Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 19

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 19

1. Which of the following best describes a gray box penetration test?
2. Randy was just hired as a penetration tester for the red team. Which of the following best describes the red team?
3. The Stuxnet worm was discovered in 2010 and was used to gain sensitive information on Iran's industrial infrastructure. This worm was probably active for about five years before being discovered. During this time, the attacker had access to the target.

Which type of attack was Stuxnet?

4. Which type of threat actor only uses skills and knowledge for defensive purposes?

5. Closed-circuit television can be used as both a preventative tool (to monitor live events) or as an investigative tool (to record events for later playback). Which camera is more vandal-resistant than other cameras?

6. Important aspects of physical security include which of the following?
7. You want a list of all open UDP and TCP ports on your computer. You also want to know which process opened the port, which user created the process, and what time is was created. Which of the following scanning tools should you use?
8. Which of the following best describes the scan with ACK evasion method?

9. Cameron wants to send secret messages to his friend Brandon, who works at a competitor's company. To secure these messages, he uses a technique to hide a secret message within a video. Which of the following techniques is he using?

10. Which of the following laws is designed to regulate e-mails?