Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 16

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 16

1. Penetration testing is the practice of finding vulnerabilities and risks with the purpose of securing a computer or network. Penetration testing falls under which all-encompassing term?
2. Heather is performing a penetration test. She has gathered a lot of valuable information on her target already. Heather has used some different tools and determined that on her target's network, a computer named Production Workstation has port 445 open.

Which step in the ethical hacking methodology is Heather performing?
3. Which type of penetration test is required to ensure an organization is following federal laws and regulations?

4. Which of the following defines the security standards for any organization that handles cardholder information for any type of payment card?

5. Using a fictitious scenario to persuade someone to perform an action or give information they aren't authorized to share is called which of the following?

6. Ron, a hacker, wants to get access to a prestigious law firm he has been watching for a while. June, an administrative assistant at the law firm, is having lunch at the food court around the corner from her office. Ron notices that June has a picture of a dog on her phone. He casually walks by and starts a conversation about dogs.

Which phase of the social engineering process is Ron in?
7. Information transmitted by the remote host can be captured to expose the application type, application version, and even operating system type and version. Which of the following is a technique hackers use to obtain information about the services running on a target system?
8. Joe wants to use a stealthy Linux tool that analyzes network traffic and returns information about operating systems.  Which of the following banner grabbing tools is he most likely to use?

9. Which of the following types of web server attacks is characterized by altering or vandalizing a website's appearance in an attempt to humiliate, discredit, or annoy the victim?

10. Which of the following best describes a phishing attack?