PrepAway - Latest Free Exam Questions & Answers

Category: 312-50v9

Exam 312-50v9: Certified Ethical Hacker

Which type of attack did the consultant perform?

A consultant is hired to do physical penetration testing at a large financial company. In the first day of his
assessment, the consultant goes to the company`s building dressed like an electrician and waits in the lobby for
an employee to pass through the main access gate, then the consultant follows the employee behind to get into
the restricted area. Which type of attack did the consultant perform?

Which cryptography attack is the student attempting?

A computer science student needs to fill some information into a secured Adobe PDF job application that was
received from a prospective employer. Instead of requesting a new document that allowed the forms to be
completed, the student decides to write a script that pulls passwords from a list of commonly used passwords
to try against the secured PDF until the correct password is found or the list is exhausted.
Which cryptography attack is the student attempting?

Which rule would best fit this requirement?

A company firewall engineer has configured a new DMZ to allow public systems to be located away from the
internal network. The engineer has three security zones set:
Untrust (Internet) – (Remote network = 217.77.88.0/24)
DMZ (DMZ) – (11.12.13.0/24)
Trust (Intranet) – (192.168.0.0/24)
The engineer wants to configure remote desktop access from a fixed IP on the remote network to a remote
desktop server in the DMZ. Which rule would best fit this requirement?


Page 46 of 51« First...102030...4445464748...Last »