Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 13

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 13

1. Tim is reviewing the risk of a technical attack against his organization. He determines that there is a 10 percent chance that the attack will occur each year. What metric is this?
2. Which one of the following network devices is typically used to assign standard network users to a VLAN?
3. Dennis identified an IP address that has been relentlessly attacking his network. When is it appropriate for him to attempt to hack back and stop the attacks?

4. Joan discovered that a piece of malware has been spreading from system to system on her network by automatically scanning for open file shares and connecting to them with default credentials. What term best describes this malware?

5. When evaluating a biometric authentication system, which metric offers the best understanding of a system’s performance?

6. Wanda determined that a system she is targeting runs Red Hat. She would like to identify user accounts on that system. What Metasploit module would best meet this goal?
7. Norm would like to crack a password file from a Linux system. Which one of the following tools would be least useful to him?
8. What nmap command line option causes nmap to run as aggressively as possible?

9. Which one of the following vulnerability scanners is specifically designed to perform web application testing?

10. Who is responsible for creating the public key that is contained within a digital certificate?