최신 312-50v10 무료덤프 - EC-COUNCIL Certified Ethical Hacker Exam (CEH v10)
What is the purpose of DNS AAAA record?
정답: A
Which of the following represents the initial two commands that an IRC client sends to join an IRC network?
정답: D
When creating a security program, which approach would be used if senior management is supporting and enforcing the security policy?
정답: C
A large mobile telephony and data network operator has a data that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems. What is the best security policy concerning this setup?
정답: A
Bob is doing a password assessment for one of his clients. Bob suspects that security policies are not in place.
He also suspects that weak passwords are probably the norm throughout the company he is evaluating. Bob is familiar with password weaknesses and key loggers.
Which of the following options best represents the means that Bob can adopt to retrieve passwords from his clients hosts and servers?
He also suspects that weak passwords are probably the norm throughout the company he is evaluating. Bob is familiar with password weaknesses and key loggers.
Which of the following options best represents the means that Bob can adopt to retrieve passwords from his clients hosts and servers?
정답: C
When does the Payment Card Industry Data Security Standard (PCI-DSS) require organizations to perform external and internal penetration testing?
정답: B
A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.
Based on this information, what should be one of your key recommendations to the bank?
Based on this information, what should be one of your key recommendations to the bank?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following provides a security professional with most information about the system's security posture?
정답: C
What is the proper response for a NULL scan if the port is closed?
정답: A
A company has five different subnets: 192.168.1.0, 192.168.2.0, 192.168.3.0, 192.168.4.0 and 192.168.5.0.
How can NMAP be used to scan these adjacent Class C networks?
How can NMAP be used to scan these adjacent Class C networks?
정답: D
What does the option * indicate?
정답: C
A hacker is attempting to use nslookup to query Domain Name Service (DNS). The hacker uses the nslookup interactive mode for the search. Which command should the hacker type into the command shell to request the appropriate records?
정답: D
It has been reported to you that someone has caused an information spillage on their computer. You go to the computer, disconnect it from the network, remove the keyboard and mouse, and power it down. What step in incident handling did you just complete?
정답: C