Pass the ECCouncil Certified Ethical Hacker EC0-350 Questions and answers with CertsForce

Viewing page 14 out of 14 pages
Viewing questions 261-280 out of questions
Questions # 261:

Bob is going to perform an active session hijack against Brownies Inc. He has found a target that allows session oriented connections (Telnet) and performs the sequence prediction on the target operating system. He manages to find an active session due to the high level of traffic on the network. What is Bob supposed to do next?

Options:

A.

Take over the session


B.

Reverse sequence prediction


C.

Guess the sequence numbers


D.

Take one of the parties offline


Expert Solution
Questions # 262:

In which step Steganography fits in CEH System Hacking Cycle (SHC)

Options:

A.

Step 2: Crack the password


B.

Step 1: Enumerate users


C.

Step 3: Escalate privileges


D.

Step 4: Execute applications


E.

Step 5: Hide files


F.

Step 6: Cover your tracks


Expert Solution
Questions # 263:

How do you defend against MAC attacks on a switch?

Question # 263

Options:

A.

Disable SPAN port on the switch


B.

Enable SNMP Trap on the switch


C.

Configure IP security on the switch


D.

Enable Port Security on the switch


Expert Solution
Viewing page 14 out of 14 pages
Viewing questions 261-280 out of questions