Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 48

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 48

1. Which of the following is a benefit of using a proxy when you find that your scanning attempts are being blocked?
2. Which of the following best describes telnet?
3. A hacker has managed to gain access to the /etc/passwd file on a Linux host. What can the hacker obtain from this file?

4. Which of the following best describes shoulder surfing?

5. A hacker finds a system that has a poorly design and unpatched program installed. He wants to create a backdoor for himself. Which of the following tools could he use to establish a backdoor?

6. Which of the following is also known as ZeroAccess and has virus, Trojan horse, and rootkit components?
7. Robin, an IT technician, has implemented identification and detection techniques based on the ability to distinguish legitimate traffic from illegitimate traffic over the network. Which of the following is he trying to achieve?
8. Jessica needs to set up a firewall to protect her internal network from the Internet. Which of the following would be the best type of firewall for her to use?

9. Which of the following encryption tools would prevent a user from reading a file that they did not create and does not require you to encrypt an entire drive?

10. Which of the following best explains why brute force attacks are always successful?