312-50v10 無料問題集「EC-COUNCIL Certified Ethical Hacker Exam (CEH v10)」

A server has been infected by a certain type of Trojan. The hacker intended to utilize it to send and host junk mails. What type of Trojan did the hacker use?

What tool can crack Windows SMB passwords simply by listening to network traffic?

Which of the following is considered the best way to protect Personally Identifiable Information (PII) from Web application vulnerabilities?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following descriptions is true about a static NAT?

An ethical hacker for a large security research firm performs penetration tests, vulnerability tests, and risk assessments. A friend recently started a company and asks the hacker to perform a penetration test and vulnerability assessment of the new company as a favor. What should the hacker's next step be before starting work on this job?

How does the Address Resolution Protocol (ARP) work?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following is the best countermeasure to encrypting ransomwares?

Which of the following is a symmetric cryptographic standard?

An attacker has been successfully modifying the purchase price of items purchased on the company's web site.
The security administrators verify the web server and Oracle database have not been compromised directly.
They have also verified the Intrusion Detection System (IDS) logs and found no attacks that could have caused this. What is the mostly likely way the attacker has been able to modify the purchase price?

While reviewing the result of scanning run against a target network you come across the following:

Which among the following can be used to get this output?

Which of the following is a component of a risk assessment?

A recently hired network security associate at a local bank was given the responsibility to perform daily scans of the internal network to look for unauthorized devices. The employee decides to write a script that will scan the network for unauthorized devices every morning at 5:00 am.
Which of the following programming languages would most likely be used?

Which of the following tools is used by pen testers and analysts specifically to analyze links between data using link analysis and graphs?

During a wireless penetration test, a tester detects an access point using WPA2 encryption. Which of the following attacks should be used to obtain the key?

Within the context of Computer Security, which of the following statements describes Social Engineering best?

While performing ping scans into a target network you get a frantic call from the organization's security team.
They report that they are under a denial of service attack. When you stop your scan, the smurf attack event stops showing up on the organization's IDS monitor.
How can you modify your scan to prevent triggering this event in the IDS?

Which of the following examples best represents a logical or technical control?

The chance of a hard drive failure is known to be once every four years. The cost of a new hard drive is $500.
EF (Exposure Factor) is about 0.5. Calculate for the Annualized Loss Expectancy (ALE).

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