Certified Ethical Hacker Practice Test 1 CEH (312-50)

Certified Ethical Hacker Practice Test 1 CEH (312-50)


A piece of software or technology that takes advantage of a bug, glitch, or vulnerability, leading to unauthorized access, privilege escalation, or denial of service on a computer system.

 
 
 
 

_____________performs ping sweeps, port scanning, service identification, IP address detection, and operating system detection. It has the benefit of scanning a large number of machines in a single session. It’s supported by many operating systems, including Unix, Windows, and Linux.

 
 
 
 

User 2SID and SID2 User are command-line tools that look up Windows service identifiers SIDs from username input.

 
 
 
 

____________is a steganography application that hides information inside BMP (bitmap)images. It’s a command-line utility.

 
 
 
 

_________________ Viruses are encrypted to avoid detection.

 
 
 
 

The _________________ file in Windows contains the usernames and hashed passwords. It’s located in theWindows\system32\config directory.

 
 
 
 

____________ reports all open TCP/IP and UDP ports and maps them to the owning application. Youcan use this tool to quickly identify unknown open ports and their associated applications.

 
 
 
 

Which of the below DNS Records, Maps IP addresses to hostnames

 
 
 
 

Which of the below is not a Trojan program ?

 
 
 
 

__________ is a free, open source tool that quickly and efficiently performs ping sweeps, port scanning, service identification, IP address detection, and operating system detection. It has the benefit of scanning a large number of machines in a single session. It’s supported by many operating systems, including Unix, Windows, and Linux.

 
 
 
 


Question 1 of 10