Exam Name: | Ethical Hacking and Countermeasures | ||
Exam Code: | 312-50 Dumps | ||
Vendor: | ECCouncil | Certification: | Certified Ethical Hacker |
Questions: | 765 Q&A's | Shared By: | robbie |
A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?
Which of the following programs is usually targeted at Microsoft Office products?
Which of the following is an application that requires a host application for replication?