Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 25

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 25

1. What does an organization do to identify areas of vulnerability within their network and security systems?
2. During a risk assessment, the organization determines that the risk of collecting personal data from its customers is not acceptable and stops. What method of dealing with risk is the organization using?
3. Nmap can be used for banner grabbing. Nmap connects to an open TCP port and returns anything sent in a five-second period. Which of the following is the proper nmap command?

4. Which of the following is an online tool that is used to obtain server and web server information?

5. Which of the following parts of the Trojan horse packet installs the malicious code onto the target machine?

6. Heather wants to gain remote access to Randy's machine. She has developed a program and hidden it inside a legitimate program that she is sure Randy will install on his machine.

Which of the following types of malware is she using?
7. An older technique for defeating honeypots is to use tarpits, which sometimes operate at different levels of the OSI model, depending on their function.

Which of the following layers of the OSI model do tarpits work at?
8. Julie is looking for a honeypot detection tool that is capable of packet manipulation. Which of the following tools should she use?

9. Which of the following is considered an out-of-band distribution method for private key encryption?

10. Which of the following best describes a feature of symmetric encryption?