CHAPTER 3 Practice Test 3

  1. 1. Which protocol is used for network management and can gather statistics and derive a current status from the node that it is operating on?

    1. NTP
    2. SMNP
    3. SSH
    4. SNMP
  2. 2. Which of the following is part of a DMZ but bridges access from organization to organization?

    1. Internet
    2. Extranet
    3. Intranet
    4. Outernet
  3. 3. How many subnets can be provided using a /26 classless inter-domain routing (CIDR)?

    1. 1
    2. 2
    3. 3
    4. 4
  4. 4. In a Linux system, where is the password file stored?

    1. /etc/passwd
    2. /etc/shadow
    3. /etc/user/password
    4. /shadow/etc
  5. 5. What command can you use to switch to a different user in Linux?

    1. swu
    2. user
    3. sudo
    4. su
  6. 6. What encryption algorithm is used within TLS?

    1. AES
    2. RSA
    3. PGP
    4. ECE
  7. 7. Prior to deploying an anomaly-based detection ...

Get CEH v9 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.