최신 Certified Ethical Hacker 312-50v10 무료샘플문제:
1. Which of the following programs is usually targeted at Microsoft Office products?
A) Stealth virus
B) Polymorphic virus
C) Macro virus
D) Multipart virus
2. Sam is working as s pen-tester in an organization in Houston. He performs penetration testing on IDS in order to find the different ways an attacker uses to evade the IDS. Sam sends a large amount of packets to the target IDS that generates alerts, which enable Sam to hide the real traffic. What type of method is Sam using to evade IDS?
A) Obfuscating
B) Denial-of-Service
C) Insertion Attack
D) False Positive Generation
3. In Trojan terminology, what is a covert channel?
A) A legitimate communication path within a computer system or network for transfer of data
B) A channel that transfers information within a computer system or network in a way that violates the security policy
C) It is a kernel operation that hides boot processes and services to mask detection
D) It is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establish connections
4. A security engineer is attempting to map a company's internal network. The engineer enters in the following NMAP command:
NMAP -n -sS -P0 -p 80 ***.***.**.**
What type of scan is this?
A) Comprehensive scan
B) Intense scan
C) Stealth scan
D) Quick scan
5. What is a successful method for protecting a router from potential smurf attacks?
A) Installing the router outside of the network's firewall
B) Enabling port forwarding on the router
C) Disabling the router from accepting broadcast ping messages
D) Placing the router in broadcast mode
질문과 대답:
질문 # 1 정답: C | 질문 # 2 정답: D | 질문 # 3 정답: B | 질문 # 4 정답: C | 질문 # 5 정답: C |