EC0-350 無料問題集「EC-COUNCIL Ethical hacking and countermeasures」

Some passwords are stored using specialized encryption algorithms known as hashes. Why is this an appropriate method?

A denial of Service (DoS) attack works on the following principle:

解説: (JPNTest メンバーにのみ表示されます)
Study the following exploit code taken from a Linux machine and answer the questions below:
echo "ingreslock stream tcp nowait root /bin/sh sh -I" > /tmp/x;
/usr/sbin/inetd -s /tmp/x;
sleep 10;
/bin/ rm -f /tmp/x AAAA...AAA
In the above exploit code, the command "/bin/sh sh -I" is given.
What is the purpose, and why is 'sh' shown twice?

解説: (JPNTest メンバーにのみ表示されます)
Eve is spending her day scanning the library computers. She notices that Alice is using a computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate Alice machine. From the command prompt, she types the following command.
For /f "tokens=1 %%a in (hackfile.txt) do net use * \\10.1.2.3\c$ /user:"Administrator" %%a What is Eve trying to do?

解説: (JPNTest メンバーにのみ表示されます)
What is the expected result of the following exploit?

解説: (JPNTest メンバーにのみ表示されます)
Attackers send an ACK probe packet with random sequence number, no response means port is filtered (Stateful firewall is present) and RST response means the port is not filtered. What type of Port Scanning is this?

This kind of attack will let you assume a users identity at a dynamically generated web page or site:

解説: (JPNTest メンバーにのみ表示されます)
Which of the following is a component of a risk assessment?

Which of the following programming languages is most vulnerable to buffer overflow attacks?

What is the command used to create a binary log file using tcpdump?

John has a proxy server on his network which caches and filters web access. He shuts down all unnecessary ports and services. Additionally, he has installed a firewall (Cisco PIX) that will not allow users to connect to any outbound ports. Jack, a network user has successfully connected to a remote server on port 80 using netcat. He could in turn drop a shell from the remote machine. Assuming an attacker wants to penetrate John's network, which of the following options is he likely to choose?

解説: (JPNTest メンバーにのみ表示されます)
During a wireless penetration test, a tester detects an access point using WPA2 encryption. Which of the following attacks should be used to obtain the key?

How can a rootkit bypass Windows 7 operating system's kernel mode, code signing policy?

Bill is attempting a series of SQL queries in order to map out the tables within the database that he is trying to exploit.
Choose the attack type from the choices given below.

解説: (JPNTest メンバーにのみ表示されます)
_________ ensures that the enforcement of organizational security policy does not rely on voluntary web application user compliance. It secures information by assigning sensitivity labels on information and comparing this to the level of security a user is operating at.

解説: (JPNTest メンバーにのみ表示されます)

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