all known vulnerabilities in a timely manner
D. The more vulnerabilities detected, the more tests required
E. They are highly expensive and require per host scan license
Answer: A,C

EC-COUNCIL demo   EC1-350 test answers   EC1-350

NO.20 What type of Virus is shown here?
A. Cavity Virus
B. Macro Virus
C. Boot Sector Virus
D. Metamorphic Virus
E. Sparse Infector Virus
Answer: E

EC-COUNCIL   EC1-350   EC1-350 dumps

NO.21 If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of
business, they just have to find a job opening, prepare someone to pass the interview, have that person
hired, and they will be in the organization.
How would you prevent such type of attacks?
A. It is impossible to block these attacks
B. Hire the people through third-party job agencies who will vet them for you
C. Conduct thorough background checks before you engage them
D. Investigate their social networking profiles
Answer: C

EC-COUNCIL original questions   EC1-350   EC1-350 dumps

NO.22 What type of session hijacking attack is shown in the exhibit?
A. Cross-site scripting Attack
B. SQL Injection Attack
C. Token sniffing Attack
D. Session Fixation Attack
Answer: D

EC-COUNCIL   EC1-350 certification   EC1-350   EC1-350   EC1-350 answers real questions

NO.23 SYN Flood is a DOS attack in which an attacker deliberately violates the three-way handshake and
opens a large number of half-open TCP connections. The signature of attack for SYN Flood contains:
A. The source and destination address having the same value
B. A large number of SYN packets appearing on a network without the corresponding reply packets
C. The source and destination port numbers having the same value
D. A large number of SYN packets appearing on a network with the corresponding reply packets
Answer: B

EC-COUNCIL exam prep   EC1-350   EC1-350

NO.24 How do you defend against Privilege Escalation?
A. Use encryption to protect sensitive data
B. Restrict the interactive logon privileges
C. Run services as unprivileged accounts
D. Allow security settings of IE to zero or Low
E. Run users and applications on the least privileges
Answer: A,B,C,E

EC-COUNCIL dumps   EC1-350   EC1-350 exam simulations   EC1-350

NO.25 How do you defend against ARP Spoofing?
A. Use ARPWALL system and block ARP spoofing attacks
B. Tune IDS Sensors to look for large amount of ARP traffic on local subnets
C. Use private VLANS
D. Place static ARP entries on servers, workstation and routers
Answer: B,C,D

EC-COUNCIL   EC1-350   EC1-350 test questions   EC1-350

NO.26 More sophisticated IDSs look for common shellcode signatures. But even these systems can be
bypassed, by using polymorphic shellcode. This is a technique common among virus writers ?it basically
hides the true nature of the shellcode in different disguises.
How does a polymorphic shellcode work?
A. They encrypt the shellcode by XORing values over the shellcode, using loader code to decrypt the
shellcode, and then executing the decrypted shellcode
B. They convert the shellcode into Unicode, using loader to convert back to machine code then executing
them
C. They reverse the working instructions into opposite order by masking the IDS signatures
D. They compress shellcode into normal instructions, uncompress the shellcode using loader code and
then executing the shellcode
Answer: A

EC-COUNCIL demo   EC1-350   EC1-350 dumps

NO.27 What does ICMP (type 11, code 0) denote?
A. Source Quench
B. Destination Unreachable
C. Time Exceeded
D. Unknown Type
Answer: C

EC-COUNCIL test questions   EC1-350 exam simulations   EC1-350   EC1-350 original questions   EC1-350 certification training   EC1-350 certification training

NO.28 Which of the following type of scanning utilizes automated process of proactively identifying
vulnerabilities of the computing systems present on a network?
A. Port Scanning
B. Single Scanning
C. External Scanning
D. Vulnerability Scanning
Answer: D

EC-COUNCIL pdf   EC1-350   EC1-350   EC1-350

NO.29 How does traceroute map the route a packet travels from point A to point B?
A. Uses a TCP timestamp packet that will elicit a time exceeded in transit message
B. Manipulates the value of the time to live (TTL) within packet to elicit a time exceeded in transit
message
C. Uses a protocol that will be rejected by gateways on its way to the destination
D. Manipulates the flags within packets to force gateways into generating error messages
Answer: B

EC-COUNCIL   EC1-350   EC1-350 exam prep

NO.30 An attacker finds a web page for a target organization that supplies contact information for the
company. Using available details to make the message seem authentic, the attacker drafts e-mail to an
employee on the contact page that appears to come from an individual who might reasonably request
confidential information, such as a network administrator.
The email asks the employee to log into a bogus page that requests the employee's user name and
password or click on a link that will download spyware or other malicious programming.
Google's Gmail was hacked using this technique and attackers stole source code and sensitive data from
Google servers. This is highly sophisticated attack using zero-day exploit vectors, social engineering and
malware websites that focused on targeted individuals working for the company.
What is this deadly attack called?
A. Spear phishing attack
B. Trojan server attack
C. Javelin attack
D. Social networking attack
Answer: A

