O'Reilly logo

CEH v9 by Raymond Blockmon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 3 Practice Test 3

  1. 1. Which protocol is used for network management and can gather statistics and derive a current status from the node that it is operating on?

    1. NTP
    2. SMNP
    3. SSH
    4. SNMP
  2. 2. Which of the following is part of a DMZ but bridges access from organization to organization?

    1. Internet
    2. Extranet
    3. Intranet
    4. Outernet
  3. 3. How many subnets can be provided using a /26 classless inter-domain routing (CIDR)?

    1. 1
    2. 2
    3. 3
    4. 4
  4. 4. In a Linux system, where is the password file stored?

    1. /etc/passwd
    2. /etc/shadow
    3. /etc/user/password
    4. /shadow/etc
  5. 5. What command can you use to switch to a different user in Linux?

    1. swu
    2. user
    3. sudo
    4. su
  6. 6. What encryption algorithm is used within TLS?

    1. AES
    2. RSA
    3. PGP
    4. ECE
  7. 7. Prior to deploying an anomaly-based detection ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required