최신 Certified Ethical Hacker EC0-350 무료샘플문제:
1. One advantage of an application-level firewall is the ability to
A) monitor tcp handshaking.
B) filter specific commands, such as http:post.
C) retain state information for each packet.
D) filter packets at the network level.
2. What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?
A) All are tools that can be used not only by hackers, but also security personnel
B) All are tools that are only effective against Linux
C) All are DDOS tools
D) All are tools that are only effective against Windows
E) All are hacking tools developed by the legion of doom
3. While checking the settings on the internet browser, a technician finds that the proxy server settings have been checked and a computer is trying to use itself as a proxy server. What specific octet within the subnet does the technician see?
A) 10.10.10.10
B) 127.0.0.1
C) 192.168.1.1
D) 192.168.168.168
4. A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?
A) Determine the impact of enabling the audit feature.
B) Allocate funds for staffing of audit log review.
C) Perform a cost/benefit analysis of the audit feature.
D) Perform a vulnerability scan of the system.
5. Bob is going to perform an active session hijack against Brownies Inc. He has found a target that allows session oriented connections (Telnet) and performs the sequence prediction on the target operating system. He manages to find an active session due to the high level of traffic on the network. What is Bob supposed to do next?
A) Take over the session
B) Guess the sequence numbers
C) Reverse sequence prediction
D) Take one of the parties offline
질문과 대답:
질문 # 1 정답: B | 질문 # 2 정답: C | 질문 # 3 정답: B | 질문 # 4 정답: A | 질문 # 5 정답: B |