Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 23

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 23

1. Miguel is performing a penetration test on a web server. Miguel was given only the server's IP address and name. Which of the following best describes the type of penetration test Miguel is performing?
2. Which of the following elements is generally considered the weakest link in an organization's security?
3. You are in the process of implementing policies and procedures that require employee identification. You observe employees holding a secure door for others to pass through.

Which of the following training sessions should you implement to help prevent this in the future?

4. You have a set of DVD-RW discs that were used to archive files from your latest project. You need to prevent the sensitive information on the discs from being compromised.

Which of the following methods should you use to destroy the data?

5. A crypter is a software program used in creating malware. Which of the following best defines what this program does?

6. Which of the following virus types is triggered by an event, such as the arrival of a specific date and time, or a program being executed?
7. Which of the following types of wireless antenna is a high-gain antenna that uses a curved surface?
8. Which of the following best describes a wireless hotspot?

9. Mary is using asymmetric cryptography to send a message to Sam so that only Sam can read it. Which of the following keys should she use to encrypt the message?

10. Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which of the following cryptographic keys would Mary use to create the digital signature?