Uploaded by Katy Morgan

EC-Council EHE 112-52 Certification Exam Syllabus and Exam Questions

advertisement
EC-Council EHE 112-52
Certification Exam Syllabus
and Exam Questions
EC-Council 112-52 Exam Guide
www.EduSum.com
Get complete detail on 112-52 exam guide to crack EC-Council Ethical Hacking
Essentials. You can collect all information on 112-52 tutorial, practice test,
books, study material, exam questions, and syllabus. Firm your knowledge on
EC-Council Ethical Hacking Essentials and get ready to crack 112-52
certification. Explore all information on 112-52 exam with number of
questions, passing percentage and time duration to complete test.
WWW.EDUSUM.COM
PDF
Introduction to 112-52 EC-Council Ethical
Hacking Essentials (EHE) Exam
The EC-Council 112-52 Exam is challenging and thorough preparation is essential for
success. This exam study guide is designed to help you prepare for the EHE
certification exam. It contains a detailed list of the topics covered on the Professional
exam, as well as a detailed list of preparation resources. This study guide for the ECCouncil Ethical Hacking Essentials will help guide you through the study process for
your certification.
112-52 EC-Council Ethical Hacking Essentials Exam
Summary
●
●
●
●
●
●
●
●
●
Exam Name: EC-Council Ethical Hacking Essentials
Exam Code: 112-52
Exam Price: $75 (USD)
Duration: 120 mins
Number of Questions: 75
Passing Score: 70%
Books / Training: Courseware
Schedule Exam: ECC Exam Center
Sample Questions: EC-Council EHE Sample Questions
112-52: EC-Council Ethical Hacking Essentials (EHE)
1
WWW.EDUSUM.COM
PDF
● Recommended Practice: EC-Council 112-52 Certification Practice Exam
Exam Syllabus: 112-52 EC-Council Ethical Hacking
Essentials (EHE)
Topic
Information Security
Fundamentals
Details
- Information Security Fundamentals
- Information Security Laws and Regulations
- Cyber Kill Chain Methodology
- Hacking Concepts and Hacker Classes
Ethical Hacking
- Different Phases of Hacking Cycle
Fundamentals
- Ethical Hacking Concepts, Scope, and Limitations
- Ethical Hacking Tools
- Threat and Threat Sources
Information Security
- Malware and its Types
Threats and
- Malware Countermeasures
Vulnerability
- Vulnerabilities
Assessment
- Vulnerability Assessment
Password Cracking
- Password Cracking Techniques
Techniques and
- Password Cracking Tools
Countermeasures
- Password Cracking Countermeasures
- Social Engineering Concepts and its Phases
Social Engineering
- Social Engineering Techniques
Techniques and
- Insider Threats and Identity Theft
Countermeasures
- Social Engineering Countermeasures
- Packet Sniffing Concepts
- Sniffing Techniques
- Sniffing Countermeasures
Network Level Attacks
- DoS and DDoS Attacks
and Countermeasures
- DoS and DDoS Attack Countermeasures
- Session Hijacking Attacks
- Session Hijacking Attack Countermeasures
- Web Server Attacks
- Web Server Attack Countermeasures
Web Application
- Web Application Architecture and Vulnerability Stack
Attacks and
- Web Application Threats and Attacks
Countermeasures
- Web Application Attack Countermeasures
- SQL Injection Attacks
- SQL Injection Attack Countermeasures
- Wireless Terminology
- Wireless Encryption
Wireless Attacks and
- Wireless Network-Specific Attack Techniques
Countermeasures
- Bluetooth Attacks
- Wireless Attack Countermeasures
112-52: EC-Council Ethical Hacking Essentials (EHE)
2
WWW.EDUSUM.COM
Topic
Mobile Attacks and
Countermeasures
IOT & OT Attacks and
Countermeasures
Cloud Computing
Threats and
Countermeasures
Penetration Testing
Fundamentals
PDF
Details
- Mobile Attack Anatomy
- Mobile Platform Attack Vectors and Vulnerabilities
- Mobile Device Management (MDM) Concept
- Mobile Attack Countermeasures
- IoT Concepts
- IoT Threats and Attacks
- IoT Attack Countermeasures
- OT Concepts
- OT Threats and Attacks
- OT Attack Countermeasures
- Cloud Computing Concepts
- Container Technology
- Cloud Computing Threats
- Cloud Attack Countermeasures
- Fundamentals of Penetration Testing and its Benefits
- Strategies and Phases of Penetration Testing
- Guidelines and Recommendations for Penetration Testing
EC-Council 112-52 Certification Sample Questions and
Answers
To make you familiar with EC-Council Ethical Hacking Essentials (112-52) certification
exam structure, we have prepared this sample question set. We suggest you to try our
Sample Questions for 112-52 Certification to test your understanding of the EC-Council
112-52 process with the real EC-Council certification exam environment.
112-52 EC-Council Ethical Hacking Essentials Sample Questions:01. Which deployment model in cloud computing is owned, managed, and
operated by a business, organization, or entity exclusively?
a) Community cloud
b) Hybrid cloud
c) Public cloud
d) Private cloud
02. What technique involves the social engineer pretending to be someone else to
obtain sensitive information?
a) Phishing
b) Baiting
112-52: EC-Council Ethical Hacking Essentials (EHE)
3
WWW.EDUSUM.COM
PDF
c) Pretexting
d) Tailgating
03. In which phase of the hacking cycle does the hacker maintain access to use
the network as a launch pad for other attacks?
a) Maintaining Access
b) Covering Tracks
c) Gaining Access
d) Reconnaissance
04. How does understanding the web application architecture assist in securing
it?
a) By enabling more targeted social engineering attacks
b) By identifying potential points of failure and data exposure
c) By facilitating the use of third-party components without security review
d) By allowing unrestricted data flow between application layers
05. Which term refers to an unauthorized device that connects to a wireless
network?
a) War driving
b) Evil twin
c) Packet sniffer
d) Rogue access point
06. Which wireless encryption method is currently considered the most secure?
a) WEP
b) WPA
c) WPA2
d) TKIP
07. Containers offer a lightweight alternative to virtual machines by sharing the
host OS's kernel. What is a key security practice for containers?
a) Running containers with default settings
b) Using containers to run multiple different applications on a single host
c) Regularly scanning containers and images for vulnerabilities
d) Ensuring containers use as much host resource as possible
08. In which phase of penetration testing is information gathered to identify
potential targets and their vulnerabilities?
a) Planning
112-52: EC-Council Ethical Hacking Essentials (EHE)
4
WWW.EDUSUM.COM
PDF
b) Discovery
c) Attack
d) Reporting
09. What vulnerability is particularly concerning for IoT devices due to their
widespread and often unattended deployment?
a) Cross-site scripting
b) Insecure default configurations
c) Buffer overflow attacks
d) Social engineering
10. What is a primary security measure to prevent Cross-Site Scripting (XSS)
attacks?
a) Implementing Content Security Policy (CSP)
b) Using database encryption
c) Enabling CORS on the server
d) Using parameterized queries
Answers:Answer 01:- d
Answer 02:- c
Answer 03:- a
Answer 04:- b
Answer 05:- d
Answer 06:- c
Answer 07:- c
Answer 08:- b
Answer 09:- b
Answer 10:- a
112-52: EC-Council Ethical Hacking Essentials (EHE)
5
Download