Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 27

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 27

1. Miguel is performing a penetration test. His client needs to add Miguel's computer to the list of devices allowed to connect to the network. What type of security exception is this?
2. Michael is performing a penetration test for a hospital. Which federal regulation does Michael need to ensure he follows?
3. Social engineers are master manipulators. Which of the following are tactics they might use?

4. Which of the following best describes a script kiddie?

5. LDAP is an internet protocol for accessing distributed directory services. If this port is open, it indicates that Active Directory or Exchange may be in use. What port does LDAP use?

6. Shawn, a malicious insider, has obtained physical access to his manager's computer and wants to listen for incoming connections. He has discovered the computer's IP address, 192.168.34.91, and he has downloaded netcat.

Which of the following netcat commands would he enter on the two computers?
7. Who would be most likely to erase only parts of the system logs file?
8. Phil, a hacker, has found his way into a secure system. He is looking for a Windows utility he can use to retrieve, set, back up, and restore logging policies. Which of the following utilities should he consider?

9. HTTP headers can contain hidden parameters such as user-agent, host headers, accept, and referrer. Which of the following tools could you use to discover hidden parameters?

10. Web applications use sessions to establish a connection and transfer sensitive information between a client and a server. Attacking an application's session management mechanisms can help you get around some of the authentication controls and allow you to use the permissions of more privileged application users.

Which of the following type of attacks could you use to accomplish this?