최신 312-50v12 무료덤프 - ECCouncil Certified Ethical Hacker

Which command can be used to show the current TCP/IP connections?

정답: B
Suppose your company has just passed a security risk assessment exercise. The results display that the risk of the breach in the main company application is 50%. Security staff has taken some measures and implemented the necessary controls. After that, another security risk assessment was performed showing that risk has decreased to 10%. The risk threshold for the application is 20%. Which of the following risk decisions will be the best for the project in terms of its successful continuation with the most business profit?

정답: B
설명: (DumpTOP 회원만 볼 수 있음)
In order to tailor your tests during a web-application scan, you decide to determine which web-server version is hosting the application. On using the sV flag with Nmap. you obtain the following response:
80/tcp open http-proxy Apache Server 7.1.6
what Information-gathering technique does this best describe?

정답: B
설명: (DumpTOP 회원만 볼 수 있음)
What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?

정답: C
In Trojan terminology, what is a covert channel?

정답: D
in this attack, an adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying cryptographic handshake messages. When the victim reinstall the key, associated parameters such as the incremental transmit packet number and receive packet number are reset to their initial values. What is this attack called?

정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Gregory, a professional penetration tester working at Sys Security Ltd., is tasked with performing a security test of web applications used in the company. For this purpose, Gregory uses a tool to test for any security loopholes by hijacking a session between a client and server. This tool has a feature of intercepting proxy that can be used to inspect and modify the traffic between the browser and target application. This tool can also perform customized attacks and can be used to test the randomness of session tokens. Which of the following tools is used by Gregory in the above scenario?

정답: D
Under what conditions does a secondary name server request a zone transfer from a primary name server?

정답: D
A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed.
Which security policy must the security analyst check to see if dial-out modems are allowed?

정답: C
Harry. a professional hacker, targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection. What is the APT lifecycle phase that Harry is currently executing?

정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
What is the purpose of a demilitarized zone on a network?

정답: D
which of the following information security controls creates an appealing isolated environment for hackers to prevent them from compromising critical targets while simultaneously gathering information about the hacker?

정답: C
설명: (DumpTOP 회원만 볼 수 있음)
In your cybersecurity class, you are learning about common security risks associated with web servers. One topic that comes up is the risk posed by using default server settings. Why is using default settings ona web - server considered a security risk, and what would be the best initial step to mitigate this risk?

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
What would be the fastest way to perform content enumeration on a given web server by using the Gobuster tool?

정답: D
설명: (DumpTOP 회원만 볼 수 있음)
When discussing passwords, what is considered a brute force attack?

정답: B

우리와 연락하기

문의할 점이 있으시면 메일을 보내오세요. 12시간이내에 답장드리도록 하고 있습니다.

근무시간: ( UTC+9 ) 9:00-24:00
월요일~토요일

서포트: 바로 연락하기