Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 36

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 36

1. Heather is working for a cybersecurity firm based in Florida. She will be conducting a remote penetration test for her client, who is based in Utah. Which state's laws and regulations will she need to adhere to?
2. United States Code Title 18, Chapter 47, Section 1029 deals with which of the following?
3. What type of scan is used to find system weaknesses such as open ports, access points, and other potential threats?

4. In which phase of the ethical hacking process do you gather information from a system to learn more about its configurations, software, and services?

5. Which of the following is used to remove files and clear the internet browsing history?

6. Which of the following is a protocol that allows authentication over a non-secure network by using tickets or service principal names (SPNs)?
7. As the cybersecurity specialist for your company, you have used Wireshark to check for man-in-the-middle DHCP spoofing attacks using the bootp filter. After examining the results, what is your best assessment?
8. Which of the following protocols is one of the most common methods used to protect packet information and defend against network attacks in VPNs?

9. Which of the following types of wireless antenna is shown?

10. Which of the following terms is the encrypted form of a message that is unreadable except to its intended recipient?