Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 30

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 30

1. Which of the following best describes a goal-based penetration test?
2. A goal-based penetration test needs to have specific goals. Using SMART goals is extremely useful for this. What does SMART stand for?
3. Which document explains the details of an objective-based test?

4. There are two non-government sites that provide lists of valuable information for ethical hackers. Which of the following best describes the Full Disclosure site?

5. Which of the following are protocols included in the IPsec architecture?

6. A penetration tester discovers a vulnerable application and is able to hijack a website's URL hyperlink session ID. The penetration tester is able to intercept the session ID; when the vulnerable application sends the URL hyperlink to the website, the session IDs are embedded in the hyperlink.

Which of the following types of session hijacking countermeasures is the penetration tester using?
7. The SQL injection methodology has four parts. Which of the following parts is similar to playing the game 20 questions?
8. Which of the following best describes the SQL Power Injector tool?

9. During a penetration test, Omar found unpredicted responses from an application. Which of the following tools was he most likely using while assessing the network?

10. Which of the following is the number of keys used in asymmetric (public key) encryption?