최신 312-50v9 무료덤프 - EC-COUNCIL Certified Ethical Hacker v9
You have several plain-text firewall logs that you must review to evaluate network traffic.
You know that in order to do this fast and efficiently you must user regular expressions.
Which command-line utility are you most likely to use?
You know that in order to do this fast and efficiently you must user regular expressions.
Which command-line utility are you most likely to use?
정답: D
The purpose of a ____________ is to deny network access to local area networks and other information assets by unauthorized wireless devices.
정답: A
During a security audit of IT processes, an IS auditor found that there was no documented security procedures. What should the IS auditor do?
정답: A
The security concept of "separation of duties" is most similar to the operation ofwhich type of security device?
정답: D
What is the most common method to exploit the "Bash Bug" or ShellShock" vulnerability?
정답: B
It is a vulnerability in GNU's bash shell, discovered in September of 2004, that gives attackers access to run remote commands on a vulnerable system. The malicious software can take control of an infected machine, launch denial-of service attacks to disrupt websites, and scan for other vulnerable devices (including routers).
Which of the following vulnerabilities is being described?
Which of the following vulnerabilities is being described?
정답: B
Which of the following is a low-tech way of gaining unauthorized access to systems?
정답: B
What is the process of logging, recording, and resolving events that take place in an organization?
정답: B
Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?
정답: D
Which of the following is one of the most effective ways to prevent Cross-site Scripting (XSS) flaws in software applications?
정답: A