Certified Ethical Hacker – CEH – 312-50 – Question454

A company recently hired your team of Ethical Hackers to test the security of their network systems. The company wants to have the attack be as realistic as possible. They did not provide any information besides the name of their company. What phase of security testing would your team jump in right away?


A.
Scanning
B. Reconnaissance
C. Escalation
D. Enumeration

Correct Answer: B

Certified Ethical Hacker – CEH – 312-50 – Question452

You are about to be hired by a well known Bank to perform penetration tests. Which of the following documents describes the specifics of the testing, the associated violations, and essentially protects both the banks interest and your liabilities as a tester?


A.
Service Level Agreement
B. Non-Disclosure Agreement
C. Terms of Engagement
D. Project Scope

Correct Answer: C

Certified Ethical Hacker – CEH – 312-50 – Question451

A big company, who wanted to test their security infrastructure, wants to hire elite pen testers like you. During the interview, they asked you to show sample reports from previous penetration tests. What should you do?


A.
Share reports, after NDA is signed
B. Share full reports, not redacted
C. Decline but, provide references
D. Share full reports with redactions

Correct Answer: C

Certified Ethical Hacker – CEH – 312-50 – Question447

What is the approximate cost of replacement and recovery operation per year of a hard drive that has a value of $300 given that the technician who charges $10/hr would need 10 hours to restore OS and Software and needs further 4 hours to restore the
database from the last backup to the new hard disk? Calculate the SLE, ARO, and ALE. Assume the EF = 1 (100%).


A.
$440
B. $100
C. $1320
D. $146

Correct Answer: D

Certified Ethical Hacker – CEH – 312-50 – Question445

Matthew received an email with an attachment named YouWon$10Grand.zip. The zip file contains a file named HowToClaimYourPrize.docx.exe. Out of excitement and curiosity, Matthew opened the said file. Without his knowledge, the file copies itself to
Matthews APPDATAIocaI directory and begins to beacon to a Command-and-control server to download additional malicious binaries. What type of malware has Matthew encountered?


A.
Key-logger
B. Trojan
C. Worm
D. Macro Virus

Correct Answer: B