Certified Ethical Hacker Practice Exam 3 CEH (312-50)

Certified Ethical Hacker Practice Exam 3 CEH (312-50)

___________ involves sending an email, usually posing as a bank, credit card Company, or any other financial organization. The email requests that the recipient confirm banking information or reset passwords or PINs.





In security terms, MITM stands for ______________________





This is also known as half-open scanning. The hacker sends a SYN packet and receives a SYN-ACK back from the server. A full TCP connection isn’t opened. Open ports reply with a SYN/ACK while closed ports reply with a RST/ACK.





_________________ involves performing a security evaluation and testing with no prior knowledge of the network infrastructure or system to be tested. Testing simulates an attack by a malicious hacker outside the organization’s security perimeter. This testing can take the longest amount of time and most effort as no information is given to the testing team.





A program which is disguised a something non-threatening is called a _________





Viruses affect some of the below components of a system. Choose two.





DNS uses which of the below port number





Which of these is not a group in which hackers are categorized?





Phases of Ethical Hacking, the proper Sequence would be.





____________infects another executable and uses this carrier program to spread itself. Thevirus code is injected into the previously benign program and is spread when the program is run.





Question 1 of 10