ECCouncil 312-50 - Certified Ethical Hacker Exam
A covert channel is a channel that
Which of the following lists are valid data-gathering activities associated with a risk assessment?
Which results will be returned with the following Google search query?
site:target.com -site:Marketing.target.com accounting
What is one thing a tester can do to ensure that the software is trusted and is not changing or tampering with critical data on the back end of a system it is loaded on?
When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?
A penetration tester is hired to do a risk assessment of a company's DMZ. The rules of engagement states that the penetration test be done from an external IP address with no prior knowledge of the internal IT systems. What kind of test is being performed?
How can rainbow tables be defeated?
An NMAP scan of a server shows port 25 is open. What risk could this pose?
An NMAP scan of a server shows port 69 is open. What risk could this pose?
A security consultant decides to use multiple layers of anti-virus defense, such as end user desktop anti-virus and E-mail gateway. This approach can be used to mitigate which kind of attack?