Certified Ethical Hacker Practice Test 2 CEH (312-50) Certified Ethical Hacker Practice Test 2 CEH (312-50) A ______________is a list of dictionary words that have already been hashed.It can speed up the discovery and cracking of passwords bypre-computing the hashes for common strings of characters. Rainbow table Hash Table Dictionary Table Pass Table ___________________ is a worm that affects SQL servers. SQL Slammer Melissa SQL Blaster Sobig _______________ is the process of dialing modem numbers to find an open modem connection that provides remote access to a network for an attack to be launched against the target system. Target dialing Net dialing Modem dialing War dialing ____________ command can be used in DOS or Windows command Prompt to hide files Hide –h [file/ directory] Attrib +h [ file / directory] Stealth [file/ directory] Hide +h [file/ directory] There are three types of scanning involved in hacking. The below sentence best describes which type of scanning. “Discovers presence of known weaknesses on target systems” IP Scanning Vulnerability Scanning Port Scanning Network Scanning Which of the below tools is used for data-cleansing system for Windows PCs. It prevents unwanteddata from becoming permanently hidden in the system. It cleans the Recycle Bin, Internetcache, system files, temp folders, and so on Eslave.exe WinZapper Evidence Eliminator ImageHide ___________________ is the process of hiding data in other types of data such as images or textfiles. Buffering Enumeration Steganography Keylogging Getting connected to a system without username and password is considered a ____________ Blank Session Random Session Admin Session Null Session _________________________ basically gives ethical hackers the power to do the types of testing they perform and makes it a mandatory requirement for government agencies. FISMA – Federal Information Security Management Act Freedom of Information Act (FOIA) Federal Managers Financial Integrity Act ( FMFIA) Privacy Act of 1974 The process of _______________ allows the hacker to identify particularly vulnerable or high-value targets on the network. Hint: It is also known as Banner grabbing or OS identification. Finger printing Foot Printing War Dialing Net Printing Loading … Question 1 of 10