최신 312-50v9 무료덤프 - EC-COUNCIL Certified Ethical Hacker v9
Which of the following security operations is used for determining the attack surface of an organization?
정답: D
During a security audit of IT processes, an IS auditor found that there was no documented security procedures. What should the IS auditor do?
정답: A
Which of the followingis the least-likely physical characteristic to be used in biometric control that supports a large company?
정답: D
Which regulationdefines security and privacy controls for Federal information systems and organizations?
정답: C
You are usingNMAP to resolve domain names into IP addresses for a ping sweep later. Which of the following commands looks for IP addresses?
정답: A
A company's security states that all web browsers must automatically delete their HTTP browser cookies upon terminating. What sort of security breach is this policy attempting to mitigate?
정답: B
You are performing information gathering for an important penetration test. You have found pdf, doc, and images in your objective. You decide to extract metadata from these files and analyze it.
What tool will help you with the task?
What tool will help you with the task?
정답: D
What does a firewall check to prevent particularports and applications from getting packets into an organizations?
정답: B
The chance of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate theSLE, ARO, and ALE. Assume the EF = 1 (100%).
What is the closest approximate cost of this replacement and recovery operation per year?
What is the closest approximate cost of this replacement and recovery operation per year?
정답: B
What is the benefit of performing an unannounced Penetration Testing?
정답: B