312-50v10試験無料問題集「EC-COUNCIL Certified Ethical Hacker Exam (CEH v10) 認定」

The precaution of prohibiting employees from bringing personal computing devices into a facility is what type of security control?

Which of the following tools can be used for passive OS fingerprinting?

解説: (GoShiken メンバーにのみ表示されます)
What is the correct process for the TCP three-way handshake connection establishment and connection termination?

A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.
Which cryptography attack is the student attempting?

What attack is used to crack passwords by using a precomputed table of hashed passwords?

In an internal security audit, the white hat hacker gains control over a user account and attempts to acquire access to another account's confidential files and information. How can he achieve this?

Switches maintain a CAM Table that maps individual MAC addresses on the network to physical ports on the switch.

In MAC flooding attack, a switch is fed with many Ethernet frames, each containing different source MAC addresses, by the attacker. Switches have a limited memory for mapping various MAC addresses to physical ports. What happens when the CAM table becomes full?

Which NMAP feature can a tester implement or adjust while scanning for open ports to avoid detection by the network's IDS?

In the OSI model, where does PPTP encryption take place?

You are programming a buffer overflow exploit and you want to create a NOP sled of 200 bytes in the program exploit.c

What is the hexadecimal value of NOP instruction?

How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?

What is the approximate cost of replacement and recovery operation per year of a hard drive that has a value of $300 given that the technician who charges $10/hr would need 10 hours to restore OS and Software and needs further 4 hours to restore the database from the last backup to the new hard disk? Calculate the SLE, ARO, and ALE. Assume the EF = 1 (100%).

Why is a penetration test considered to be more thorough than vulnerability scan?

In IPv6 what is the major difference concerning application layer vulnerabilities compared to IPv4?

The network in ABC company is using the network address 192.168.1.64 with mask 255.255.255.192. In the network the servers are in the addresses 192.168.1.122, 192.168.1.123 and 192.168.1.124.
An attacker is trying to find those servers but he cannot see them in his scanning. The command he is using is:
nmap 192.168.1.64/28.
Why he cannot see the servers?

The practical realities facing organizations today make risk response strategies essential. Which of the following is NOT one of the five basic responses to risk?

On performing a risk assessment, you need to determine the potential impacts when some of the critical business process of the company interrupt its service. What is the name of the process by which you can determine those critical business?