최신 312-50v10 무료덤프 - EC-COUNCIL Certified Ethical Hacker Exam (CEH v10)

Which type of scan is used on the eye to measure the layer of blood vessels?

정답: C
Which of the following techniques will identify if computer files have been changed?

정답: A
An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections.
When users accessed any page, the applet ran and exploited many machines.
Which one of the following tools the hacker probably used to inject HTML code?

정답: B

Identify the correct terminology that defines the above statement.

정답: B
It is an entity or event with the potential to adversely impact a system through unauthorized access, destruction, disclosure, denial of service or modification of data.
Which of the following terms best matches the definition?

정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is designed to verify and authenticate individuals taking part in a data exchange within an enterprise?

정답: C
A security administrator notices that the log file of the company's webserver contains suspicious entries:

Based on source code analysis, the analyst concludes that the login.php script is vulnerable to

정답: D
Your company was hired by a small healthcare provider to perform a technical assessment on the network.
What is the best approach for discovering vulnerabilities on a Windows-based computer?

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
What does the following command in netcat do?
nc -l -u -p55555 < /etc/passwd

정답: C
Which of these options is the most secure procedure for storing backup tapes?

정답: D
설명: (DumpTOP 회원만 볼 수 있음)
A server has been infected by a certain type of Trojan. The hacker intended to utilize it to send and host junk mails. What type of Trojan did the hacker use?

정답: D
Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, smallsized packets to the target computer, making it very difficult for an IDS to detect the attack signatures.
Which tool can be used to perform session splicing attacks?

정답: C
설명: (DumpTOP 회원만 볼 수 있음)
You are working as a Security Analyst in a company XYZ that owns the whole subnet range of 23.0.0.0/8 and
192.168.0.0/8.
While monitoring the data, you find a high number of outbound connections. You see that IP's owned by XYZ (Internal) and private IP's are communicating to a Single Public IP. Therefore, the Internal IP's are sending data to the Public IP.
After further analysis, you find out that this Public IP is a blacklisted IP, and the internal communicating devices are compromised.
What kind of attack does the above scenario depict?

정답: D
What does the -oX flag do in an Nmap scan?

정답: D
What hacking attack is challenge/response authentication used to prevent?

정답: B
Analyst is investigating proxy logs and found out that one of the internal user visited website storing suspicious Java scripts. After opening one of them, he noticed that it is very hard to understand the code and that all codes differ from the typical Java script. What is the name of this technique to hide the code and extend analysis time?

정답: C
Ricardo wants to send secret messages to a competitor company. To secure these messages, he uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'.
What technique is Ricardo using?

정답: B
설명: (DumpTOP 회원만 볼 수 있음)
OpenSSL on Linux servers includes a command line tool for testing TLS. What is the name of the tool and the correct syntax to connect to a web server?

정답: D

우리와 연락하기

문의할 점이 있으시면 메일을 보내오세요. 12시간이내에 답장드리도록 하고 있습니다.

근무시간: ( UTC+9 ) 9:00-24:00
월요일~토요일

서포트: 바로 연락하기