PrepAway - Latest Free Exam Questions & Answers

Category: 312-50 (CEH v6)

Exam 312-50: Ethical Hacking and Countermeasures (CEH v6)

A denial of Service (DoS) attack works on the following principle:

A denial of Service (DoS) attack works on the following principle:

What address is that of the true originator of the message?

The follows is an email header. What address is that of the true originator of the message? Return-Path:
Received: from smtp.com (fw.emumail.com [215.52.220.122]. by raq-221-181.ev1.net (8.10.2/8.10.2. with ESMTP id h78NIn404807 for ; Sat, 9 Aug 2003 18:18:50 -0500 Received:
(qmail 12685 invoked from network.; 8 Aug 2003 23:25:25 -0000 Received: from ([19.25.19.10]. by smtp.com with SMTP Received: from unknown (HELO CHRISLAPTOP. (168.150.84.123. by localhost with SMTP; 8 Aug 2003 23:25:01 -0000 From: “Bill Gates” To: “mikeg” Subject: We need your help! Date: Fri, 8 Aug 2003 19:12:28 -0400 Message-ID:
MIME-Version: 1.0 Content-Type: multipart/mixed; boundary=”- —
=_NextPart_000_0052_01C35DE1.03202950″ X-Priority: 3 (Normal. X-MSMail-Priority: Normal XMailer:
Microsoft Outlook, Build 10.0.2627 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165 Importance: Normal

Which of the following techniques can she use to gather information from the switched network or to disable so

Samantha was hired to perform an internal security test of pass4sure. She quickly realized that all networks are making use of switches instead of traditional hubs. This greatly limits her ability to gather information through network sniffing. Which of the following techniques can she use to gather information from the switched network or to disable some of the traffic isolation features of the switch? (Choose two)


Page 23 of 125« First...10...2122232425...304050...Last »