Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 22

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 22

1. After performing a risk assessment, an organization must decide what areas of operation can be included in a penetration test and what areas cannot be included. Which of the following describes the process?
2. You are performing a penetration test of a local area network (LAN). Refer to the circled area on the network diagram. network. Which of the following types of penetration tests is being performed?
3. You get a call from one of your best customers. The customer is asking about your company's employees, teams, and managers. What should you do?

4. Jason is at home, attempting to access the website for his music store. When he goes to the website, it has a simple form asking for name, email, and phone number. This is not the music store website. Jason is sure the website has been hacked.

How did the attacker accomplish this hack?

5. Which of the following best describes CCleaner?

6. Mark is moving files from a device that is formatted using NTFS to a device that is formatted using FAT. Which of the following is he trying to get rid of?
7. Ports that show a particular service running but deny a three-way handshake connection indicate the potential presence of which of the following?
8. Which of the following best describes the HTTP Request/Response TRACE?

9. Which of the following is the most frequently used symmetric key stream cipher?

10. Which of the following is a characteristic of the Advanced Encryption Standard (AES) symmetric block cipher?