Download CEH v9 Certified Ethical Hacker Version 9.pdf PDF

TitleCEH v9 Certified Ethical Hacker Version 9.pdf
TagsCertified Ethical Hacker Ceh V9
LanguageEnglish
File Size11.5 MB
Total Pages260
Table of Contents
                            Title page
Copyright
Dedication
Acknowledgments
About the Author
Introduction
Chapter 1 Practice Test 1
Chapter 2 Practice Test 2
Chapter 3 Practice Test 3
Chapter 4 Practice Test 4
Chapter 5 Practice Test 5
Appendix Answers to Review Questions
	Practice Test 1
	Practice Test 2
	Practice Test 3
	Practice Test 4
	Practice Test 5
Index
Advert
EULA
                        
Document Text Contents
Page 2

CEH™ v9 Certified Ethical Hacker Version
9 Practice Tests

Raymond Blockmon

Page 130

CHAPTER 5
Practice Test 5

1. When a black hat is querying for a number of services or login information on a
target system, what are they trying to accomplish?

A. Enumeration

B. Scanning

C. Footprinting

D. Fingerprinting

2. Which of the following allows the adversary to obtain passwords online in a passive
manner?

A. Sniffing

B. Man in the middle

C. Password cracking

D. Account creation

3. Which of the following passwords will take the most effort to crack?

A. [email protected]$$w0rd

B. Pass123

C. [email protected]($)!_

D. Thisismypasswordandnoonecanstealit

4. Where is the event log located in Linux OS?

A. /home/log

B. /var/log

C. /log/

D. /home/system32/log

5. In Linux, which of the following accounts denotes the administrator?

A. Admin

B. Administrator

C. root

D. su

Page 131

6. Which of the following is another name for NAT overload?

A. PAT

B. NAT+

C. NAT port

D. PAT overload

7. Which of the following is part of the overall portion of the SID?

A. UID

B. RID

C. USD

D. L5R

8. What is accomplished by a combination of ping sweeping and enumerating a target?

A. Fingerprinting

B. Footprinting

C. Reconnaissance

D. Identification

9. What response time measurement is used by default within the tracert program?

A. Seconds

B. Milliseconds

C. Minutes

D. None

10. What is the encryption key length in DES?

A. 64

B. 128

C. 56

D. 128

11. Which of the following encryption ciphers replaced DES and was renamed AES?

A. RSA

B. AES

C. Rijndael

D. RC5

Page 259

WILEY END USER LICENSE AGREEMENT

http://www.wiley.com/go/eula

Similer Documents