Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 28

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 28

1. Charles found a song he wrote being used without his permission in a video on YouTube. Which law will help him protect his work?
2. Which of the following best describes what FISMA does?
3. Any attack involving human interaction of some kind is referred to as which of the following?

4. You are instant messaging a coworker, and you get a malicious link. Which type of social engineering attack is this?

5. Which of the following services is most targeted during the reconnaissance phase of a hacking attack?

6. Dan wants to implement reconnaissance countermeasures to help protect his DNS service. Which of the following actions should he take?
7. Which of the following could a hacker use Alternate Data Streams (ADS) for?
8. James, a hacker, has hacked into a Unix system and wants to change the timestamps on some files to hide his tracks. Which of the following timestamp tools would he most likely use?

9. You have just discovered that a hacker is trying to penetrate your network using MAC spoofing. Which of the following best describes MAC spoofing?

10. A user is having trouble connecting to a newly purchased Bluetooth device. An administrator troubleshoots the device using a Linux computer with BlueZ installed. The administrator sends an echo request to the device's Bluetooth MAC address to determine whether the device responds.

Which of the following commands was used?