Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 46

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 46

1. Which of the following mobile security best practices for users is concerned with geotags?
2. Which of the following scans is used to actively engage a target in an attempt to gather information about it?
3. A hacker finds a target machine but wants to avoid getting caught, so the hacker finds another system to take the blame. This system is frequently called a zombie machine because it's disposable and creates a good distraction.

Which of the following port scans is being used?

4. Which of the following best describes Qualys Vulnerability Management assessment tool?

5. Clive, a penetration tester, is scanning for vulnerabilities on the network, specifically outdated versions of Apple iOS. Which of the following tools should he use?

6. Using sniffers has become one way for an attacker to view and gather network traffic. If an attacker overcomes your defenses and obtains network traffic, which of the following is the best countermeasure for securing the captured network traffic?
7. Jason, an attacker, has manipulated a client's connection to disconnect the real client and allow the server to think that he is the authenticated user. Which of the following describes what he has done?
8. You are a cybersecurity specialist. ACME, Inc. has hired you to install and configure their wireless network. As part of your installation, you have decided to use Wi-Fi Protected Access 2 (WPA2) security on all of your wireless access points. You want to ensure that the highest level of security is used.

Which of the following encryption protocols should you use to provide the highest level of security?

9. You are a cybersecurity consultant. The company hiring you suspects that employees are connecting to a rogue access point (AP). You need to find the name of the hidden rogue AP so it can be deauthorized.

Which of the following commands would help you locate the rouge access point from the wlp1s0 interface and produce the results shown?

10. Which key area in the mobile device security model is supported by device designers requiring passwords, biometrics, and two-factor authentication methods?