최신 312-50v13 무료덤프 - ECCouncil Certified Ethical Hacker Exam (CEHv13)
Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days. Bob denies that he had ever sent a mail. What do you want to
""know"" to prove yourself that it was Bob who had send a mail?
""know"" to prove yourself that it was Bob who had send a mail?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following web vulnerabilities would an attacker be attempting to exploit if they delivered the following input?
<!DOCTYPE blah [ < IENTITY trustme SYSTEM "file:///etc/passwd" > ] >
<!DOCTYPE blah [ < IENTITY trustme SYSTEM "file:///etc/passwd" > ] >
정답: A
What type of virus is most likely to remain undetected by antivirus software?
정답: C
These hackers have limited or no training and know how to use only basic techniques or tools.
What kind of hackers are we talking about?
What kind of hackers are we talking about?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?
정답: B
What is the role of test automation in security testing?
정답: A
Which of the following tools are used for enumeration? (Choose three.)
정답: B,D,E
Which of the following tools can be used to perform a zone transfer?
정답: B,C,D,G
Windows LAN Manager (LM) hashes are known to be weak.
Which of the following are known weaknesses of LM? (Choose three.)
Which of the following are known weaknesses of LM? (Choose three.)
정답: B,C,D
What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
OpenSSL on Linux servers includes a command line tool for testing TLS. What is the name of the tool and the correct syntax to connect to a web server?
정답: D
Which access control mechanism allows for multiple systems to use a central authentication server (CAS) that permits users to authenticate once and gain access to multiple systems?
정답: B
Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?
정답: D
Which type of attack attempts to overflow the content-addressable memory (CAM) table in an Ethernet switch?
정답: A
Bob wants to ensure that Alice can check whether his message has been tampered with. He creates a checksum of the message and encrypts it using asymmetric cryptography. What key does Bob use to encrypt the checksum for accomplishing this goal?
정답: D
Which of the following is considered an exploit framework and has the ability to perform automated attacks on services, ports, applications and unpatched security flaws in a computer system?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company.
The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as?
The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)