Certified Ethical Hacker V10 questions with correct answers
White-hat testing, which involves testing with the knowledge and consent of the organizations IT staff, is also known as: - Answer D. Overt testing Social engineering can be used to accomplish: - Answer D. All of the above Which nmap command option performs a scan using the initial TCP handshake but sends an RST instead of ACK? - Answer A. sS SYN Stealth Scan Which of the following is a Mac OS-X tool used for network discovery and cracking? - Answer A. KisMAC The White Box approach to pen testing requires: - Answer A. Full knowledge of the system or network to be assessed All of the following are SMTP commands EXCEPT: - Answer B. PARSE What is described as searching for sensitive information in the trash that has been thrown out by the target? - Answer C. Dumpster Diving The Risk Management process includes all of the following steps EXCEPT: - Answer C. Risk Vulnerability Bluejacking does all of the following EXCEPT: - Answer D. Exploits a firmware flaw in older devices
Written for
- Institution
- CEH - Certified Ethical Hacker
- Course
- CEH - Certified Ethical Hacker
Document information
- Uploaded on
- June 20, 2023
- Number of pages
- 9
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
certified ethical hacker v10 questions with correc
Also available in package deal