EC0-350試験無料問題集「EC-COUNCIL Ethical hacking and countermeasures 認定」

Within the context of Computer Security, which of the following statements describes Social Engineering best?

When using Wireshark to acquire packet capture on a network, which device would enable the capture of all traffic on the wire?

Who is an Ethical Hacker?

解説: (GoShiken メンバーにのみ表示されます)
An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?

Which element of Public Key Infrastructure (PKI) verifies the applicant?

StackGuard (as used by Immunix), ssp/ProPolice (as used by OpenBSD), and Microsoft's /GS option use _____ defense against buffer overflow attacks.

解説: (GoShiken メンバーにのみ表示されます)
If you come across a sheepdip machine at your client's site, what should you do?

解説: (GoShiken メンバーにのみ表示されます)
In this attack, a victim receives an e-mail claiming from PayPal stating that their account has been disabled and confirmation is required before activation. The attackers then scam to collect not one but two credit card numbers, ATM PIN number and other personal details.

Ignorant users usually fall prey to this scam. Which of the following statement is incorrect related to this attack?

You may be able to identify the IP addresses and machine names for the firewall, and the names of internal mail servers by:

What is Cygwin?

解説: (GoShiken メンバーにのみ表示されます)
On wireless networks, SSID is used to identify the network. Why are SSID not considered to be a good security mechanism to protect a wireless networks?

解説: (GoShiken メンバーにのみ表示されます)
In order to attack a wireless network, you put up an access point and override the signal of the real access point. As users send authentication data, you are able to capture it. What kind of attack is this?

解説: (GoShiken メンバーにのみ表示されます)
What are the main drawbacks for anti-virus software?

解説: (GoShiken メンバーにのみ表示されます)
Study the snort rule given below and interpret the rule.
alert tcp any any --> 192.168.1.0/24 111 (content:"|00 01 86 a5|"; msG. "mountd access";)

Which of the following lists are valid data-gathering activities associated with a risk assessment?

An organization hires a tester to do a wireless penetration test. Previous reports indicate that the last test did not contain management or control packets in the submitted traces. Which of the following is the most likely reason for lack of management or control packets?

A company has five different subnets: 192.168.1.0, 192.168.2.0, 192.168.3.0, 192.168.4.0 and 192.168.5.0. How can NMAP be used to scan these adjacent Class C networks?