Certified Ethical Hacker – CEH – 312-50 – Question463

If you are to determine the attack surface of an organization, which of the following is the BEST thing to do?


A.
Running a network scan to detect network services in the corporate DMZ
B. Reviewing the need for a security clearance for each employee
C. Using configuration management to determine when and where to apply security patches
D. Training employees on the security policy regarding social engineering

Correct Answer: A

Certified Ethical Hacker – CEH – 312-50 – Question461

While doing a technical assessment to determine network vulnerabilities, you used the TCP XMAS scan. What would be the response of all open ports?


A.
The port will send an ACK
B. The port will send a SYN
C. The port will ignore the packets
D. The port will send an RST

Correct Answer: C

Explanation:

Reference: https://nmap.org/book/man-port-scanning-techniques.html

Certified Ethical Hacker – CEH – 312-50 – Question460

It is a widely used standard for message logging. It permits separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them. This protocol is specifically designed for transporting event messages.
Which of the following is being described?


A.
SNMP
B. ICMP
C. SYSLOG
D. SMS

Correct Answer: C

Certified Ethical Hacker – CEH – 312-50 – Question459

While doing a Black box pen test via the TCP port (80), you noticed that the traffic gets blocked when you tried to pass IRC traffic from a web enabled host. However, you also noticed that outbound HTTP traffic is being allowed. What type of firewall is being utilized for the outbound traffic?


A.
Stateful
B. Application
C. Circuit
D. Packet Filtering

Correct Answer: B

Certified Ethical Hacker – CEH – 312-50 – Question457

Backing up data is a security must. However, it also have certain level of risks when mishandled. Which of the following is the greatest threat posed by backups?


A.
A backup is the source of Malware or illicit information
B. A backup is incomplete because no verification was performed
C. A backup is unavailable during disaster recovery
D. An unencrypted backup can be misplaced or stolen

Correct Answer: D