質問 1:What is the problem with this ASP script (login.asp)?
A. The ASP script is vulnerable to XSS attack
B. The ASP script is vulnerable to SQL Injection attack
C. The ASP script is vulnerable to Cross Site Scripting attack
D. The ASP script is vulnerable to Session Splice attack
正解:B
質問 2:BankerFox is a Trojan that is designed to steal users' banking data related to certain banking entities.
When they access any website of the affected banks through the vulnerable Firefox 3.5 browser, the Trojan is activated and logs the information entered by the user. All the information entered in that website will be logged by the Trojan and transmitted to the attacker's machine using covert channel.
BankerFox does not spread automatically using its own means. It needs an attacking user's intervention in order to reach the affected computer.
What is the most efficient way an attacker located in remote location to infect this banking Trojan on a victim's machine?
A. Custom packaging - the attacker can create a custom Trojan horse that mimics the appearance of a program that is unique to that particular computer
B. Physical access - the attacker can simply copy a Trojan horse to a victim's hard disk infecting the machine via Firefox add-on extensions
C. Custom packaging - the attacker can create a custom Trojan horse that mimics the appearance of a program that is unique to that particular computer
D. Downloading software from a website? An attacker can offer free software, such as shareware programs and pirated mp3 files
E. Custom packaging - the attacker can create a custom Trojan horse that mimics the appearance of a program that is unique to that particular computer
正解:D
質問 3:The FIN flag is set and sent from host A to host B when host A has no more data to transmit (Closing a TCP connection). This flag releases the connection resources. However, host A can continue to receive data as long as the SYN sequence numbers of transmitted packets from host B are lower than the packet segment containing the set FIN flag.
A. true
B. false
正解:A
質問 4:Advanced encryption standard is an algorithm used for which of the following?
A. Bulk data encryption
B. Key recovery
C. Data integrity
D. Key discovery
正解:A
質問 5:Derek has stumbled upon a wireless network and wants to assess its security. However, he does not find enough traffic for a good capture. He intends to use AirSnort on the captured traffic to crack the WEP key and does not know the IP address range or the AP. How can he generate traffic on the network so that he can capture enough packets to crack the WEP key?
A. Derek can use a session replay on the packets captured
B. Derek can use KisMAC as it needs two USB devices to generate traffic
C. Use any ARP requests found in the capture
D. Use Ettercap to discover the gateway and ICMP ping flood tool to generate traffic
正解:D
解説: (Topexam メンバーにのみ表示されます)
質問 6:You run nmap port Scan on 10.0.0.5 and attempt to gain banner/server information from services running on ports 21, 110 and 123.
Here is the output of your scan results:
Which of the following nmap command did you run?
A. nmap -T -sV -p21, 110, 123 10.0.0.5
B. nmap -F -sV -p21, 110, 123 10.0.0.5
C. nmap -O -sV -p21, 110, 123 10.0.0.5
D. nmap -A -sV -p21, 110, 123 10.0.0.5
正解:C
質問 7:NetBIOS over TCP/IP allows files and/or printers to be shared over the network. You are trying to intercept the traffic from a victim machine to a corporate network printer. You are attempting to hijack the printer network connection from your laptop by sniffing the wire. Which port does SMB over TCP/IP use?
A. 179
B. 445
C. 443
D. 139
正解:B
質問 8:What does ICMP (type 11, code 0) denote?
A. Time Exceeded
B. Destination Unreachable
C. Unknown Type
D. Source Quench
正解:A
質問 9:Erik notices a big increase in UDP packets sent to port 1026 and 1027 occasionally. He enters the following at the command prompt.
$ nc -l -p 1026 -u -v
In response, he sees the following message.
cell(?(c)????STOPALERT77STOP! WINDOWS REQUIRES IMMEDIATE ATTENTION.
Windows has found 47 Critical Errors.
To fix the errors please do the following:
1. Download Registry Repair from: www.reg-patch.com
2. Install Registry Repair
3. Run Registry Repair
4. Reboot your computer
FAILURE TO ACT NOW MAY LEAD TO DATA LOSS AND CORRUPTION!
What would you infer from this alert?
