Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 41

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 41

1. Which of the following best describes the Wassenaar Arrangement?
2. Which of the following best describes the rules of engagement document?
3. Which of the following elements of penetration testing includes the use of web surfing, social engineering, dumpster diving, and social networking?

4. Which of the following is the difference between an ethical hacker and a criminal hacker?

5. Which of the following packet crafting software programs can be used to modify flags and adjust other packet content?

6. Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on the network?
7. Which of the following best describes the purpose of the wireless attack type known as wardriving?
8. The ACME company has decided to implement wireless technology to help improve the productivity of their employees. As the cybersecurity specialist for this company, you have the responsibility of seeing that the wireless network is as secure as possible.

Which of the following best describes one of the first countermeasures that should be used to ensure wireless security?

9. Which of the following is an entity that accepts and validates information contained within a request for a certificate?

10. Which of the following describes a PKI?