Create Account

ECCouncil 312-50V7

Ethical Hacking and Countermeasures (CEHv7)

Free Questions in OTE format

 
File Date Q&A Votes Size  
ECCouncil.312-50V7.v2016-03-26.505q.ote 2016-03-26 505 1/0 6.74 Mb

Notification about new ECCouncil 312-50V7 files

Subscribe to ECCouncil 312-50V7 dump here, you will be informed about new OTE files.
Subscribe
 

About ECCouncil 312-50V7 dump

Background 4%

  • networking technologies (e.g., hardware, infrastructure)
  • webtechnologies (e.g., web 2.0, skype)
  • systems technologies
  • communication protocols
  • malware operations
  • mobile technologies (e.g., smart phones)
  • telecommunication technologies
  • backups and archiving (e.g., local, network)

Analysis/Assessment 13%

  • data analysis
  • systems analysis
  • risk assessments
  • technical assessment methods

Security 25%

  • systems security controls
  • application/fileserver
  • firewalls
  • cryptography
  • network security
  • physical security
  • threat modeling
  • verification procedures (e.g.,false positive/negative validation)
  • social engineering (human factors manipulation)
  • vulnerability scanners
  • security policy implications
  • privacy/confidentiality (with regard to engagement)
  • biometrics
  • wireless access technology (e.g., networking, RFID, Blue tooth)
  • trusted networks
  • vulnerabilities

Tools/Systems/Programs 32%

  • network/host based intrusion
  • network/wireless sniffers (e.g., WireShark, Airsnort)
  • access control mechanisms (e.g., smart cards)
  • cryptography techniques (e.g., IPsec, SSL, PGP)
  • programming languages (e.g. C++, Java, C#, C)
  • scripting languages (e.g., PHP, Java script)
  • boundary protection appliances (e.g., DMZ)
  • network topologies
  • subnetting
  • port scanning (e.g., NMAP)
  • domain name system (DNS)
  • routers/modems/switches
  • vulnerability scanner (e.g., Nessus, Retina)
  • vulnerability management and protection systems (e.g., Foundstone, Ecora)
  • operating environments (e.g., Linux, Windows, Mac)
  • antivirus systems and programs
  • log analysis tools
  • security models
  • exploitation tools
  • database structures

Procedures/Methodology 20%

  • cryptography
  • public key infrastructure (PKI)
  • Security Architecture (SA)
  • Service Oriented Architecture (SOA)
  • information security incident management
  • N-tier application design
  • TCP/IP networking (e.g., network routing)
  • security testing methodology

Regulation/Policy 4%

  • security policies
  • compliance regulations (e.g., PCI)

Ethics 2%

  • professional code of conduct
  • appropriateness of hacking activities

© 2006 ExamBrainDumps