최신 312-50v9 무료덤프 - EC-COUNCIL Certified Ethical Hacker v9
Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGI's?
정답: A
Which of the following tools can be used for passiveOS fingerprinting?
정답: B
When you are getting informationabout a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file from the server. You can detect all these methods (GET, POST, HEAD, PUT, DELETE, TRACE) using NMAP script engine.
What nmap script will help you with this task?
What nmap script will help you with this task?
정답: D
Which of the following is an extremelycommon IDS evasion technique in the web world?
정답: D
Which of the following isthe greatest threat posed by backups?
정답: C
The "Gray box testing" methodology enforces what kind of restriction?
정답: C
Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?
정답: A
You are performing a penetration test. You achieved access via a bufferoverflow exploit and you proceed to find interesting data, such as files with usernames and passwords. You find a hidden folder that has the administrator's bank account password and login information for the administrator's bitcoin account.
What should you do?
What should you do?
정답: C
Which of the following parameters describe LM Hash:
I - The maximum password length is 14 characters.
II - There are no distinctions between uppercase and lowercase.
III - It's a simple algorithm, so 10,000,000 hashes can be generated per second.
I - The maximum password length is 14 characters.
II - There are no distinctions between uppercase and lowercase.
III - It's a simple algorithm, so 10,000,000 hashes can be generated per second.
정답: A
Jesse receives an email with an attachment labeled "Court_Notice_21206.zip". Inside the zip file is a file named "Court_Notice_21206.docx.exe" disguised as a word document.Upon execution, a windows appears stating, "This word document is corrupt." In the background, the file copies itself to Jesse APPDATA\local directory and begins to beacon to a C2 server to download additional malicious binaries. What type of malware has Jesse encountered?
정답: C