Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 40

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 40

1. Which of the following best describes a non-disclosure agreement?
2. A person in a dark grey hoodie has jumped the fence at your research center. A security guard has detained this person, denying him physical access. Which of the following areas of physical security is the security guard currently in?
3. What are the three factors to keep in mind with physical security?

4. Which enumeration process tries different combinations of usernames and passwords until it finds something that works?

5. Which of the following enumeration tools provides information about users on a Linux machine?

6. Which of the following tools can be used to create botnets?
7. A hacker has discovered UDP protocol weaknesses on a target system. The hacker attempts to send large numbers of UDP packets from a system with a spoofed IP address, which broadcasts out to the network in an attempt to flood the target system with an overwhelming amount of UDP responses.

Which of the following DoS attacks is the hacker attempting to use?
8. The ping command is designed to test connectivity between two computers. There are several command options available to customize ping, making it a useful tool for network administrators.

On Windows, the default number of ping requests is set is four. Which of the following command options will change the default number of ping requests?

9. You are configuring several wireless access points for your network. Knowing that each access point will have a service set identifier (SSID), you want to ensure that it is configured correctly. Which of the following SSID statements are true?

10. You are configuring a wireless access point and are presented with the image shown below. Which of the following is the most correct statement regarding the access point's configuration?