Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 29

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 29

1. Which of the following best describes what SOX does?
2. Which of the following is a limitation of relying on regulations?
3. Typically, you think of the username as being the unique identifier behind the scenes, but Windows actually relies on the security identifier (SID). Unlike the username, a SID cannot be used again. When viewing data in the Windows Security Account Manager (SAM), you have located an account ending in -501.

Which of the following account types did you find?

4. What port does a DNS zone transfer use?

5. Which of the following best describes the key difference between DoS and DDoS?

6. An attacker may use compromised websites and emails to distribute specially designed malware to poorly secured devices. This malware provides an access point to the attacker, which he can use to control the device.

Which of the following devices can the attacker use?
7. Which of the following best describes a wireless access point?
8. You work for a very small company that has 12 employees. You have been asked to configure wireless access for them. Knowing that you have a very limited budget to work with, which of the following technologies should you use?

9. Bob encrypts a message using a key and sends it to Alice. Alice decrypts the message using the same key. Which of the following types of encryption keys is being used?

10. Which of the following is a characteristic of Triple DES (3DES)?