312-50v10試験無料問題集「EC-COUNCIL Certified Ethical Hacker Exam (CEH v10) 認定」

How do employers protect assets with security policies pertaining to employee surveillance activities?

A hacker named Jack is trying to compromise a bank's computer system. He needs to know the operating system of that computer to launch further attacks.
What process would help him?

A large mobile telephony and data network operator has a data that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems. What is the best security policy concerning this setup?

Which of the following is one of the most effective ways to prevent Cross-site Scripting (XSS) flaws in software applications?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following examples best represents a logical or technical control?

What hacking attack is challenge/response authentication used to prevent?

Which element of Public Key Infrastructure (PKI) verifies the applicant?

An LDAP directory can be used to store information similar to a SQL database. LDAP uses a _____ database structure instead of SQL's _____ structure. Because of this, LDAP has difficulty representing many-to-one relationships.

Which of these options is the most secure procedure for storing backup tapes?

解説: (GoShiken メンバーにのみ表示されます)
Which method can provide a better return on IT security investment and provide a thorough and comprehensive assessment of organizational security covering policy, procedure design, and implementation?

When you return to your desk after a lunch break, you notice a strange email in your inbox. The sender is someone you did business with recently, but the subject line has strange characters in it.
What should you do?

解説: (GoShiken メンバーにのみ表示されます)
Sid is a judge for a programming contest. Before the code reaches him it goes through a restricted OS and is tested there. If it passes, then it moves onto Sid. What is this middle step called?

An NMAP scan of a server shows port 69 is open. What risk could this pose?

Windows file servers commonly hold sensitive files, databases, passwords and more. Which of the following choices would be a common vulnerability that usually exposes them?

Which of the following problems can be solved by using Wireshark?

What is the code written for?