EC-COUNCIL   EC1-350 exam dumps   EC1-350

ITCertKing offer the latest CAT-380 exam material and high-quality 74-344 pdf questions & answers. Our HP2-B101 VCE testing engine and 200-120 study guide can help you pass the real exam. High-quality 1Z0-061 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.itcertking.com/EC1-350_exam.html

2014年1月18日星期六

EC-COUNCIL certification 312-76 exam test software

ITCertKing is a website specifically provide the certification exam information sources for IT professionals. Through many reflects from people who have purchase ITCertKing's products, ITCertKing is proved to be the best website to provide the source of information about certification exam. The product of ITCertKing is a very reliable training tool for you. The answers of the exam exercises provided by ITCertKing is very accurate. Our ITCertKing's senior experts are continuing to enhance the quality of our training materials.

EC-COUNCIL 312-76 is a certification exam to test IT professional knowledge. ITCertKing is a website which can help you quickly pass the EC-COUNCIL certification 312-76 exams. Before the exam, you use pertinence training and test exercises and answers that we provide, and in a short time you'll have a lot of harvest.

Through continuous development and growth of the IT industry in the past few years, 312-76 exam has become a milestone in the EC-COUNCIL exam, it can help you to become a IT professional. There are hundreds of online resources to provide the EC-COUNCIL 312-76 questions. Why do most people to choose ITCertKing? Because ITCertKing has a huge IT elite team, In order to ensure you accessibility through the EC-COUNCIL 312-76 certification exam, they focus on the study of EC-COUNCIL 312-76 exam. ITCertKing ensure that the first time you try to obtain certification of EC-COUNCIL 312-76 exam. ITCertKing will stand with you, with you through thick and thin.

ITCertKing is a very good website to provide a convenient service for the EC-COUNCIL certification 312-76 exam. ITCertKing's products can help people whose IT knowledge is not comprehensive pass the difficulty EC-COUNCIL certification 312-76 exam. If you add the EC-COUNCIL certification 312-76 exam product of ITCertKing to your cart, you will save a lot of time and effort. ITCertKing's product is developed by ITCertKing's experts' study of EC-COUNCIL certification 312-76 exam, and it is a high quality product.

Exam Code: 312-76
Exam Name: EC-COUNCIL (Disaster Recovery Professional Practice Test)
One year free update, No help, Full refund!
Total Q&A: 290 Questions and Answers
Last Update: 2014-01-18

If you still desperately cram knowledge and spend a lot of precious time and energy to prepare for passing EC-COUNCIL certification 312-76 exam, and at the same time do not know how to choose a more effective shortcut to pass EC-COUNCIL certification 312-76 exam. Now ITCertKing provide you a effective method to pass EC-COUNCIL certification 312-76 exam. It will play a multiplier effect to help you pass the exam.

ITCertKing is a specialized IT certification exam training website which provide you the targeted exercises and current exams. We focus on the popular EC-COUNCIL certification 312-76 exam and has studied out the latest training programs about EC-COUNCIL certification 312-76 exam, which can meet the needs of many people. EC-COUNCIL 312-76 certification is a reference of many well-known IT companies to hire IT employee. So this certification exam is very popular now. ITCertKing is also recognized and relied by many people. ITCertKing can help a lot of people achieve their dream. If you choose ITCertKing, but you do not successfully pass the examination, ITCertKing will give you a full refund.

Now, you should do need to get the exam question sets from year to year and reference materials that is related to EC-COUNCIL 312-76 certification exam. Busying at work, you must not have enough time to prepare for your exam. So, it is very necessary for you to choose a high efficient reference material. What's more important, you should select a tool that suits you, which is a problem that is related to whether you can pass your exam successfully. Therefore, try ITCertKing EC-COUNCIL 312-76 practice test dumps.

312-76 Free Demo Download: http://www.itcertking.com/312-76_exam.html

NO.1 Which of the following control measures are considered while creating a disaster recovery plan?
Each correct answer represents a part of the solution. Choose three.
A. Detective measures
B. Supportive measures
C. Corrective measures
D. Preventive measures
Answer: A,C,D

EC-COUNCIL study guide   312-76 exam   312-76   312-76

NO.2 IT Service Continuity Management (ITSCM) is used to support the overall Business Continuity
Management (BCM) in order to ensure that the required IT infrastructure and the IT service provision are
recovered within an agreed business time scales. Which of the following are the benefits of implementing
IT Service Continuity Management?
Each correct answer represents a complete solution. Choose all that apply.
A. It prioritizes the recovery of IT services by working with BCM and SLM.
B. It minimizes costs related with recovery plans using proper proactive planning and testing.
C. It confirms competence, impartiality, and performance capability of an organization that performs
audits.
D. It minimizes disruption in IT services when it follows a major interruption or disaster.
Answer: A,B,D

