Certified Ethical Hacker v10 EXAM study guide with 100% correct answers
Question 1 of 50 Which of the following established a code of fair information practice that governed the collection, maintenance, use, and dissemination of personally identifiable information (PII)? Brainpower Read More Previous Play Next Rewind 10 seconds Move forward 10 seconds Unmute 0:00 / 0:00 Full screen A. Federal Information Security Management Act (FISMA) B. SPY ACT C. Privacy Act of 1974 D. U.S. Code Title 18 Question 2 of 50 To steal a password on a Linux machine where would you find the password file? A. /etc/shadow B. /bin/shadow C. /bin/password D. /etc/passwd Question 3 of 50 Which of the following forces termination of a TCP session? A. FIN (Finish) B. ACK (Acknowledgement) C. RST (Reset) D. SYN (Synchronize) Question 4 of 50 Which of the following is a collection of Internet information gathering and network troubleshooting utilities? A. LANsurveyor B. SandTrap C. NetScanTools Pro D. SuperScan Question 5 of 50 HTTP response-splitting attacks are often referred to as a CRLF injection attack. A. TRUE B. FALSE Question 6 of 50 The act of altering configuration files and the expected operation of a service is known as what kind of attack? A. Memory Corruption B. Fraggle Attack C. Service Reconfiguration D. RST Injection Question 7 of 50 DHCP starvation is a type of denial-of-service attack.
Written for
- Institution
- Certified Ethical Hacker v10
- Course
- Certified Ethical Hacker v10
Document information
- Uploaded on
- February 8, 2024
- Number of pages
- 5
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
certified ethical hacker v10 exam study guide