최신 312-50v9 무료덤프 - EC-COUNCIL Certified Ethical Hacker v9
A new wireless client is configured to join a 802.11 network. Thisclient uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not responding to the association requests being sent by the wireless client.
What is a possible source of this problem?
What is a possible source of this problem?
정답: A
During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal Network.
What is this type of DNS configuration commonly called?
What is this type of DNS configuration commonly called?
정답: A
Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGI's?
정답: A
You just set up a security system in your network. In what kind of system would you find thefollowing string of characters used as a rule within its configuration?
alert tcp any any ->192.168.100.0/24 21 (msg: "FTP on the network!";)
alert tcp any any ->192.168.100.0/24 21 (msg: "FTP on the network!";)
정답: C
An attacker changes the profile information of a particular user on a target website (the victim). The attacker uses this string to update the victim's profile to a text file and then submit the data to the attacker's database.
<frame src=http://www/vulnweb.com/updataif.php Style="display:none"></iframe>
What is this type of attack (that can use either HTTP GET or HRRP POST) called?
<frame src=http://www/vulnweb.com/updataif.php Style="display:none"></iframe>
What is this type of attack (that can use either HTTP GET or HRRP POST) called?
정답: A
Your team has won a contract to infiltrate an organization. The company wants to have the attack be a realistic as possible; therefore, they did not provide any information besides the company name.
What should be thefirst step in security testing the client?
What should be thefirst step in security testing the client?
정답: D
You are attempting to man-in-the-middle a session. Which protocol will allow you to guess a sequence number?
정답: A
Which of the following is the successor of SSL?
정답: D
A company's security states that all web browsers must automatically delete their HTTP browser cookies upon terminating. What sort of security breach is this policy attempting to mitigate?
정답: B
Which of the followingtypes of firewalls ensures that the packets are part of the established session?
정답: C