EC-COUNCIL   312-76 study guide   312-76

NO.3 You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the
network of your company. You develop a signature based on the characteristics of the detected virus.
Which of the following phases in the Incident handling process will utilize the signature to resolve this
incident?
A. Eradication
B. Identification
C. Containment
D. Recovery
Answer: A

EC-COUNCIL   312-76   312-76 pdf

NO.4 Availability Management deals with the day-to-day availability of services. Which of the following takes
over when a 'disaster' situation occurs?
A. Capacity Management
B. Service Level Management
C. Service Continuity Management
D. Service Reporting
Answer: C

EC-COUNCIL   312-76   312-76 exam   312-76

NO.5 Which of the following backup sites takes the longest recovery time?
A. Cold backup site
B. Hot backup site
C. Warm backup site
D. Mobile backup site
Answer: A

EC-COUNCIL   312-76   312-76

NO.6 Which of the following options is an intellectual property right to protect inventions?
A. Snooping
B. Patent
C. Copyright
D. Utility model
Answer: D

EC-COUNCIL   312-76 test questions   312-76   312-76 answers real questions   312-76 test answers   312-76 study guide

NO.7 Which of the following BCP teams is the first responder and deals with the immediate effects of the
disaster?
A. Emergency management team
B. Damage assessment team
C. Off-site storage team
D. Emergency action team
Answer: D

EC-COUNCIL   312-76   312-76 pdf   312-76 exam prep   312-76   312-76 certification training

NO.8 Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen months
and six months already passed. Management asks Mark that how often the project team is participating in
the risk reassessment of this project. What should Mark tell management if he is following the best
practices for risk management.?
A. At every status meeting of the project team, project risk management is an agenda item.
B. Project risk management happens at every milestone.
C. Project risk management has been concluded with the project planning.
D. Project risk management is scheduled for every month in the 18-month project.
Answer: A

EC-COUNCIL answers real questions   312-76   312-76 demo   312-76 questions

NO.9 Which of the following statements best describes the difference between the role of a data owner and
the role of a data custodian?
A. The custodian makes the initial information classification assignments and the operations manager
implements the scheme.
B. The custodian implements the information classification scheme after the initial assignment by the
operations manager.
C. The data custodian implements the information classification scheme after the initial assignment by the
data owner.
D. The data owner implements the information classification scheme after the initial assignment by the
custodian.
Answer: C

EC-COUNCIL braindump   312-76   312-76 dumps   312-76   312-76 test answers

NO.10 Which of the following statements are true about classless routing protocols?
Each correct answer represents a complete solution. Choose two.
A. The same subnet mask is used everywhere on the network.
B. They extend the IP addressing scheme.
C. IGRP is a classless routing protocol.
D. They support VLSM and discontiguous networks.
Answer: B,D

EC-COUNCIL   312-76 demo   312-76 braindump   312-76

NO.11 Which of the following are some of the parts of a project plan?
Each correct answer represents a complete solution. Choose all that apply.
A. Risk identification
B. Team members list
C. Risk analysis
D. Project schedule
Answer: A,B,C,D

EC-COUNCIL   312-76   312-76

NO.12 Which of the following levels of RAID provides security features that are availability, enhanced
performance, and fault tolerance?
A. RAID-10
B. RAID-5
C. RAID-0
D. RAID-1
Answer: A

EC-COUNCIL answers real questions   312-76 questions   312-76 pdf   312-76 exam dumps

NO.13 Which of the following tools in Helix Windows Live is used to reveal the database password of password
protected MDB files created using Microsoft Access or with Jet Database Engine?
A. Asterisk logger
B. FAU
C. Access Pass View
D. Galleta
Answer: C

EC-COUNCIL   312-76   312-76

NO.14 You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005
computer. The company asks you to implement a RAID system to provide fault tolerance to a database.
You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the
task?
A. RAID-5
B. RAID-0
C. RAID-1
D. RAID-10
Answer: C

EC-COUNCIL braindump   312-76   312-76 study guide

NO.15 You work as the project manager for Bluewell Inc. Your project has several risks that will affect several
stakeholder requirements. Which project management plan will define who will be available to share
information on the project risks?
A. Communications Management Plan
B. Resource Management Plan
C. Risk Management Plan
D. Stakeholder management strategy
Answer: A

EC-COUNCIL pdf   312-76   312-76 exam prep   312-76   312-76 practice test   312-76

NO.16 Which of the following response teams aims to foster cooperation and coordination in incident
prevention, to prompt rapid reaction to incidents, and to promote information sharing among members
and the community at large?
A. CERT
B. CSIRT
C. FedCIRC
D. FIRST
Answer: D

