Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 17

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 17

1. Which of the following is the third step in the ethical hacking methodology?
2. Miguel is performing a penetration test on his client's web-based application. Which penetration test frameworks should Miguel utilize?
3. Yesenia was recently terminated from her position, where she was using her personal cell phone for business purposes. Upon termination, her phone was remotely wiped. Which of the following corporate policies allows this action?

4. During a penetration test, Mitch discovers child pornography on a client's computer. Which of the following actions should he take?

5. Brandon is helping Fred with his computer. He needs Fred to enter his username and password into the system. Fred enters the username and password while Brandon is watching him.

Brandon explains to Fred that it is not a good idea to allow anyone to watch you type in usernames or passwords. Which type of social engineering attack is Fred referring to?

6. Which of the following best describes an inside attacker?
7. Which of the following flags is used by a TCP scan to direct the sending system to send buffered data?
8. TCP is a connection-oriented protocol that uses a three-way handshake to establish a connection to a system port. Computer 1 sends a SYN packet to Computer 2. Which packet does Computer 2 send back?

9. You have just run the John the Ripper command shown in the image. Which of the following was this command used for?

10. Carl received a phone call from a woman who states that she is calling from his bank. She tells him that someone has tried to access his checking account and she needs him to confirm his account number and password to discuss further details. He gives her his account number and password.

Which of the following types of non-technical password attack has occurred?