Skip survey header

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 50

Certified Ethical Hacker Practice Quiz: 312-50 Quiz 50

1. Which of the following is the most basic way to counteract SMTP exploitations?
2. On your network, you have a Windows 10 system with the IP address 10.10.10.195. You have installed XAMPP along with some web pages, php, and forms. You want to put it on the public-facing internet, but you are not sure if it has any vulnerabilities.

On your Kali Linux system, you have downloaded the nmap-vulners script from GitHub. Which of the following is the correct nmap command to run?
3. Jack is tasked with testing the password strength for the users of an organization. He has limited time and storage space. Which of the following would be the best password attack for him to choose?

4. Sam has used malware to access Sally's computer on the network. He has found information that will allow him to use the underlying NTLM to escalate his privileges without needing the plaintext password.

Which of the following types of attacks did he use?

5. Which of the following is the name of the attribute that stores passwords in a Group Policy preference item in Windows?

6. Which of the following privilege escalation risks happens when a program is being installed without the constant supervision of the IT employee and fails to clean up after?
7. Which of the following is a tool for cracking Windows login passwords using rainbow tables?
8. Jerry runs a tool to scan a clean system to create a database. The tool then scans the system again and compares the second scan to the clean database. Which of the following detection methods is Jerry using?

9. What are the two types of Intrusion Detection Systems (IDSs)?

10. Which of the following is a sign of a network-based intrusion?