Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 15

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 15

1. Greg is analyzing network traffic captured using Wireshark and notices that the SYN flag is set on a packet. Which one of the following protocols can he be certain is in use?
2. Brandy is conducting a vulnerability scan of an enterprise network and believes that there are Windows file shares in use on the network. Which protocol, if present, would be the best evidence supporting her theory?
3. Examine the code below. What programming language is it written in?

while complete == 0:
     complete=scan_system(i)
     i=i+1

 

4. Taylor is probing a DNS server and discovers that it is configured as an open resolver. What is the major risk associated with this configuration?

5. Greg is creating a fake digital certificate for use in a penetration test. He has created his own Certificate Authority. What key does he use to create the signature on the certificate?

6. Which one of the following tools is NOT normally used in web application security testing?
7. Which one of the following organizations is LEAST likely to be subject to the requirements of PCI DSS?
8. Dylan is analyzing the database queries sent by a web application. The application is intended to only read data from the database. Which one of the following queries should he expect to see?

9. During a port scan of a system, Veronica discovered that TCP port 22 is open. What service is likely supported by the system?

10. Which of the following network topologies is most commonly used on today’s wired production networks?