Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
International Council of E-Commerce Consultants (EC-Council)
Exam 5: ECCouncil Computer Hacking Forensic Investigator
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 141
Multiple Choice
SOAP services use which technology to format information?
Question 142
Multiple Choice
A network security administrator is worried about potential man-in-the-middle attacks when users access a corporate web site from their workstations. Which of the following is the best remediation against this type of attack?
Question 143
Multiple Choice
Which Open Web Application Security Project (OWASP) implements a web application full of known vulnerabilities?
Question 144
Multiple Choice
Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?
Question 145
Multiple Choice
Which statement best describes a server type under an N-tier architecture?
Question 146
Multiple Choice
Which of the following levels of algorithms does Public Key Infrastructure (PKI) use?
Question 147
Multiple Choice
How do employers protect assets with security policies pertaining to employee surveillance activities?
Question 148
Multiple Choice
When comparing the testing methodologies of Open Web Application Security Project (OWASP) and Open Source Security Testing Methodology Manual (OSSTMM) the main difference is
Question 149
Multiple Choice
A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which of the following has occurred?
Question 150
Multiple Choice
Which NMAP feature can a tester implement or adjust while scanning for open ports to avoid detection by the network's IDS?
Question 151
Multiple Choice
Which security strategy requires using several, varying methods to protect IT systems against attacks?
Question 152
Multiple Choice
Which cipher encrypts the plain text digit (bit or byte) one by one?
Question 153
Multiple Choice
Which of the following algorithms provides better protection against brute force attacks by using a 160-bit message digest?
Question 154
Multiple Choice
Which of the following network attacks relies on sending an abnormally large packet size that exceeds TCP/IP specifications?
Question 155
Multiple Choice
Which element of Public Key Infrastructure (PKI) verifies the applicant?
Question 156
Multiple Choice
Which vital role does the U.S. Computer Security Incident Response Team (CSIRT) provide?
Question 157
Multiple Choice
Which of the following is a characteristic of Public Key Infrastructure (PKI) ?
Question 158
Multiple Choice
What are the three types of compliance that the Open Source Security Testing Methodology Manual (OSSTMM) recognizes?
Question 159
Multiple Choice
If an e-commerce site was put into a live environment and the programmers failed to remove the secret entry point that was used during the application development, what is this secret entry point known as?