Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 33

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 33

1. During an authorized penetration test, Michael discovered his client's financial records. Which of the following should he do?
2. Which of the following precautions does a penetration tester need to take when working with medical records?
3. Which of the following solutions creates the risk that a hacker might gain access to the system?

4. Which of the following assessment types relies on each step to determine the next step, and then only tests relevant areas of concern?

5. An IT technician receives an IDS alert on the company network she manages. A seemingly random user now has administration privileges in the system, some files are missing, and other files seem to have just been created.

Which of the following alerts did this technician receive?

6. Which of the following IDS detection types compare behavior to baseline profiles or network behavior baselines?
7. You are analyzing the web applications in your company and have newly discovered vulnerabilities. You want to launch a denial-of-service (DoS) attack against the web server.

Which of the following tools would you most likely use?
8. Which of the following types of injections can be injected into conversations between an application and a server to generate excessive amounts of spam e-mail?

9. Which of the following can void a mobile device's warranty, cause poor performance, or brick a mobile device (making it impossible to turn on or repair)?

10. Jose, a medical doctor, has a mobile device that contains sensitive patient information. He is concerned about unauthorized access to the data if the device is lost or stolen.

Which of the following is the best option for preventing this from happening?