A. The machine is redirecting traffic to www.reg-patch.com using adware
B. It is a messenger spam. Windows creates a listener on one of the low dynamic ports from 1026 to 1029 and the message usually promotes malware disguised as legitimate utilities
C. An attacker has compromised the machine and backdoored ports 1026 and 1027
D. It is a genuine fault of windows registry and the registry needs to be backed up
正解:B
解説: (Topexam メンバーにのみ表示されます)
TopExamは君にEC0-350の問題集を提供して、あなたの試験への復習にヘルプを提供して、君に難しい専門知識を楽に勉強させます。TopExamは君の試験への合格を期待しています。
安全的な支払方式を利用しています
Credit Cardは今まで全世界の一番安全の支払方式です。少数の手続きの費用かかる必要がありますとはいえ、保障があります。お客様の利益を保障するために、弊社のEC0-350問題集は全部Credit Cardで支払われることができます。
領収書について:社名入りの領収書が必要な場合、メールで社名に記入していただき送信してください。弊社はPDF版の領収書を提供いたします。
弊社のEC-COUNCIL EC0-350を利用すれば試験に合格できます
弊社のEC-COUNCIL EC0-350は専門家たちが長年の経験を通して最新のシラバスに従って研究し出した勉強資料です。弊社はEC0-350問題集の質問と答えが間違いないのを保証いたします。
この問題集は過去のデータから分析して作成されて、カバー率が高くて、受験者としてのあなたを助けて時間とお金を節約して試験に合格する通過率を高めます。我々の問題集は的中率が高くて、100%の合格率を保証します。我々の高質量のEC-COUNCIL EC0-350を利用すれば、君は一回で試験に合格できます。
弊社は無料EC-COUNCIL EC0-350サンプルを提供します
お客様は問題集を購入する時、問題集の質量を心配するかもしれませんが、我々はこのことを解決するために、お客様に無料EC0-350サンプルを提供いたします。そうすると、お客様は購入する前にサンプルをダウンロードしてやってみることができます。君はこのEC0-350問題集は自分に適するかどうか判断して購入を決めることができます。
EC0-350試験ツール:あなたの訓練に便利をもたらすために、あなたは自分のペースによって複数のパソコンで設置できます。
一年間の無料更新サービスを提供します
君が弊社のEC-COUNCIL EC0-350をご購入になってから、我々の承諾する一年間の更新サービスが無料で得られています。弊社の専門家たちは毎日更新状態を検査していますから、この一年間、更新されたら、弊社は更新されたEC-COUNCIL EC0-350をお客様のメールアドレスにお送りいたします。だから、お客様はいつもタイムリーに更新の通知を受けることができます。我々は購入した一年間でお客様がずっと最新版のEC-COUNCIL EC0-350を持っていることを保証します。
弊社は失敗したら全額で返金することを承諾します
我々は弊社のEC0-350問題集に自信を持っていますから、試験に失敗したら返金する承諾をします。我々のEC-COUNCIL EC0-350を利用して君は試験に合格できると信じています。もし試験に失敗したら、我々は君の支払ったお金を君に全額で返して、君の試験の失敗する経済損失を減少します。
EC-COUNCIL Ethical hacking and countermeasures 認定 EC0-350 試験問題:
1. When using Wireshark to acquire packet capture on a network, which device would enable the capture of all traffic on the wire?
A) Application firewall
B) Network tap
C) Layer 3 switch
D) Network bridge
2. You receive an email with the following message:
Hello Steve,
We are having technical difficulty in restoring user database record after the recent blackout. Your account data is corrupted. Please logon to the SuperEmailServices.com and change your password.
http://[email protected]/support/logon.htm
If you do not reset your password within 7 days, your account will be permanently disabled locking you out from our e-mail services.
Sincerely,
Technical Support
SuperEmailServices
From this e-mail you suspect that this message was sent by some hacker since you have been using their e-mail services for the last 2 years and they have never sent out an e-mail such as this. You also observe the URL in the message and confirm your suspicion about 0xde.0xad.0xbde.0xef which looks like hexadecimal numbers. You immediately enter the following at Windows 2000 command prompt:
Ping 0xde.0xad.0xbe.0xef
You get a response with a valid IP address.
What is the obstructed IP address in the e-mail URL?
A) 233.34.45.64
B) 222.173.190.239
C) 199.223.23.45
D) 54.23.56.55
3. Here is the ASCII Sheet.
You want to guess the DBO username juggyboy (8 characters) using Blind SQL Injection technique.
What is the correct syntax?
A) Option C
B) Option D
C) Option A
D) Option B
4. A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) then it was intended to hold.
What is the most common cause of buffer overflow in software today?
A) High bandwidth and large number of users.
B) Bad permissions on files.
C) Usage of non standard programming languages.
D) Bad quality assurance on software produced.
5. Oregon Corp is fighting a litigation suit with Scamster Inc. Oregon has assigned a private investigative agency to go through garbage, recycled paper, and other rubbish at Scamster's office site in order to find relevant information. What would you call this kind of activity?
A) Dumpster Diving
B) Garbage Scooping
C) CI Gathering
D) Scanning
質問と回答:
質問 # 1 正解: B | 質問 # 2 正解: B | 質問 # 3 正解: C | 質問 # 4 正解: D | 質問 # 5 正解: A |