Create Account

ECCouncil 312-50V7

Ethical Hacking and Countermeasures (CEHv7)

Free Questions in OTE format

Click on file name to import it and enjoy with free basic account at Loorex!
Have a file? A Starter account at Loorex.com will be given for each uploaded file.
File Date Q&A Votes Size  
ECCouncil.312-50V7.v2016-03-26.505q.ote 2016-03-26 505 1/0 6.74 Mb

Notification about new ECCouncil 312-50V7 files

Subscribe to ECCouncil 312-50V7 dump here, you will be informed about new OTE files.
Subscribe
Registered members can subscribe in one click and easily manage their subscription. Please create an account, it is free!

About ECCouncil 312-50V7 dump

Background 4%

  • networking technologies (e.g., hardware, infrastructure)
  • webtechnologies (e.g., web 2.0, skype)
  • systems technologies
  • communication protocols
  • malware operations
  • mobile technologies (e.g., smart phones)
  • telecommunication technologies
  • backups and archiving (e.g., local, network)

Analysis/Assessment 13%

  • data analysis
  • systems analysis
  • risk assessments
  • technical assessment methods

Security 25%

  • systems security controls
  • application/fileserver
  • firewalls
  • cryptography
  • network security
  • physical security
  • threat modeling
  • verification procedures (e.g.,false positive/negative validation)
  • social engineering (human factors manipulation)
  • vulnerability scanners
  • security policy implications
  • privacy/confidentiality (with regard to engagement)
  • biometrics
  • wireless access technology (e.g., networking, RFID, Blue tooth)
  • trusted networks
  • vulnerabilities

Tools/Systems/Programs 32%

  • network/host based intrusion
  • network/wireless sniffers (e.g., WireShark, Airsnort)
  • access control mechanisms (e.g., smart cards)
  • cryptography techniques (e.g., IPsec, SSL, PGP)
  • programming languages (e.g. C++, Java, C#, C)
  • scripting languages (e.g., PHP, Java script)
  • boundary protection appliances (e.g., DMZ)
  • network topologies
  • subnetting
  • port scanning (e.g., NMAP)
  • domain name system (DNS)
  • routers/modems/switches
  • vulnerability scanner (e.g., Nessus, Retina)
  • vulnerability management and protection systems (e.g., Foundstone, Ecora)
  • operating environments (e.g., Linux, Windows, Mac)
  • antivirus systems and programs
  • log analysis tools
  • security models
  • exploitation tools
  • database structures

Procedures/Methodology 20%

  • cryptography
  • public key infrastructure (PKI)
  • Security Architecture (SA)
  • Service Oriented Architecture (SOA)
  • information security incident management
  • N-tier application design
  • TCP/IP networking (e.g., network routing)
  • security testing methodology

Regulation/Policy 4%

  • security policies
  • compliance regulations (e.g., PCI)

Ethics 2%

  • professional code of conduct
  • appropriateness of hacking activities

© 2006 ExamBrainDumps