EC0-350試験無料問題集「EC-COUNCIL Ethical hacking and countermeasures 認定」

Which Type of scan sends a packets with no flags set? Select the Answer

解説: (GoShiken メンバーにのみ表示されます)
You receive an e-mail with the following text message.
"Microsoft and HP today warned all customers that a new, highly dangerous virus has been discovered which will erase all your files at midnight. If there's a file called hidserv.exe on your computer, you have been infected and your computer is now running a hidden server that allows hackers to access your computer. Delete the file immediately. Please also pass this message to all your friends and colleagues as soon as possible." You launch your antivirus software and scan the suspicious looking file hidserv.exe located in c:\windows directory and the AV comes out clean meaning the file is not infected. You view the file signature and confirm that it is a legitimate Windows system file "Human Interface Device Service".
What category of virus is this?

Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool "SIDExtractor". Here is the output of the SIDs:

From the above list identify the user account with System Administrator privileges.

解説: (GoShiken メンバーにのみ表示されます)
Rebecca has noted multiple entries in her logs about users attempting to connect on ports that are either not opened or ports that are not for public usage. How can she restrict this type of abuse by limiting access to only specific IP addresses that are trusted by using one of the built-in Linux Operating System tools?

解説: (GoShiken メンバーにのみ表示されます)
What is the main difference between a "Normal" SQL Injection and a "Blind" SQL Injection vulnerability?

Which of the following is one of the key features found in a worm but not seen in a virus?

解説: (GoShiken メンバーにのみ表示されます)
Which tool is used to automate SQL injections and exploit a database by forcing a given web application to connect to another database controlled by a hacker?

解説: (GoShiken メンバーにのみ表示されます)
What makes web application vulnerabilities so aggravating? (Choose two)

解説: (GoShiken メンバーにのみ表示されます)
In the context of Trojans, what is the definition of a Wrapper?

解説: (GoShiken メンバーにのみ表示されます)
Use the traceroute results shown above to answer the following question:

The perimeter security at targetcorp.com does not permit ICMP TTL-expired packets out.

解説: (GoShiken メンバーにのみ表示されます)
While scanning a network you observe that all of the web servers in the DMZ are responding to ACK packets on port 80.
What can you infer from this observation?

解説: (GoShiken メンバーにのみ表示されます)
What is the default Password Hash Algorithm used by NTLMv2?

A certified ethical hacker (CEH) is approached by a friend who believes her husband is cheating. She offers to pay to break into her husband's email account in order to find proof so she can take him to court. What is the ethical response?

To send a PGP encrypted message, which piece of information from the recipient must the sender have before encrypting the message?

_________ is a tool that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes.

解説: (GoShiken メンバーにのみ表示されます)
Which of the following encryption is NOT based on block cipher?

A tester is attempting to capture and analyze the traffic on a given network and realizes that the network has several switches. What could be used to successfully sniff the traffic on this switched network? (Choose three.)

正解:B,C,F 解答を投票する
Windows LAN Manager (LM) hashes are known to be weak. Which of the following are known weaknesses of LM? (Choose three)

正解:A,C,D 解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
Ron has configured his network to provide strong perimeter security. As part of his network architecture, he has included a host that is fully exposed to attack. The system is on the public side of the demilitarized zone, unprotected by a firewall or filtering router. What would you call such a host?

解説: (GoShiken メンバーにのみ表示されます)