Certified Ethical Hacker Pro 17 Questions with Verified Answers
The results section of an assessment report contains four sub topics. Which of the
... [Show More] following sub sections contains the origin of the scan. - CORRECT ANSWER Classification
Karen received a report of all of the mobile devices on the network. This report showed the total risk score[...] - CORRECT ANSWER A vulnerability scanner
Which of the following includes a list of resolved vulnerabilities - CORRECT ANSWER Security vulnerability summary
Which of the following best describes Qualys Vulnerability Management assessment tool. - CORRECT ANSWER It is a cloud-based service that keeps all of your data in a private virtual database
Clive, a penetration tester, is scanning for vulnerabilities on the network, specifically outdated versions of Apple OS. Which of the following tools should he use. - CORRECT ANSWER Nessus
You are looking for a vulnerability assessment tool that detects vulnerabilities in mobile devices and gives you a report containing a total risk score. - CORRECT ANSWER SecurityMetrics Mobile
Which of the following would be the best open-source tool to use if you are looking for a web server scanner. - CORRECT ANSWER Nikto
You have just run the John the Ripper command shown in the image. Which of the following was the command used for? - CORRECT ANSWER To extract the password hashes and save them in the secure.txt file
Carl received a phone call from a woman who states that she is calling from his bank. She tells him that someone has tried to access his checking account [...] - CORRECT ANSWER Social engineering
You are cleaning your desk at work. You toss several stacks of paper in the trash, including a sticky note with your password written on it. Which of the following types of non-technical password attacks have you enabled. - CORRECT ANSWER Dumpster diving
Which of the following best describes shoulder surfing - CORRECT ANSWER Someone nearby watches you enter your password on your computer and records it.
Which of the following techniques involves adding random bits of data to a password before it is stored as a hash - CORRECT ANSWER password salting
20493750979830712-498uoidjflkdas;lkafjoieah jsd are the possible values in - CORRECT ANSWER Ascii-32-95
Plaintext - CORRECT ANSWER charset
limited time - CORRECT ANSWER rainbow attack
- CORRECT ANSWER rckrack -h
- CORRECT ANSWER Brute force [Show Less]