Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 39

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 39

1. Which of the following best describes a lock shim?
2. On her way to work, Angela accidentally left her backpack with a company laptop at the coffee shop. What type of threat has she caused the company?
3. Joe, a bookkeeper, works in a cubicle environment and is often called away from his desk. Joe doesn't want to sign out of his computer each time he leaves.

Which of the following is the best solutions for securing Joe's workstation?

4. When a penetration tester starts gathering details about employees, vendors, business processes, and physical security, which phase of testing are they in?

5. Whois, Nslookup, and ARIN are all examples of which of the following?

6. You are working on firewall evasion countermeasures and are specifically looking for a tool to expose TTL vulnerabilities. Which of the following tools would you use?
7. Which of the following best describes source routing?
8. Which of the following types of Bluetooth hacking is a denial-of-service attack?

9. You are using software as a service (SaaS) in your office. Who is responsible for the security of the data stored in the cloud?

10. You are using BlazeMeter to test cloud security. Which of the following best describes BlazeMeter?