Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 12

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 12

1. During a firewall rulebase analysis, Walt discovers the rule below on his organization’s firewall. Which one of the following best describes this rule?

2. Andrea is concerned about the risk of piggybacking attacks against her organization. Which one of the following controls would best prevent this risk from materializing?
3. Which one of the following controls would be the least effective protection against a SQL injection attack?

4. Cathi is performing a port scan using nmap and would like to configure the scanner to fully scan all target addresses, even if they are not answering ping requests. What option can she use to achieve this goal?

5. Brian would like to adopt a security technology to assist with log aggregation, correlation, and analysis. Which one of the following tools would be best suited for this task?

6. Alice sent an encrypted message to Bob using public key cryptography. What key should Bob use to decrypt the message?
7. Which one of the following is not a private IP address?
8. Gary is performing a penetration test of a healthcare organization in Alabama and is considering the compliance issues associated with the test. Which one of the following compliance obligations is most likely to be applicable?

9. Melanie recently completed a risk assessment where she rated the risk of a DDoS attack as a serious threat. She is considering purchasing a DDoS protection service. What type of risk management strategy is she pursuing?

10. Ryan ran a backup that created a copy of all files that have changed since the most recent full backup, regardless of whether they were included in other non-full backups performed between the last full backup and now. What type of backup did Ryan run?