O'Reilly logo

CEH Certified Ethical Hacker Practice Exams, Second Edition, 2nd Edition by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image
1. A vendor is alerted of a newly discovered flaw in its software that presents a major vulnerability to systems. While working to prepare a fix action, the vendor releases a notice alerting the community of the discovered flaw and providing best practices to follow until the patch is available. Which of the following best describes the discovered flaw?
A. Input validation flaw
B. Shrink-wrap vulnerability
C. Insider vulnerability
D. Zero-day
2. A security professional applies encryption methods to communication channels. Which security control role is she attempting to meet?
A. Preventive
B. Detective
C. Defensive
D. Corrective
3. Which of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required