EC-COUNCIL   312-76   312-76   312-76   312-76

NO.17 Which of the following is the simulation of the disaster recovery plans?
A. Walk-through test
B. Full operational test
C. Paper test
D. Preparedness test
Answer: B

EC-COUNCIL   312-76 test answers   312-76   312-76   312-76 test questions

NO.18 Which of the following cryptographic system services assures the receiver that the received message
has not been altered?
A. Authentication
B. Confidentiality
C. Non-repudiation
D. Integrity
Answer: D

EC-COUNCIL   312-76 test questions   312-76   312-76 certification training

NO.19 Which of the following BCP teams is the first responder and deals with the immediate effects of the
disaster?
A. Emergency action team
B. Emergency-management team
C. Damage-assessment team
D. Off-site storage team
Answer: A

EC-COUNCIL   312-76   312-76 exam simulations   312-76 exam

NO.20 Which of the following statements about disaster recovery plan documentation are true?
Each correct answer represents a complete solution. Choose all that apply.
A. The documentation regarding a disaster recovery plan should be stored in backup tapes.
B. The documentation regarding a disaster recovery plan should be stored in floppy disks.
C. The disaster recovery plan documentation should be stored onsite only.
D. The disaster recovery plan documentation should be stored offsite only.
Answer: A,D

EC-COUNCIL   312-76   312-76 demo   312-76 practice test   312-76

NO.21 You are responsible for network and information security at a large hospital. It is a significant concern
that any change to any patient record can be easily traced back to the person who made that change.
What is this called?
A. Availability
B. Non repudiation
C. Confidentiality
D. Data Protection
Answer: B

EC-COUNCIL test questions   312-76   312-76 demo   312-76

NO.22 Which of the following is established during the Business Impact Analysis by the owner of a process in
accepted business continuity planning methodology?
A. Recovery Consistency Objective
B. Recovery Time Objective
C. Recovery Point Objective
D. Recovery Time Actual
Answer: B

EC-COUNCIL pdf   312-76   312-76 study guide

NO.23 Which of the following is the duration of time and a service level within which a business process must
be restored after a disaster in order to avoid unacceptable consequences associated with a break in
business continuity?
A. RTA
B. RPO
C. RCO
D. RTO
Answer: D

EC-COUNCIL   312-76   312-76 test answers

NO.24 Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The
specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of
the following techniques will he use to fulfill this requirement?
A. AES
B. DES
C. IDEA
D. PGP
Answer: B

EC-COUNCIL   312-76   312-76 questions   312-76

NO.25 Fill in the blank with the appropriate number:
RAID-________ is a combination of RAID-1 and RAID-0.
A. 10
Answer: A

EC-COUNCIL   312-76 study guide   312-76 exam prep   312-76 certification training   312-76

NO.26 Which of the following types of attacks occurs when an attacker successfully inserts an intermediary
software or program between two communicating hosts?
A. Password guessing attack
B. Dictionary attack
C. Man-in-the-middle attack
D. Denial-of-service attack
Answer: C

EC-COUNCIL   312-76   312-76 exam prep   312-76

NO.27 You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify
the risks that will need a more in-depth analysis. Which of the following activities will help you in this?
A. Quantitative analysis
B. Estimate activity duration
C. Risk identification
D. Qualitative analysis
Answer: D

EC-COUNCIL   312-76   312-76 test questions

NO.28 Della works as a security manager for SoftTech Inc. She is training some of the newly recruited
personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major
goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event
occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited
personnel in SoftTech Inc, what will be your answer for her question?
Each correct answer represents a part of the solution. Choose three.
A. Guarantee the reliability of standby systems through testing and simulation.
B. Protect an organization from major computer services failure.
C. Minimize the risk to the organization from delays in providing services.
D. Maximize the decision-making required by personnel during a disaster.
Answer: A,B,C

EC-COUNCIL   312-76 test questions   312-76   312-76

NO.29 Which of the following roles is responsible for the review and risk analysis of all the contracts on
regular basis?
A. The IT Service Continuity Manager
B. The Configuration Manager
C. The Supplier Manager
D. The Service Catalogue Manager
Answer: C

EC-COUNCIL test questions   312-76   312-76   312-76   312-76

NO.30 Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a
fixed period of time in exchange for the disclosure of an invention?
A. Snooping
B. Patent
C. Utility model
D. Copyright
Answer: B

EC-COUNCIL   312-76   312-76   312-76

ITCertKing offer the latest 000-156 exam material and high-quality 000-N34 pdf questions & answers. Our JN0-694 VCE testing engine and 00M-622 study guide can help you pass the real exam. High-quality 000-N55 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.itcertking.com/312-76_exam.html