Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 18

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 18

1. The penetration testing life cycle is a common methodology used when performing a penetration test. This methodology is almost identical to the ethical hacking methodology. Which of the following is the key difference between these methodologies?
2. You are executing an attack in order to simulate an outside attack. Which type of penetration test are you performing?
3. Heather is in the middle of performing a penetration test when her client asks her to also check the security of an additional server. Which of the following documents does she need to submit before performing the additional task?

4. Which of the following is a deviation from standard operating security protocols?

5. The U.S. Department of Commerce has an agency with the goal of protecting organizational operations, assets, and individuals from threats such as malicious cyber-attacks, natural disasters, structural failures, and human errors.

Which of the following agencies was created for this purpose?

6. Which type of attack involves changing the boot order on a PC so that the hacker can gain access to the computer by bypassing the install operating system?
7. A client asking for small deviations from the scope of work is called which of the following?
8. After the enumeration stage, you have are considering blocking port 389. Your colleague has advised you to use caution when blocking ports that could potentially impact your network.

Which of the following necessary services could be blocked?

9. An attacker conducts a normal port scan on a host and detects protocols used by a Windows operating system and protocols used by a Linux operating system. Which of the following might this indicate?

10. Which of the following is another name for the signature-based detection method?