Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 20

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 20

1. Which statement best describes a suicide hacker?
2. Miguel has been practicing his hacking skills. He has discovered a vulnerability on a system that he did not have permission to attack. Once Miguel discovered the vulnerability, he anonymously alerted the owner and instructed him how to secure the system.

What type of hacker is Miguel in this scenario?
3. Charles is updating the policy that affects security patches. Which of the following policies is he updating?

4. Which of the following policies would cover what you should do in case of a data breach?

5. Xavier is doing reconnaissance. He is gathering information about a company and its employees by going through their social media content. Xavier is using a tool that pulls information from social media postings that were made using location services.

What is the name of this tool?

6. You are in the reconnaissance phase at the XYZ company. You want to use nmap to scan for open ports and use a parameter to scan the 1,000 most common ports.

Which nmap command would you use?
7. Analyzing emails, suspect files, and systems for malware is known as which of the following?
8. Which of the following best describes an anti-virus sensor system?

9. Which of the following steps in an Android penetration test checks for a vulnerability hackers use to break down the browser's sandbox using infected JavaScript code?

10. Which of the following bring-your-own-device (BYOD) risks is both a security issue for an organization and a privacy issue for a BYOD user?