Chapter 2Practice Test 2

  1. Which of the following is considered an administrative control?

    1. Biometric device

    2. Mantrap

    3. Security policy

    4. Access control list

  2. If a company has been given a /24 network from its Internet service provider, what CIDR notation would need to be used for each network if the company needed to have eight networks out of that allocation?

    1. /27

    2. /26

    3. /28

    4. /8

  3. What is the default port number for Telnet?

    1. 21

    2. 23

    3. 53

    4. 443

  4. What is the protocol commonly used for key exchange, where the keys are mutually derived rather than directly exchanged?

    1. OAKLEY

    2. AES

    3. Diffie-Hellman

    4. PGP

  5. Which algorithm does not provide integrity or confidentiality?

    1. DSA

    2. AES

    3. RC4

    4. PGP

  6. Which of the following acronyms represent the institution that governs North ...

Get CEH v11, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.