image
  1.  What is the second step in the TCP three-way handshake?
A.  SYN
B.  ACK
C.  SYN/ACK
D.  ACK-SYN
E.  FIN
  2.  You wish to perform a ping sweep of a subnet within your target organization. Which of the following nmap command lines is your best option?
A.  nmap 192.168.1.0/24
B.  nmap -sT 192.168.1.0/24
C.  nmap –sP 192.168.1.0/24
D.  nmap –P0 192.168.1.0/24
  3.  Which of the following TCP flags is used to reset a connection?
A.  SYN
B.  ACK
C.  PSH
D.  URG
E.  FIN
F.  RST
  4.  A pen test team member is attempting to enumerate a Windows machine and uses a tool called enum to enumerate user accounts on the device. Doubtful ...

Get CEH Certified Ethical Hacker Practice Exams now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.