Certified Ethical Hacker v10 Practice Exam questions with correct answers
Drawing of symbols in public places to publicize an open Wi-Fi wireless network is called what? - Answer A. WarChalking The act of altering configuration files and the expected operation of a service is known as what kind of attack? - Answer C. Service Reconfiguration ARP (Address Resolution Protocol) does not translate IP addresses to MAC addresses. - Answer FALSE Which of the following is a business threat category? - Answer ALL OF THE ABOVE What does the term Hacktivism mean? - Answer C. Hackers who are hacking for a cause. OWASP's Top 10 IoT Vulnerabilities are provided to help developers, manufacturers, enterprises and consumers make well-informed decisions when building and using IoT devices. A user recently learns of a vulnerability in their web camera's software, which allows an attacker to log in using default admin credentials to view the camera's video feed. Which of OWASP's Top 10 IoT Vulnerabilities does this BEST fall under? - Answer C. Weak, guessable, or hardcoded passwords Patch management ensures appropriate patches are installed on all systems. - Answer A. TRUE
Written for
- Institution
- CEH - Certified Ethical Hacker
- Course
- CEH - Certified Ethical Hacker
Document information
- Uploaded on
- June 20, 2023
- Number of pages
- 8
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
certified ethical hacker v10 practice exam questio
Also available in package deal