Certified Ethical Hacker Practice Exam 3 CEH (312-50)

Certified Ethical Hacker Practice Exam 3 CEH (312-50)

Which of these is not a group in which hackers are categorized?


_________________ involves performing a security evaluation and testing with no prior knowledge of the network infrastructure or system to be tested. Testing simulates an attack by a malicious hacker outside the organization’s security perimeter. This testing can take the longest amount of time and most effort as no information is given to the testing team.


___________ involves sending an email, usually posing as a bank, credit card Company, or any other financial organization. The email requests that the recipient confirm banking information or reset passwords or PINs.


____________infects another executable and uses this carrier program to spread itself. Thevirus code is injected into the previously benign program and is spread when the program is run.


A program which is disguised a something non-threatening is called a _________


Viruses affect some of the below components of a system. Choose two.


In security terms, MITM stands for ______________________


Phases of Ethical Hacking, the proper Sequence would be.


This is also known as half-open scanning. The hacker sends a SYN packet and receives a SYN-ACK back from the server. A full TCP connection isn’t opened. Open ports reply with a SYN/ACK while closed ports reply with a RST/ACK.


DNS uses which of the below port number


Question 1 of 10

Shortcodes Ultimate

Follow Us