O'Reilly logo

CEH Certified Ethical Hacker Practice Exams, Second Edition, 2nd Edition by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image
1. Examine the Wireshark TCP flow capture here:
image
Which of the following represents the next appropriate acknowledgment from Host A?
A. Sequence Number 701, Acknowledgment Number 3986
B. Sequence Number 701, Acknowledgment Number 2664
C. Sequence Number 2664, Acknowledgment Number 2023
D. Sequence Number 2664, Acknowledgment Number 701
2. You have established a Netcat connection to a target machine. Which flag can be used to launch a program?
A. –p
B. –a
C. –l
D. –e
3. Which database type was targeted by the Slammer worm?
A. Microsoft SQL
B.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required