Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 35

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 35

1. Which of the following is a common corporate policy that would be reviewed during a penetration test?
2. During a penetration test, Tyler discovers one of the client's employees has unauthorized software installed on their computer. Which of the following actions should he take?
3. Which of the following phases of the vulnerability management lifecycle implements patches, hardening, and correction of weaknesses?

4. Rose, an ethical hacker, has created a report that clearly identifies her findings and recommendations for locking down an organization's systems and patching problems. Which of the following phases of the vulnerability management life cycle is she working in?

5. As the cybersecurity specialist for your company, you believe a hacker is using ARP poisoning to infiltrate your network. To test your hypothesis, you have used Wireshark to capture packets and then filtered the results.

After examining the results, which of the following is your best assessment regarding ARP poisoning?

6. Your network administrator is configuring settings so the switch shuts down a port when the max number of MAC addresses is reached. What is the network administrator taking countermeasures against?
7. Which term describes the process of sniffing traffic between a user and server, then redirecting the traffic to the attacker's machine, where malicious traffic can be forwarded to either the user or server?
8. Which of the following Bluetooth configuration and discovery tools can be used to check which services are made available by a specific device and can work when the device is not discoverable, but is still nearby?

9. Anabel purchased a smart speaker. She connected it to all the smart devices in her home. Which of the following communication models is she using?

10. Which of the following is a short-range wireless personal area network that supports low-power, long-use IoT needs?