312-50v8試験無料問題集「EC-COUNCIL Certified Ethical Hacker v8 認定」

Joe the Hacker breaks into XYZ's Linux system and plants a wiretap program in order to sniff passwords and user accounts off the wire. The wiretap program is embedded as a Trojan horse in one of the network utilities. Joe is worried that network administrator might detect the wiretap program by querying the interfaces to see if they are running in promiscuous mode.

What can Joe do to hide the wiretap program from being detected by ifconfig command?

解説: (GoShiken メンバーにのみ表示されます)
What is the expected result of the following exploit?

解説: (GoShiken メンバーにのみ表示されます)
A penetration tester is hired to do a risk assessment of a company's DMZ. The rules of engagement states that the penetration test be done from an external IP address with no prior knowledge of the internal IT systems. What kind of test is being performed?

A Certificate Authority (CA) generates a key pair that will be used for encryption and decryption of email. The integrity of the encrypted email is dependent on the security of which of the following?

Henry is an attacker and wants to gain control of a system and use it to flood a target system with requests, so as to prevent legitimate users from gaining access. What type of attack is Henry using?

解説: (GoShiken メンバーにのみ表示されます)
What sequence of packets is sent during the initial TCP three-way handshake?

What type of encryption does WPA2 use?

Which of the following tools would be the best choice for achieving compliance with PCI Requirement 11?

An attacker runs netcat tool to transfer a secret file between two hosts.
Machine A: netcat -l -p 1234 < secretfile
Machine B: netcat 192.168.3.4 > 1234
He is worried about information being sniffed on the network. How would the attacker use netcat to encrypt the information before transmitting onto the wire?

解説: (GoShiken メンバーにのみ表示されます)
An IT security engineer notices that the company's web server is currently being hacked. What should the engineer do next?

When setting up a wireless network, an administrator enters a pre-shared key for security. Which of the following is true?

Matthew re-injects a captured wireless packet back onto the network. He does this hundreds of times within a second. The packet is correctly encrypted and Matthew assumes it is an ARP request packet. The wireless host responds with a stream of responses, all individually encrypted with different IVs. What is this attack most appropriately called?

解説: (GoShiken メンバーにのみ表示されます)
A majority of attacks come from insiders, people who have direct access to a company's computer system as part of their job function or a business relationship. Who is considered an insider?

Which of the following is a hashing algorithm?

You have performed the traceroute below and notice that hops 19 and 20 both show the same IP address.
What can be inferred from this output?