CEH Quizzes & Trivia
Top Trending
Questions: 20 | Attempts: 767 | Last updated: Jul 30, 2011
Questions: 100 | Attempts: 292 | Last updated: Oct 31, 2013
Questions: 100 | Attempts: 150 | Last updated: Dec 19, 2018
Questions: 61 | Attempts: 216 | Last updated: Oct 31, 2013
Questions: 5 | Attempts: 209 | Last updated: Nov 30, 2016
Just a small bit from the CEH
Questions: 20 | Attempts: 767 | Last updated: Jul 30, 2011
-
Sample Question_____ is the pre-attack information gathering and organization of collected data, which is used to document the security profile of an organization.
This is your description.
Questions: 100 | Attempts: 292 | Last updated: Oct 31, 2013
-
Sample QuestionWhich of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?
This is your description.
Questions: 100 | Attempts: 150 | Last updated: Dec 19, 2018
-
Sample QuestionYou are footprinting an organization and gathering competitive intelligence. You visit the company's website for contact information and telephone numbers but do not find them listed there. You know they had the entire staff directory listed on their website 12 months ago but now it is not there. Is there any way you can retrieve information from a website that is outdated?
This is your description.
Questions: 61 | Attempts: 216 | Last updated: Oct 31, 2013
-
Sample QuestionJane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be monitoring the communication link and could inspect captured traffic. She would like to tunnel the information to the remote end but does not have VPN capabilities to do so. Which of the following tools can she use to protect the link?
Ethical hacking and Countermeasures
Questions: 5 | Attempts: 209 | Last updated: Nov 30, 2016
-
Sample QuestionWhich of the following countermeasures can specifically protect agianst both the MAC flood and MAC spoofing attacks?
Advertisement
Advertisement
