Certified Ethical Hacker Practice Exam 3 CEH (312-50)

Certified Ethical Hacker Practice Exam 3 CEH (312-50)


In security terms, MITM stands for ______________________

 
 
 
 

This is also known as half-open scanning. The hacker sends a SYN packet and receives a SYN-ACK back from the server. A full TCP connection isn’t opened. Open ports reply with a SYN/ACK while closed ports reply with a RST/ACK.

 
 
 
 

_________________ involves performing a security evaluation and testing with no prior knowledge of the network infrastructure or system to be tested. Testing simulates an attack by a malicious hacker outside the organization’s security perimeter. This testing can take the longest amount of time and most effort as no information is given to the testing team.

 
 
 
 

A program which is disguised a something non-threatening is called a _________

 
 
 
 

Phases of Ethical Hacking, the proper Sequence would be.

 
 
 
 

___________ involves sending an email, usually posing as a bank, credit card Company, or any other financial organization. The email requests that the recipient confirm banking information or reset passwords or PINs.

 
 
 
 

Which of these is not a group in which hackers are categorized?

 
 
 
 

DNS uses which of the below port number

 
 
 
 

Viruses affect some of the below components of a system. Choose two.

 
 
 
 

____________infects another executable and uses this carrier program to spread itself. Thevirus code is injected into the previously benign program and is spread when the program is run.

 
 
 
 


Question 1 of 10


Search

Shortcodes Ultimate

 
Follow Us
 
BGP