Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 47

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 47

1. Robby, a security specialist, is taking countermeasures for SNMP. Which of the following utilities would he most likely use to detect SNMP devices on the network that are vulnerable to attacks?
2. This government resource is a community-developed list of common software security weaknesses. They strive to create commonality in the descriptions of weaknesses of software security.

Which of the following government resources is described?
3. You are looking for a vulnerability assessment tool that detects vulnerabilities in mobile devices and gives you a report containing a total risk score, a summary of revealed vulnerabilities, and remediation suggestions.

Which of the following vulnerability assessment tools should you use?

4. Which of the following would be the best open-source tool to use if you are looking for a web server scanner?

5. You are cleaning your desk at work. You toss several stacks of paper in the trash, including a sticky note with your password written on it. Which of the following types of non-technical password attacks have you enabled?

6. Which of the following techniques involves adding random bits of data to a password before it is stored as a hash?
7. Which of the following firewall limitations is a critical vulnerability because it means that packet filters cannot tell whether a connection was started inside or outside the organization?
8. Which of the following firewall technologies operates at Layers 3 (Network) and 4 (Transport) of the OSI model?

9. Which of the following honeypot interaction levels can't be compromised completely and is generally set to collect information about attacks like network probes and worms?

10. Which of the following best describes a certificate authority (CA)?