Certified Ethical Hacker – CEH – 312-50 – Question053

While performing data validation of web content, a security technician is required to restrict malicious input. Which of the following processes is an efficient way of restricting malicious input?


A.
Validate web content input for query strings.
B. Validate web content input with scanning tools.
C. Validate web content input for type, length, and range.
D. Validate web content input for extraneous queries.

Correct Answer: C

Certified Ethical Hacker – CEH – 312-50 – Question051

A consultant is hired to do physical penetration testing at a large financial company. In the first day of his assessment, the consultant goes to the company`s building dressed like an electrician and waits in the lobby for an employee to pass through the main
access gate, then the consultant follows the employee behind to get into the restricted area. Which type of attack did the consultant perform?


A.
Man trap
B. Tailgating
C. Shoulder surfing
D. Social engineering

Correct Answer: B

Certified Ethical Hacker – CEH – 312-50 – Question047

A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.

Which cryptography attack is the student attempting?


A.
Man-in-the-middle attack
B. Brute-force attack
C. Dictionary attack
D. Session hijacking

Correct Answer: C