Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 24

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 24

1. Which of the following best describes social engineering?
2. Which of the following is considered a mission-critical application?
3. In a world where so much private information is stored and transferred digitally, it is essential to proactively discover weaknesses. An ethical hacker's assessment sheds light on the flaws that can open doors for malicious attackers.

Which of the following types of assessments does an ethical hacker complete to expose these weeknesses?

4. Which of the following assessment types focus on all types of user risks, including threats from malicious users, ignorant users, vendors, and administrators?

5. A virus has replicated itself throughout the infected systems and is executing its payload. Which of the following phases of the virus lifecycle is the virus in?

6. Heather is performing a penetration test of her client's malware protection. She has developed a malware program that doesn't require any user interaction and wants to see how far it will spread through the network.

Which of the following types of malware is she using?
7. Gathering information about a system, its components, and how they work together is known as which of the following?
8. Which of the following footprinting methods would you use to scan a web server to find ports that the web server is using for various services?

9. Above all else, which of the following must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?

10. Kathy doesn't want to purchase a digital certificate from a public certificate authority, but needs to establish a PKI in her local network. Which of the following actions should she take?