EC Council Certified Ethical Hacker

Certification Exam Objectives
CEH is the world’s most advanced certified ethical hacking course that covers 18 of the most current security domains any individual will ever want to know when they are planning to beef-up the information security posture of their organization.

The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals.

Key Outcomes:
Thorough introduction to ethical hacking
Exposure to threat vectors and countermeasures
Addresses emerging areas of cloud and mobile hacking
Prepares you to combat Trojans, malware, backdoors and more
Enables you to hack using mobile devices

1.0 Background
Networking technologies (hardware, infrastructure)
Web technologies (e.g., web 2.0, skype)
Systems technologies
Communication protocols
Malware operations
Mobile technologies (smartphones)
Telecommunication technologies
Backups and archiving (local, network)

2.0 Analysis/Assessment
Data analysis
Systems analysis
Risk assessments
technical assessment methods

3.0 Security
Systems security controls
Application/file server
Firewalls
Cryptography
Network security
Physical security
Threat modeling
Verification procedures (false positive/negative validation)
Social engineering (human factors manipulation)
Vulnerability scanners
Security policy implications
Privacy/confidentiality (with regard to engagement)
Biometrics
Wireless access technology (Networking, RFID, Bluetooth)
Trusted networks
Vulnerabilities

4.0 Tools/Systems/Programs
Network/host based intrusion
Network/wireless sniffers (WireShark, Airsnort)
Access control mechanisms (Smart cards )
Cryptography techniques (IPsec, SSL, PGP)
Programming languages (C++, Java, C#, C)
Scripting languages (e.g., PHP, Java script)
Boundary protection appliances
Network topologies
Subnetting
Ports canning (NMAP)
Domain name sys tem (DNS)
Routers /modems /switches
Vulnerability s canner (Nessus , Retina)
Vulnerability management and protection systems (Foundstone, Ecora)
Operating environments (Linux, Windows , Mac)
Antivirus systems and programs
Log analysis tools
Security models
Exploitation tools
Database structures

5.0 Procedures/Methodology
Cryptography
Public key infrastructure (PKI)
Security Architecture (SA)
Service Oriented Architecture
Information security incident
N-tier application design
TCP/IP networking (e.g., network routing)
Security testing methodology

6.0 Regulation/Policy
Security policies
Compliance regulations (PCI)

7.0 Ethics
Professional code of conduct
Appropriateness of hacking

QUESTION 1
Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?

A. Fast processor to help with network traffic analysis
B. They must be dual-homed
C. Similar RAM requirements
D. Fast network interface cards

Correct Answer: B

QUESTION 2
Which of the following is an application that requires a host application for replication?

A. Micro
B. Worm
C. Trojan
D. Virus

Correct Answer: D

QUESTION 3
A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to
evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an
attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the
analyst use to perform a Blackjacking attack?

A. Paros Proxy
B. BBProxy
C. BBCrack
D. Blooover

Correct Answer: B

QUESTION 4
Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?

A. Restore a random file.
B. Perform a full restore.
C. Read the first 512 bytes of the tape.
D. Read the last 512 bytes of the tape.

Correct Answer: B

QUESTION 5
Which of the following describes the characteristics of a Boot Sector Virus?

A. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR
B. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR
C. Modifies directory table entries so that directory entries point to the virus code instead of the actual program
D. Overwrites the original MBR and only executes the new virus code

Correct Answer: B

QUESTION 6
Which statement is TRUE regarding network firewalls preventing Web Application attacks?

A. Network firewalls can prevent attacks because they can detect malicious HTTP traffic.
B. Network firewalls cannot prevent attacks because ports 80 and 443 must be opened.
C. Network firewalls can prevent attacks if they are properly configured.
D. Network firewalls cannot prevent attacks because they are too complex to configure.

Correct Answer: B

Actualkey ECCouncil 312-50v9 Exam pdf, Certkingdom ECCouncil 312-50v9 PDF

MCTS Training, MCITP Trainnig

Best ECCouncil 312-50v9 Certification, ECCouncil 312-50v9 Training at certkingdom.com

Click to rate this post!
[Total: 0 Average: 0]