312-50v8 無料問題集「EC-COUNCIL Certified Ethical Hacker v8」

Which of the following is a primary service of the U.S. Computer Security Incident Response Team (CSIRT)?

A newly discovered flaw in a software application would be considered which kind of security vulnerability?

What is the tool Firewalk used for?

解説: (JPNTest メンバーにのみ表示されます)
If the final set of security controls does not eliminate all risk in a system, what could be done next?

Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?

Which cipher encrypts the plain text digit (bit or byte) one by one?

A hacker, who posed as a heating and air conditioning specialist, was able to install a sniffer program in a switched environment network. Which attack could the hacker use to sniff all of the packets in the network?

Which NMAP command combination would let a tester scan every TCP port from a class C network that is blocking ICMP with fingerprinting and service detection?

What are two things that are possible when scanning UDP ports? (Choose two.

正解:A、B 解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Tess King is making use of Digest Authentication for her Web site. Why is this considered to be more secure than Basic authentication?

解説: (JPNTest メンバーにのみ表示されます)
What makes web application vulnerabilities so aggravating? (Choose two)

正解:B、D 解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
This method is used to determine the Operating system and version running on a remote target system. What is it called?

Ivan is auditing a corporate website. Using Winhex, he alters a cookie as shown below.
Before Alteration: Cookie: lang=en-us; ADMIN=no; y=1 ; time=10:30GMT ;
After Alteration: Cookie: lang=en-us; ADMIN=yes; y=1 ; time=12:30GMT ;
What attack is being depicted here?

解説: (JPNTest メンバーにのみ表示されます)
Fake Anti-Virus, is one of the most frequently encountered and persistent threats on the web. This malware uses social engineering to lure users into infected websites with a technique called Search Engine Optimization.
Once the Fake AV is downloaded into the user's computer, the software will scare them into believing their system is infected with threats that do not really exist, and then push users to purchase services to clean up the non-existent threats.
The Fake AntiVirus will continue to send these annoying and intrusive alerts until a payment is made.

What is the risk of installing Fake AntiVirus?

Which of the following guidelines or standards is associated with the credit card industry?

SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long been used by hackers to gather great amount of information about remote hosts.
Which of the following features makes this possible? (Choose two)

正解:A、D 解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Switches maintain a CAM Table that maps individual MAC addresses on the network to physical ports on the switch.

In MAC flooding attack, a switch is fed with many Ethernet frames, each containing different source MAC addresses, by the attacker. Switches have a limited memory for mapping various MAC addresses to physical ports. What happens when the CAM table becomes full?

You are footprinting an organization and gathering competitive intelligence. You visit the company's website for contact information and telephone numbers but do not find them listed there. You know they had the entire staff directory listed on their website 12 months ago but now it is not there. Is there any way you can retrieve information from a website that is outdated?

解説: (JPNTest メンバーにのみ表示されます)
What results will the following command yielD. 'NMAP -sS -O -p 123-153 192.168.100.3'?

If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?

解説: (JPNTest メンバーにのみ表示されます)

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