Certified Ethical Hacker V10 questions with correct answers
White-hat testing, which involves testing with the knowledge and consent of the organizations IT staff, is also known as: - Answer D. Overt testing Social engineering can be used to accomplish: - Answer D. All of the above Which nmap command option performs a scan using the initial TCP handshake but sends an RST instead of ACK? - Answer A. sS SYN Stealth Scan Which of the following is a Mac OS-X tool used for network discovery and cracking? - Answer A. KisMAC The White Box approach to pen testing requires: - Answer A. Full knowledge of the system or network to be assessed All of the following are SMTP commands EXCEPT: - Answer B. PARSE What is described as searching for sensitive information in the trash that has been thrown out by the target? - Answer C. Dumpster Diving The Risk Management process includes all of the following steps EXCEPT: - Answer C. Risk Vulnerability Bluejacking does all of the following EXCEPT: - Answer D. Exploits a firmware flaw in older devices
École, étude et sujet
- Établissement
- CEH - Certified Ethical Hacker
- Cours
- CEH - Certified Ethical Hacker
Infos sur le Document
- Publié le
- 20 juin 2023
- Nombre de pages
- 9
- Écrit en
- 2022/2023
- Type
- Examen
- Contient
- Questions et réponses
Sujets
-
certified ethical hacker v10 questions with correc
Document également disponible en groupe