최신 Certified Ethical Hacker 412-79 무료샘플문제:
1. John, a penetration tester from a pen test firm, was asked to collect information about the host file in a Windows system directory. Which of the following is the location of the host file in Window system directory?
A) C:\Windows\System32\restore
B) C:\WINNT\system32\drivers\etc
C) C:\Windows\System32\Boot
D) C:\WINDOWS\system32\cmd.exe
2. One needs to run "Scan Server Configuration" tool to allow a remote connection to Nessus from the remote Nessus clients. This tool allows the port and bound interface of the Nessus daemon to be configured. By default, the Nessus daemon listens to connections on which one of the following?
A) Localhost (127.0.0.1) and port 1241
B) Localhost (127.0.0.1) and port 1246
C) Localhost (127.0.0.1) and port 1240
D) Localhost (127.0.0.0) and port 1243
3. Identify the attack represented in the diagram below:
A) Denial-of-Service
B) Session Hijacking
C) Input Validation
D) SQL Injection
4. External penetration testing is a traditional approach to penetration testing and is more focused on the servers, infrastructure and the underlying software comprising the target. It involves a comprehensive analysis of publicly available information about the target, such as Web servers, Mail servers, Firewalls, and Routers.
Which of the following types of penetration testing is performed with no prior knowledge of the site?
A) Grey box testing
B) Blue box testing
C) White box testing
D) Black box testing
5. Which of the following is not a condition specified by Hamel and Prahalad (1990)?
A) Core competency should be aimed at protecting company interests
B) Core competency can be leveraged widely to many products and markets
C) Core competency is hard for competitors to imitate
D) Core competency provides customer benefits
질문과 대답:
질문 # 1 정답: B | 질문 # 2 정답: A | 질문 # 3 정답: B | 질문 # 4 정답: D | 질문 # 5 정답: A |