Braindumps of 312-50
Ethical Hacker Certified
Exam Questions, Answers, Braindumps
Here is my contribution for this
great site and its braindumps section.
What is the essential difference between an 'Ethical
Hacker' and a 'Cracker'?
A. The ethical hacker does not use the same techniques
or skills as a cracker.
B. The ethical hacker does it strictly for financial
motives unlike a cracker.
C. The ethical hacker has authorization from the owner
of the target.
D. The ethical hacker is just a cracker who is getting
What does the term "Ethical Hacking" mean?
A. Someone who is hacking for ethical reasons.
B. Someone who is using his/her skills for ethical
C. Someone who is using his/her skills for defensive
D. Someone who is using his/her skills for offensive
Who is an Ethical Hacker?
A. A person who hacks for ethical reasons
B. A person who hacks for an ethical cause
C. A person who hacks for defensive purposes
D. A person who hacks for offensive purposes
He is a security professional who applies his hacking
skills for defensive purposes.
What is "Hacktivism"?
A. Hacking for a cause
B. Hacking ruthlessly
C. An association which groups activists
D. None of the above
Where should a security tester be looking for information
that could be used by an attacker against an organization?
(Select all that apply)
A. CHAT rooms.
B. WHOIS database
C. News groups
D. Web sites
E. Search engines
F. Organization's own web site
Answer: A, B, C, D, E, F
What are the two basic types of attacks?(Choose two.
Answer: B, D
Passive and active attacks are the two basic types
You are footprinting Acme.com to gather competitive
intelligence. You visit the acme.com websire for contact
information and telephone number numbers but do not
find it listed there. You know that they had the entire
staff directory listed on their website 12 months
ago but now it is not there. How would it be possible
for you to retrieve information from the website that
A. Visit google search engine and view the cached
B. Visit Archive.org site to retrieve the Internet
archive of the acme website.
C. Crawl the entire website and store them into your
D. Visit the company's partners and customers website
for this information.
User which Federal Statutes does FBI investigate for
computer crimes involving e-mail scams and mail fraud?
A. 18 U.S.C 1029 Possession of Access Devices
B. 18 U.S.C 1030 Fraud and related activity in connection
C. 18 U.S.C 1343 Fraud by wire, radio or television
D. 18 U.S.C 1361 Injury to Government Property
E. 18 U.S.C 1362 Government communication systems
F. 18 U.S.C 1831 Economic Espionage Act
G. 18 U.S.C 1832 Trade Secrets Act.