O'Reilly logo

CEH v9 by Raymond Blockmon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 1 Practice Test 1

  1. 1.Which of the following is considered a passive reconnaissance action?

    1. Searching through the local paper
    2. Calling Human Resources
    3. Using the nmap -sT command
    4. Conducting a man-in-the-middle attack
    5. Setting up a rogue hot spot
  2. 2. Which encryption was selected by NIST as the principal method for providing confidentiality after the DES algorithm?

    1. 3DES
    2. Twofish
    3. RC4
    4. AES
  3. 3. What tool is able to conduct a man-in-the-Middle Attack on an 802.3 environment?

    1. Ettercap
    2. Cain & Abel
    3. Wireshark
    4. Nmap
  4. 4. What is the difference between a traditional firewall and an IPS?

    1. Firewalls do not generate logs.
    2. IPS cannot drop packets.
    3. IPS does not follow rules.
    4. IPS can dissect packets.
  5. 5. Why is it important to scan your target ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required