Download Ec-council.Examsheets.312-50.v2014-02-04.by.Batista

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts

Computer and network surveillance wikipedia, lookup

Computer security compromised by hardware failure wikipedia, lookup

Transcript
A.
B.
C.
D.
Covert keylogger
Stealth keylogger
Software keylogger
Hardware keylogger
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation: As the hardware keylogger never interacts with the Operating System it is undetectable by antivirus or anti-spyware products.
QUESTION 660
_____ is the process of converting something from one representation to the simplest form. It deals with the
way in which systems convert data from one form to another.
A.
B.
C.
D.
Canonicalization
Character Mapping
Character Encoding
UCS transformation formats
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation: Canonicalization (abbreviated c14n) is the process of converting data that has more than one
possible representation into a "standard" canonical representation. This can be done to compare different
representations for equivalence,to count the number of distinct data structures (e.g.,in combinatorics),to
improve the efficiency of various algorithms by eliminating repeated calculations,or to make it possible to
impose a meaningful sorting order.
QUESTION 661
Which type of attack is port scanning?
A.
B.
C.
D.
Web server attack
Information gathering
Unauthorized access
Denial of service attack
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 662
You are a Administrator of Windows server. You want to find the port number for POP3. What file would you
find the information in and where?
Select the best answer.
A. %windir%\\etc\\services