1.
What is a successful method for protecting a router from potential smurf attacks?
2.
Which of the following tools will scan a network to perform vulnerability checks and compliance auditing?
3.
The use of technologies like IPSec can help guarantee the followinG. authenticity, integrity, confidentiality and
4.
A security administrator notices that the log file of the company`s webserver contains suspicious entries: Real 181 EC-Council EC0-350 Exam Based on source code analysis, the analyst concludes that the login.php script is vulnerable to
5.
Which of the following is a detective control?
6.
A penetration tester is attempting to scan an internal corporate network from the internet without alerting the border sensor. Which is the most efficient technique should the tester consider using?
7.
A circuit level gateway works at which of the following layers of the OSI Model? Real 182 EC-Council EC0-350 Exam
8.
Which of the following lists are valid data-gathering activities associated with a risk assessment?
9.
A network security administrator is worried about potential man-in-the-middle attacks when users access a corporate web site from their workstations. Which of the following is the best remediation against this type of attack?
10.
Which command line switch would be used in NMAP to perform operating system detection? Real 183 EC-Council EC0-350 Exam