Download Ec-council.Examsheets.312-50.v2014-02-04.by.Batista

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Transcript
C. Say yes; do the job for free.
D. Say no; make sure that the friend knows the risk she's asking the CEH to take.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 494
A hacker is attempting to see which ports have been left open on a network. Which NMAP switch would the
hacker use?
A.
B.
C.
D.
-sO
-sP
-sS
-sU
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 495
The network administrator for a company is setting up a website with e-commerce capabilities. Packet sniffing
is a concern because credit card information will be sent electronically over the Internet. Customers visiting the
site will need to encrypt the data with HTTPS. Which type of certificate is used to encrypt and decrypt the data?
A.
B.
C.
D.
Asymmetric
Confidential
Symmetric
Non-confidential
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 496
Which security control role does encryption meet?
A.
B.
C.
D.
Preventative
Detective
Offensive
Defensive
Correct Answer: A
Section: (none)
Explanation
Document related concepts

Computer and network surveillance wikipedia, lookup

Computer security compromised by hardware failure wikipedia, lookup