Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 49

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 49

1. Which of the following best describes IPsec enumeration?
2. The Simple Network Management Protocol (SNMP) is used to manage devices such as routers, hubs, and switches. SNMP works with an SNMP agent and an SNMP management station in which layer of the OSI model?
3. Which of the following includes a list of resolved vulnerabilities?

4. Which of the following includes all possible characters or values for plaintext?

5. Which of the following best describes a DoS attack?

6. Which of the following best describes a reverse proxy method for protecting a system from a DoS attack?
7. You are using a password attack that tests every possible keystroke for each single key in a password until the correct one is found. Which of the following technical password attacks are you using?
8. Which of the following Bluetooth hacking tools is a complete framework to perform man-in-the-middle attacks on Bluetooth smart devices?

9. Which of the following is the number of keys used in symmetric encryption?

10. You work for a company that is implementing symmetric cryptography to process payment applications such as card transactions where personally identifiable information (PII) needs to be protected to prevent identity theft or fraudulent charges.

Which of the following algorithm types would be best for transmitting large amounts of data?