최신 Certified Ethical Hacker EC0-349 무료샘플문제:
1. After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks.
What countermeasures could he take to prevent DDoS attacks?
A) Enable BGP
B) Disable BGP
C) Disable direct broadcasts
D) Enable direct broadcasts
2. What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?
A) UDP header field
B) TCP header field
C) ICMP header field
D) IP header field
3. Under no circumstances should anyone, with the exception of qualified computer forensics personnel, make any attempts to restore or recover information from a computer system or device that holds electronic information.
A) True
B) False
4. Which of the following commands shows you the NetBIOS name table each?
A) nbtstat -c
B) nbtstat -s
C) nbtstat -n
D) nbtstat -r
5. How often must a company keep log files for them to be admissible in a court of law?
A) Weekly
B) All log files are admissible in court no matter their frequency
C) Continuously
D) Monthly
질문과 대답:
질문 # 1 정답: C | 질문 # 2 정답: C | 질문 # 3 정답: A | 질문 # 4 정답: C | 질문 # 5 정답: C |