최신 312-50v8 무료덤프 - EC-COUNCIL Certified Ethical Hacker v8
Keystroke logging is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.


How will you defend against hardware keyloggers when using public computers and Internet Kiosks? (Select 4 answers)


How will you defend against hardware keyloggers when using public computers and Internet Kiosks? (Select 4 answers)
정답: B,C,D,E
Which of the following tools are used for footprinting? (Choose four)A. Sam Spade
B. NSLookup
C. Traceroute
D. Neotrace
E. Cheops
B. NSLookup
C. Traceroute
D. Neotrace
E. Cheops
정답:
A,B,C,D
Explanation:
All of the tools listed are used for footprinting except Cheops.
Explanation:
All of the tools listed are used for footprinting except Cheops.
When referring to the Domain Name Service, what is denoted by a 'zone'?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Simon is security analyst writing signatures for a Snort node he placed internally that captures all mirrored traffic from his border firewall. From the following signature, what will Snort look for in the payload of the suspected packets?
alert tcp $EXTERNAL_NET any -> $HOME_NET 27374 (msG. "BACKDOOR SIG -SubSseven 22";flags: A+; content: "|0d0a5b52504c5d3030320d0a|"; reference:arachnids, 485;) alert
alert tcp $EXTERNAL_NET any -> $HOME_NET 27374 (msG. "BACKDOOR SIG -SubSseven 22";flags: A+; content: "|0d0a5b52504c5d3030320d0a|"; reference:arachnids, 485;) alert
정답: D
You have just installed a new Linux file server at your office. This server is going to be used by several individuals in the organization, and unauthorized personnel must not be able to modify any data.
What kind of program can you use to track changes to files on the server?
What kind of program can you use to track changes to files on the server?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Bob was frustrated with his competitor, Brownies Inc., and decided to launch an attack that would result in serious financial losses. He planned the attack carefully and carried out the attack at the appropriate moment.
Meanwhile, Trent, an administrator at Brownies Inc., realized that their main financial transaction server had been attacked. As a result of the attack, the server crashed and Trent needed to reboot the system, as no one was able to access the resources of the company. This process involves human interaction to fix it.
What kind of Denial of Service attack was best illustrated in the scenario above?
Meanwhile, Trent, an administrator at Brownies Inc., realized that their main financial transaction server had been attacked. As a result of the attack, the server crashed and Trent needed to reboot the system, as no one was able to access the resources of the company. This process involves human interaction to fix it.
What kind of Denial of Service attack was best illustrated in the scenario above?
정답: C
If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which solution can be used to emulate computer services, such as mail and ftp, and to capture information related to logins or actions?
정답: A
Which of the following levels of algorithms does Public Key Infrastructure (PKI) use?
정답: C
Jess the hacker runs L0phtCrack's built-in sniffer utility that grabs SMB password hashes and stores them for offline cracking. Once cracked, these passwords can provide easy access to whatever network resources the user account has access to. But Jess is not picking up hashes from the network. Why?
정답: B
Least privilege is a security concept that requires that a user is
정답: A
What is the name of the international standard that establishes a baseline level of confidence in the security functionality of IT products by providing a set of requirements for evaluation?
정답: D
You have successfully run a buffer overflow attack against a default IIS installation running
on a Windows 2000 Server. The server allows you to spawn a shell. In order to perform the actions you intend to do, you need elevated permission. You need to know what your current privileges are within the shell. Which of the following options would be your current privileges?
on a Windows 2000 Server. The server allows you to spawn a shell. In order to perform the actions you intend to do, you need elevated permission. You need to know what your current privileges are within the shell. Which of the following options would be your current privileges?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
The Open Web Application Security Project (OWASP) testing methodology addresses the
need to secure web applications by providing which one of the following services?
need to secure web applications by providing which one of the following services?
정답: A
When setting up a wireless network, an administrator enters a pre-shared key for security. Which of the following is true?
정답: D