Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 31

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 31

1. Which of the following best describes a supply chain? 
2. Heather has been hired to work in a firm's cybersecurity division. Her role will include performing both offensive and defensive tasks. Which of the following roles applies to Heather?
3. Jaxon, a pentester, is discovering vulnerabilities and design flaws on the Internet that will open an operating system and applications to attack or misuse. Which of the following tasks is he accomplishing?

4. Which of the following assessment types can monitor and alert on attacks but cannot stop them?

5. Which of the following describes a session ID?

6. Which of the following is characterized by an attacker using a sniffer to monitor traffic between a victim and a host?
7. You are looking for a web server security tool that will detect hidden malware in websites and advertisements. Which of the following security tools would you most likely use?
8. Which type of web application requires a separate application to be installed before you can use the app?

9. James, a penetration tester, uses nmap to locate mobile devices attached to a network. Which of the following mobile device penetration testing stages is being implemented?

10. Which of the following describes the exploitation stage of the mobile device penetration testing process?