최신 312-50v8 무료덤프 - EC-COUNCIL Certified Ethical Hacker v8

Which one of the following is defined as the process of distributing incorrect Internet Protocol (IP) addresses/names with the intent of diverting traffic?

정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Peter extracts the SID list from Windows 2008 Server machine using the hacking tool "SIDExtracter". Here is the output of the SIDs:

From the above list identify the user account with System Administrator privileges?

정답: E
A company has publicly hosted web applications and an internal Intranet protected by a firewall. Which technique will help protect against enumeration?

정답: C
LM authentication is not as strong as Windows NT authentication so you may want to disable its use, because an attacker eavesdropping on network traffic will attack the weaker protocol. A successful attack can compromise the user's password. How do you disable LM authentication in Windows XP?

정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Bill is a security analyst for his company.
All the switches used in the company's office are Cisco switches.
Bill wants to make sure all switches are safe from ARP poisoning.
How can Bill accomplish this?

정답: B
Cyber Criminals have long employed the tactic of masking their true identity. In IP spoofing,
an attacker gains unauthorized access to a computer or a network by making it appear that a malicious message has come from a trusted machine, by "spoofing" the IP address of that machine.
How would you detect IP spoofing?

정답: B
How would you prevent session hijacking attacks?

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
While conducting a penetration test, the tester determines that there is a firewall between the tester's machine and the target machine. The firewall is only monitoring TCP handshaking of packets at the session layer of the OSI model. Which type of firewall is the tester trying to traverse?

정답: B
What is a NULL scan?

정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which type of sniffing technique is generally referred as MiTM attack?

정답: C
설명: (DumpTOP 회원만 볼 수 있음)
When does the Payment Card Industry Data Security Standard (PCI-DSS) require organizations to perform external and internal penetration testing?

정답: B
What does black box testing mean?

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Sandra is the security administrator of XYZ.com. One day she notices that the XYZ.com Oracle database server has been compromised and customer information along with financial data has been stolen. The financial loss will be estimated in millions of dollars if the database gets into the hands of competitors. Sandra wants to report this crime to the law enforcement agencies immediately.
Which organization coordinates computer crime investigations throughout the United States?

정답: B
Derek has stumbled upon a wireless network and wants to assess its security. However, he does not find enough traffic for a good capture. He intends to use AirSnort on the captured traffic to crack the WEP key and does not know the IP address range or the AP. How can he generate traffic on the network so that he can capture enough packets to crack the WEP key?

정답: D
설명: (DumpTOP 회원만 볼 수 있음)
What happens when one experiences a ping of death?

정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Eve is spending her day scanning the library computers. She notices that Alice is using a computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate Alice machine. From the command prompt, she types the following command.
For /f "tokens=1 %%a in (hackfile.txt) do net use * \\10.1.2.3\c$ /user:"Administrator" %%a
What is Eve trying to do?

정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following conditions must be given to allow a tester to exploit a Cross-Site Request Forgery (CSRF) vulnerable web application?

정답: C

우리와 연락하기

문의할 점이 있으시면 메일을 보내오세요. 12시간이내에 답장드리도록 하고 있습니다.

근무시간: ( UTC+9 ) 9:00-24:00
월요일~토요일

서포트: 바로 연락하기