Certified Ethical Hacker Practice Exam 3 CEH (312-50) Certified Ethical Hacker Practice Exam 3 CEH (312-50) In security terms, MITM stands for ______________________ Man-in-the-middle Morph-in-the-machine Machine-in-the-middle Machine-is-to-Morph ____________infects another executable and uses this carrier program to spread itself. Thevirus code is injected into the previously benign program and is spread when the program is run. Backdoor Virus Rootkit Worm Phases of Ethical Hacking, the proper Sequence would be. Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks Scanning, Reconnaissance, Gaining Access, Maintaining Access, Covering Tracks Reconnaissance, Gaining Access, Scanning, Covering Tracks, Maintaining Access Scanning, Gaining Access, Maintaining Access, Reconnaissance, Covering Tracks A program which is disguised a something non-threatening is called a _________ Virus Rootkit Trojan Backdoor Viruses affect some of the below components of a system. Choose two. System sectors DLL Files Memory CPU This is also known as half-open scanning. The hacker sends a SYN packet and receives a SYN-ACK back from the server. A full TCP connection isn’t opened. Open ports reply with a SYN/ACK while closed ports reply with a RST/ACK. Null Scan ACK Scan TCP Scan SYN Stealth Scan Which of these is not a group in which hackers are categorized? Black Hat Red Hat Grey Hat White Hat _________________ involves performing a security evaluation and testing with no prior knowledge of the network infrastructure or system to be tested. Testing simulates an attack by a malicious hacker outside the organization’s security perimeter. This testing can take the longest amount of time and most effort as no information is given to the testing team. Red-Box Testing white-Box Testing Black-box Testing Grey Box Testing DNS uses which of the below port number 80 443 53 20 ___________ involves sending an email, usually posing as a bank, credit card Company, or any other financial organization. The email requests that the recipient confirm banking information or reset passwords or PINs. Phishing Identity theft Online Scam Insider Attack Loading … Question 1 of 10