最新の212-89資格準備 | 素晴らしい合格率の212-89 Exam | よくできた212-89: EC Council Certified Incident Handler (ECIH v3)212-89実践ガイドまたはシステムの内容が更新された場合、更新された情報を電子メールアドレスに送信します。もちろん、製品の更新状況については、当社の電子メールをご覧ください。 212-89模擬試験を使用して212-89試験に合格するように協力できることを願っています。コンテンツの更新に加えて、212-89トレーニング資料のシステムも更新されます。ご意見がありましたら、私たちの共通の目標は、ユーザーが満足する製品を作成することであると言えます。学習を開始した後、メールをチェックするための固定時間を設定できることを願っています。 EC-COUNCIL EC Council Certified Incident Handler (ECIH v3) 認定 212-89 試験問題 (Q137-Q142):質問 # 137
Allan performed a reconnaissance attack on his corporate network as part of a red-team activity. He scanned the IP range to find live host IP addresses. What type of technique did he use to exploit the network?
A. DNS foot printing
B. Social engineering
C. Ping sweeping
D. Port scanning
正解:C
解説:
Ping sweeping is a technique used in network reconnaissance to identify which IP addresses in a range are active or live. By sending ICMP echo requests ("ping") to multiple hosts and observing which ones respond, an attacker or, in this case, a red team member like Allan, can determine which systems are up and potentially vulnerable to further exploration or attack. This method is foundational for mapping the network before deploying more targeted exploits or scans.
References:EC-Council's Certified Incident Handler (ECIH v3) program discusses various reconnaissance techniques, including ping sweeping, as a preliminary step in network analysis and vulnerability assessment.
質問 # 138
Which of the following DOES NOT expose a cloud application to hacking?
A. Lack of experience in manipulating cloud systems
B. Contract with a cloud service vendor
C. Configuration error
D. Inappropriate technical issue
正解:B
質問 # 139
Sam, an employee of a multinational company, sends emails to third-party organizations with a spoofed email address of his organization.
How can you categorize this type of incident?
A. Denial-of-service incident
B. Inappropriate usage incident
C. Unauthorized access incident
D. Network intrusion incident
正解:B
質問 # 140
Which of the following best describes an email issued as an attack medium, in which several messages are sent to a mailbox to cause overflow?
A. Email-bombing
B. Smurf attack
C. Masquerading
D. Spoofing
正解:A
解説:
Email-bombing refers to the attack where the attacker sends a massive volume of emails to a specific email address or mail server in order to overflow the mailbox or overwhelm the server, potentially causing it to fail or deny service to legitimate users. This attack can disrupt communications and, in some cases, lead to the targeted email account being disabled. Masquerading involves pretending to be another legitimate user, spoofing is the creation of emails (or other communications) with a forged sender address, and a smurf attack is a specific type of Distributed Denial of Service (DDoS) attack that exploits Internet Protocol (IP) and Internet Control Message Protocol (ICMP) to flood a target with traffic. Email-bombing specifically targets email services with the goal of causing disruption by overflowing inboxes.
References:ECIH v3 courses and study guides often include discussions on various attack vectors used by cybercriminals, including email-based threats and their impact on organizational security.
質問 # 141
Computer viruses are malicious software programs that infect computers and corrupt or delete the data on them. Identify the virus type that specifically infects Microsoft Word files?