EC0-350試験無料問題集「EC-COUNCIL Ethical hacking and countermeasures 認定」

What will the following command produce on a website's login page if executed successfully? SELECT email, passwd, login_id, full_name FROM members WHERE email = '[email protected]'; DROP TABLE members; --'

WinDump is a popular sniffer which results from the porting to Windows of TcpDump for Linux. What library does it use?

解説: (GoShiken メンバーにのみ表示されます)
In Buffer Overflow exploit, which of the following registers gets overwritten with return address of the exploit code?

Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in order to find some information about the target they are attempting to penetrate. How would you call this type of activity?

What is a primary advantage a hacker gains by using encryption or programs such as Loki?

解説: (GoShiken メンバーにのみ表示されます)
The follows is an email header. What address is that of the true originator of the message?

解説: (GoShiken メンバーにのみ表示されます)
Bob wants to prevent attackers from sniffing his passwords on the wired network. Which of the following lists the best options?

解説: (GoShiken メンバーにのみ表示されます)
While investigating a claim of a user downloading illegal material, the investigator goes through the files on the suspect's workstation. He comes across a file that is just called "file.txt" but when he opens it, he finds the following:

What can he infer from this file?

Study the snort rule given below and interpret the rule.
alert tcp any any --> 192.168.1.0/24 111 (content:"|00 01 86 a5|"; msG. "mountd access";)

You are doing IP spoofing while you scan your target. You find that the target has port 23 open. Anyway you are unable to connect. Why?

解説: (GoShiken メンバーにのみ表示されます)
__________ is found in all versions of NTFS and is described as the ability to fork file data into existing files without affecting their functionality, size, or display to traditional file browsing utilities like dir or Windows Explorer

Which of the following attacks takes best advantage of an existing authenticated connection?

解説: (GoShiken メンバーにのみ表示されます)
This attack uses social engineering techniques to trick users into accessing a fake Web site and divulging personal information. Attackers send a legitimate-looking e-mail asking users to update their information on the company's Web site, but the URLs in the e-mail actually point to a false Web site.

You find the following entries in your web log. Each shows attempted access to either root.exe or cmd.exe.
What caused this?

解説: (GoShiken メンバーにのみ表示されます)
Which protocol and port number might be needed in order to send log messages to a log analysis tool that resides behind a firewall?

Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?

You receive an e-mail with the following text message.
"Microsoft and HP today warned all customers that a new, highly dangerous virus has been discovered which will erase all your files at midnight. If there's a file called hidserv.exe on your computer, you have been infected and your computer is now running a hidden server that allows hackers to access your computer. Delete the file immediately. Please also pass this message to all your friends and colleagues as soon as possible." You launch your antivirus software and scan the suspicious looking file hidserv.exe located in c:\windows directory and the AV comes out clean meaning the file is not infected. You view the file signature and confirm that it is a legitimate Windows system file "Human Interface Device Service".
What category of virus is this?

Which solution can be used to emulate computer services, such as mail and ftp, and to capture information related to logins or actions?

On wireless networks, SSID is used to identify the network. Why are SSID not considered to be a good security mechanism to protect a wireless networks?

解説: (GoShiken メンバーにのみ表示されます)