Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 37

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 37

1. Which of the following best describes the scope of work (SOW) document?
2. During an authorized penetration test, Michael discovers a vulnerability that could affect his client's partner's network. Which of the following actions should he take?
3. This type of assessment evaluates deployment and communication between the server and client. It is imperative to develop tight security through user authorization and validation. Open-source and commercial tools are both recommended for this assessment.

Which of the following types of vulnerability research is being done?

4. First, you must locate the live nodes in the network. Second, you must itemize each open port and service in the network. Finally, you test each open port for known vulnerabilities. These are the three basic steps in which of the following types of testing?

5. Creating an area of the network where offending traffic is forwarded and dropped is known as which of the following?

6. It is important to be prepared for a DoS attack. These attacks are becoming more common. Which of the following best describes the response you should take for a service degradation?
7. Which of the following Bluetooth discovery tool commands will show the Bluetooth MAC address, clock offset, and class of each discovered device?
8. Which of the following Bluetooth discovery tools will produce the output shown below?

9. Strict supply chain management, comprehensive supplier assessment, HR resource requirements, transparent information security and management, compliance reporting, and a security breach notification process are defenses against which of the following cloud computing threats?

10. Which of the following attacks utilizes encryption to deny a user access to a device?