Certified Ethical Hacker Practice Test 1 CEH (312-50)

Certified Ethical Hacker Practice Test 1 CEH (312-50)


_____________performs ping sweeps, port scanning, service identification, IP address detection, and operating system detection. It has the benefit of scanning a large number of machines in a single session. It’s supported by many operating systems, including Unix, Windows, and Linux.

 
 
 
 

A piece of software or technology that takes advantage of a bug, glitch, or vulnerability, leading to unauthorized access, privilege escalation, or denial of service on a computer system.

 
 
 
 

Which of the below is not a Trojan program ?

 
 
 
 

The _________________ file in Windows contains the usernames and hashed passwords. It’s located in theWindows\system32\config directory.

 
 
 
 

User 2SID and SID2 User are command-line tools that look up Windows service identifiers SIDs from username input.

 
 
 
 

____________ reports all open TCP/IP and UDP ports and maps them to the owning application. Youcan use this tool to quickly identify unknown open ports and their associated applications.

 
 
 
 

_________________ Viruses are encrypted to avoid detection.

 
 
 
 

Which of the below DNS Records, Maps IP addresses to hostnames

 
 
 
 

__________ is a free, open source tool that quickly and efficiently performs ping sweeps, port scanning, service identification, IP address detection, and operating system detection. It has the benefit of scanning a large number of machines in a single session. It’s supported by many operating systems, including Unix, Windows, and Linux.

 
 
 
 

____________is a steganography application that hides information inside BMP (bitmap)images. It’s a command-line utility.

 
 
 
 


Question 1 of 10


Search

Shortcodes Ultimate

 
Follow Us
 
BGP