Ec-council CEH

10 Questions | Total Attempts: 266

SettingsSettingsSettings
Ec-council CEH

.


Questions and Answers
  • 1. 
    CEH stands for
    • A. 

      Certified Ethical Hacker

    • B. 

      Central Economy Hub

    • C. 

      Certified Economical Hacker

    • D. 

      Consume Everything Heavily

  • 2. 
    • A. 

      6.0

    • B. 

      7.0

    • C. 

      7.1

    • D. 

      8.0

  • 3. 
    The highest paying salaries in Melbourne are for
    • A. 

      Cleaners

    • B. 

      Plumbers

    • C. 

      IT Security Professionals

    • D. 

      Project Managers

  • 4. 
    Wireless networking uses which of the following
    • A. 

      WEP

    • B. 

      WPA

    • C. 

      HTML

    • D. 

      SSID

    • E. 

      IDE

  • 5. 
    _____ is the pre-attack information gathering and organization of collected data, which is used to document the security profile of an organization
    • A. 

      Scanning

    • B. 

      Footprinting

    • C. 

      Dumpster Diving

    • D. 

      Enumeration

  • 6. 
    Which of the following tools might you use during foot printing?
    • A. 

      NMAP

    • B. 

      Sam Spade

    • C. 

      Ethereal

    • D. 

      Netcat

  • 7. 
    If you wanted to know the geographic location of the routers, servers etc. which of these would you use?
    • A. 

      Visual Trace

    • B. 

      Visual Route

    • C. 

      GeoTrace

    • D. 

      Tracert

  • 8. 
    Which of the following can help detect intrusions?
    • A. 

      NetDetect

    • B. 

      NMAP

    • C. 

      VisualLookout

    • D. 

      Sam Spade

    • E. 

      Snort

  • 9. 
    Which of the following would you use to determine if an email that you have sent gets opened?
    • A. 

      MailTracking.com

    • B. 

      VisualRoute Mail Tracker

    • C. 

      Sam Spade

    • D. 

      EMailTrackerPro

  • 10. 
    How might one determine if network hosts are alive?
    • A. 

      War dialers

    • B. 

      Ping utilities

    • C. 

      Netcat

    • D. 

      Dos Scripts

    • E. 

      Trojan Horses