Certified Ethical Hacker – CEH – 312-50 – Question024

A penetration tester was hired to perform a penetration test for a bank. The tester began searching for IP ranges owned by the bank, performing lookups on the bank's DNS servers, reading news articles online about the bank, watching what times the bank employees come into work and leave from work, searching the bank's job postings (paying special attention to IT related jobs), and visiting the local dumpster for the bank's corporate office. What phase of the penetration test is the tester currently in?


A.
Information reporting
B. Vulnerability assessment
C. Active information gathering
D. Passive information gathering

Correct Answer: D

Certified Ethical Hacker – CEH – 312-50 – Question020

When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?


A.
Vulnerability scanning
B. Social engineering
C. Application security testing
D. Network sniffing

Correct Answer: B

Certified Ethical Hacker – CEH – 312-50 – Question016

Which of the following lists are valid data-gathering activities associated with a risk assessment?


A.
Threat identification, vulnerability identification, control analysis
B. Threat identification, response identification, mitigation identification
C. Attack profile, defense profile, loss profile
D. System profile, vulnerability identification, security determination

Correct Answer: A