PrepAway - Latest Free Exam Questions & Answers

Category: 312-50V8 (v.1)

Exam 312-50V8: ECCouncil Certified Ethical Hacker v8 (update October 4th, 2015)

Which of the following could be the most likely cause behind this lack of response?

Doug is conducting a port scan of a target network. He knows that his client target network has a
web server and that there is a mail server also which is up and running. Doug has been sweeping
the network but has not been able to elicit any response from the remote target. Which of the
following could be the most likely cause behind this lack of response? Select 4.

What can you infer from the above log?

The following excerpt is taken from a honeyput log. The log captures activities across three days.
There are several intrusion attempts; however, a few are successful. Study the log given below
and answer the following question:
(Note: The objective of this questions is to test whether the student has learnt about passive OS
fingerprinting (which should tell them the OS from log captures): can they tell a SQL injection
attack signature; can they infer if a user ID has been created by an attacker and whether they can
read plain source – destination entries from log entries.)

What can you infer from the above log?

what phase is Bob involved with?

Bob has been hired to perform a penetration test on XYZ.com. He begins by looking at IP address
ranges owned by the company and details of domain name registration. He then goes to News
Groups and financial web sites to see if they are leaking any sensitive information of have any
technical details online.
Within the context of penetration testing methodology, what phase is Bob involved with?


Page 54 of 88« First...102030...5253545556...607080...Last »