312-50v10試験無料問題集「EC-COUNCIL Certified Ethical Hacker Exam (CEH v10) 認定」

If there is an Intrusion Detection System (IDS) in intranet, which port scanning technique cannot be used?

Advanced encryption standard is an algorithm used for which of the following?

After gaining access to the password hashes used to protect access to a web based application, knowledge of which cryptographic algorithms would be useful to gain access to the application?

The network in ABC company is using the network address 192.168.1.64 with mask 255.255.255.192. In the network the servers are in the addresses 192.168.1.122, 192.168.1.123 and 192.168.1.124.
An attacker is trying to find those servers but he cannot see them in his scanning. The command he is using is:
nmap 192.168.1.64/28.
Why he cannot see the servers?

During a penetration test, the tester conducts an ACK scan using NMAP against the external interface of the DMZ firewall. NMAP reports that port 80 is unfiltered. Based on this response, which type of packet inspection is the firewall conducting?

Backing up data is a security must. However, it also has certain level of risks when mishandled. Which of the following is the greatest threat posed by backups?

Which technical characteristic do Ethereal/Wireshark, TCPDump, and Snort have in common?

You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?

Which statement best describes a server type under an N-tier architecture?

A pentester gains access to a Windows application server and needs to determine the settings of the built-in Windows firewall. Which command would be used?

Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?

While performing online banking using a Web browser, Kyle receives an email that contains an image of a well-crafted art. Upon clicking the image, a new tab on the web browser opens and shows an animated GIF of bills and coins being swallowed by a crocodile. After several days, Kyle noticed that all his funds on the bank was gone. What Web browser-based security vulnerability got exploited by the hacker?

By using a smart card and pin, you are using a two-factor authentication that satisfies

What is the main disadvantage of the scripting languages as opposed to compiled programming languages?