CHAPTER 1 Practice Test 1

  1. 1.Which of the following is considered a passive reconnaissance action?

    1. Searching through the local paper
    2. Calling Human Resources
    3. Using the nmap -sT command
    4. Conducting a man-in-the-middle attack
    5. Setting up a rogue hot spot
  2. 2. Which encryption was selected by NIST as the principal method for providing confidentiality after the DES algorithm?

    1. 3DES
    2. Twofish
    3. RC4
    4. AES
  3. 3. What tool is able to conduct a man-in-the-Middle Attack on an 802.3 environment?

    1. Ettercap
    2. Cain & Abel
    3. Wireshark
    4. Nmap
  4. 4. What is the difference between a traditional firewall and an IPS?

    1. Firewalls do not generate logs.
    2. IPS cannot drop packets.
    3. IPS does not follow rules.
    4. IPS can dissect packets.
  5. 5. Why is it important to scan your target ...

Get CEH v9 now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.