Reader small image

You're reading from  Certified Ethical Hacker (CEH) v12 312-50 Exam Guide

Product typeBook
Published inJul 2022
PublisherPackt
ISBN-139781801813099
Edition1st Edition
Right arrow
Author (1)
Dale Meredith
Dale Meredith
author image
Dale Meredith

Dale Meredith is an EC-Council Certified Ethical Hacker/Instructor and a Microsoft Certified Trainer. Dale has over 10 years of senior IT management experience and was a CTO for an ISP. Dale's skill as an IT trainer lies in clarifying complicated concepts and ensuring students understand the theories. Dale's teaching style is memorable and entertaining. His expertise has led to many opportunities, including teaching teams in Fortune 500 firms, universities globally, the Department of Homeland Security, and many US military branches. Along with authoring video courses, consulting, and classroom training, you can catch Dale on stage speaking at IT conferences around the world, helping teams keep their companies safe, relevant, and breach- aware.
Read more about Dale Meredith

Right arrow

Exam questions

Please choose the best answer to the following questions. Some questions may have more than one possible answer, as indicated in the question:

  1. When is it appropriate to test another person's system?
    1. If you've been given permission or have been invited to do so
    2. If you believe the system has been hacked
    3. When you've discovered a vulnerability in the system
    4. If you believe the system is valuable
  2. If you were using the Shodan web service, which device would you use?
    1. Web servers
    2. IoT
    3. Mobile
    4. Cloud storage servers
  3. Which type of scanning is a packet with all flags set?
    1. SYN scan
    2. TCP connect
    3. Full open scan
    4. XMAS scan
  4. Which of the following best describes enumeration?
    1. User and machine name identification
    2. Identifying the network's active systems
    3. Password cracking
    4. Router and firewall identification
  5. To find a vulnerability, an attacker sends probes and forged requests to a target. Which kind of scan is being performed?
    1. Active
    2. Passive
    3. Flooding
    4. MiTM
  6. Which hashing...
lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide
Published in: Jul 2022Publisher: PacktISBN-13: 9781801813099

Author (1)

author image
Dale Meredith

Dale Meredith is an EC-Council Certified Ethical Hacker/Instructor and a Microsoft Certified Trainer. Dale has over 10 years of senior IT management experience and was a CTO for an ISP. Dale's skill as an IT trainer lies in clarifying complicated concepts and ensuring students understand the theories. Dale's teaching style is memorable and entertaining. His expertise has led to many opportunities, including teaching teams in Fortune 500 firms, universities globally, the Department of Homeland Security, and many US military branches. Along with authoring video courses, consulting, and classroom training, you can catch Dale on stage speaking at IT conferences around the world, helping teams keep their companies safe, relevant, and breach- aware.
Read more about Dale Meredith