312-50v8 無料問題集「EC-COUNCIL Certified Ethical Hacker v8」

What techniques would you use to evade IDS during a Port Scan? (Select 4 answers)

正解:B、C、D、E 解答を投票する
You want to know whether a packet filter is in front of 192.168.1.10. Pings to 192.168.1.10 don't get answered. A basic nmap scan of 192.168.1.10 seems to hang without returning any information. What should you do next?

You perform the above traceroute and notice that hops 19 and 20 both show the same IP address.

This probably indicates what?

You are trying to package a RAT Trojan so that Anti-Virus software will not detect it. Which of the listed technique will NOT be effective in evading Anti-Virus scanner?

Low humidity in a data center can cause which of the following problems?

The following script shows a simple SQL injection. The script builds an SQL query by concatenating hard-coded strings together with a string entered by the user:

The user is prompted to enter the name of a city on a Web form. If she enters Chicago, the query assembled by the script looks similar to the following:
SELECT * FROM OrdersTable WHERE ShipCity = 'Chicago'
How will you delete the OrdersTable from the database using SQL Injection?

__________ is found in all versions of NTFS and is described as the ability to fork file data into existing files without affecting their functionality, size, or display to traditional file browsing utilities like dir or Windows Explorer

To what does "message repudiation" refer to what concept in the realm of email security?

解説: (JPNTest メンバーにのみ表示されます)
Bob has been hired to do a web application security test. Bob notices that the site is dynamic and must make use of a back end database. Bob wants to see if SQL Injection would be possible. What is the first character that Bob should use to attempt breaking valid SQL request?

One way to defeat a multi-level security solution is to leak data via

Which tool is used to automate SQL injections and exploit a database by forcing a given
web application to connect to another database controlled by a hacker?

解説: (JPNTest メンバーにのみ表示されます)
Which is the right sequence of packets sent during the initial TCP three way handshake?

解説: (JPNTest メンバーにのみ表示されます)
Which system consists of a publicly available set of databases that contain domain name registration contact information?

A Network Administrator was recently promoted to Chief Security Officer at a local university. One of employee's new responsibilities is to manage the implementation of an RFID card access system to a new server room on campus. The server room will house student enrollment information that is securely backed up to an off-site location.
During a meeting with an outside consultant, the Chief Security Officer explains that he is concerned that the existing security controls have not been designed properly. Currently, the Network Administrator is responsible for approving and issuing RFID card access to the server room, as well as reviewing the electronic access logs on a weekly basis.
Which of the following is an issue with the situation?

Smart cards use which protocol to transfer the certificate in a secure manner?

You may be able to identify the IP addresses and machine names for the firewall, and the names of internal mail servers by:

An NMAP scan of a server shows port 69 is open. What risk could this pose?

Which definition below best describes a covert channel?

Which of the following is a detective control?

Network Intrusion Detection systems can monitor traffic in real time on networks.
Which one of the following techniques can be very effective at avoiding proper detection?

解説: (JPNTest メンバーにのみ表示されます)

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