Certified Ethical Hacker Practice Exam 1 CEH (312-50) Certified Ethical Hacker Practice Exam 1 CEH (312-50) A hacker’s goal is to exploit vulnerabilities in a system or network to find a weakness in one or more of the three main elements of security. Which among these are the main elements of Security? Confidentiality Identity Integrity Availability _____________________ is a method that involves using the MAC address of the network gateway andconsequently receiving all traffic intended for the gateway on the sniffer system. ARP poisoning ARP Spoofing Sequencing Windowing Sending to much information to a filed variable in an application, causing the application to throw an error is called ______________ attack Buffer Overflow Message Overflow Data Overflow Signal Overflow ____________ defined as the process of creating a blueprint or map of an organization’s network and systems. It begins by determining the target system, application, or physical location of the target. Foot Printing Scanning Cracking Finger Printing Polymorphic viruses are ________________________________ These viruses hide the normal virus characteristics, such as modifying the original time and date stamp of the file so as to prevent the virus from being noticed as anew file on the system. These viruses can evade detection by infecting very quickly or very slowly. This can sometimes allow the program to infect a system without detection by an antivirus program. These viruses infect only a few systems or applications. These viruses encrypt the code in a different way with each infection and can change to different forms to try to evade detection. Which of the below tools is used for data-cleansing system for Windows PCs. It prevents unwanteddata from becoming permanently hidden in the system. It cleans the Recycle Bin, Internetcache, system files, temp folders, and so on Eslave.exe WinZapper Evidence Eliminator ImageHide __________________________ are the malicious hackers or crackers who use their skills for illegal and malicious purposes. White Hat Grey Hat Black Hat Red Hat The nmap command has numerous switches to perform different types of scans. Which of these is used for SYN Scan? -sT -sS -sP -sU ________________ involves looking in the trash for information written on pieces of paper or computer printouts. The hacker can often find passwords, file names, or other pieces of confidential information. Shoulder Surfing Phishing Online Scam Dumpster diving __________________is a Trojan that can be configured to notify a hacker when the infected computer connects to the Internet and can tell the hacker information about the system. This notification can be done over an IRC network, by ICQ, or by email. NetBus BackOrifice SubSeven Donald Dick Loading … Question 1 of 10