최신 Certified Ethical Hacker 412-79v8 무료샘플문제:
1. Which one of the following log analysis tools is used for analyzing the server's log files?
A) Performance Analysis of Logs tool
B) Event Log Tracker tool
C) Network Sniffer Interface Test tool
D) Ka Log Analyzer tool
2. Why is a legal agreement important to have before launching a penetration test?
A) It is important to ensure that the target organization has implemented mandatory security policies
B) Guarantees your consultant fees
C) It establishes the legality of the penetration test by documenting the scope of the project and the consent of the company.
D) Allows you to perform a penetration test without the knowledge and consent of the organization's upper management
3. Which one of the following is a useful formatting token that takes an int * as an argument, and writes the number of bytes already written, to that location?
A) "%n"
B) "%p"
C) "%w"
D) "%s"
4. Which one of the following Snort logger mode commands is associated to run a binary log file through Snort in sniffer mode to dump the packets to the screen?
A) ./snort -dvr packet.log icmp
B) ./snort -dv -r packet.log
C) ./snort -dev -l ./log
D) ./snort -l ./log -b
5. In the process of hacking a web application, attackers manipulate the HTTP requests to subvert the application authorization schemes by modifying input fields that relate to the user ID, username, access group, cost, file names, file identifiers, etc. They first access the web application using a low privileged account and then escalate privileges to access protected resources. What attack has been carried out?
A) Frame Injection Attack
B) Authentication Attack
C) Authorization Attack
D) XPath Injection Attack
질문과 대답:
질문 # 1 정답: D | 질문 # 2 정답: C | 질문 # 3 정답: A | 질문 # 4 정답: B | 질문 # 5 정답: C |