Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 45

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 45

1. John, a security specialist, conducted a review of the company's website. He discovered that sensitive company information was publicly available. Which of the following information sharing policies did he discover were being violated?
2. Randy is an ethical hacker student. He has learned how nmap flag manipulation can help find open ports. Although the name of the operating system did not jump right out at him, he might be able to figure it out by reviewing packet information.

In a packet, Randy can see a TTL of 255 and a window size of 4128. What type of scanning process is Randy using?
3. Which of the following government resources is a directory of known patterns of cyberattacks used by hackers?

4. The results section of an assessment report contains four sub-topics. Which of the following sub-sections contains the origin of the scan?

5. Using Wireshark filtering, you want to see all traffic except IP address Which of the following is the best command to filter a specific source IP address?

6. Karen received a report of all the mobile devices on the network. This report showed the total risk score, summary of revealed vulnerabilities, and remediation suggestions. Which of the following types of software generated this report?
7. Hugh, a security consultant, recommended the use of an internal and external DNS to provide an extra layer of security. Which of the following DNS countermeasures is being used?
8. An attacker is attempting to connect to a database using a web application system account instead of user-provided credentials. Which of the following methods is the attacker attempting to use?

9. Which of the following policies best governs the use of bring-your-own-device (BYOD) that connect with an organization's private network?

10. Which of the following cloud computing service models delivers software applications to a client either over the Internet or on a local area network?