ECCouncil 312-50 - Certified Ethical Hacker Exam
Which of the following processes evaluates the adherence of an organization to its stated security policy?
What is the main advantage that a network-based IDS/IPS system has over a host-based solution?
What technique is used to perform a Connection Stream Parameter Pollution (CSPP) attack?
What is the main difference between a “Normal†SQL Injection and a “Blind†SQL Injection vulnerability?
Which of the following business challenges could be solved by using a vulnerability scanner?
What is the name of the international standard that establishes a baseline level of confidence in the security functionality of IT products by providing a set of requirements for evaluation?
At a Windows Server command prompt, which command could be used to list the running services?
A consultant is hired to do physical penetration testing at a large financial company. In the first day of his assessment, the consultant goes to the company`s building dressed like an electrician and waits in the lobby for an employee to pass through the main access gate, then the consultant follows the employee behind to get into the restricted area. Which type of attack did the consultant perform?
A company has hired a security administrator to maintain and administer Linux and Windows-based systems. Written in the nightly report file is the following:
Firewall log files are at the expected value of 4 MB. The current time is 12am. Exactly two hours later the size has decreased considerably. Another hour goes by and the log files have shrunk in size again.
Which of the following actions should the security administrator take?
A security policy will be more accepted by employees if it is consistent and has the support of