Certified Ethical Hacker Practice Test 1 CEH (312-50)

Certified Ethical Hacker Practice Test 1 CEH (312-50)





_____________performs ping sweeps, port scanning, service identification, IP address detection, and operating system detection. It has the benefit of scanning a large number of machines in a single session. It’s supported by many operating systems, including Unix, Windows, and Linux.

 

 

 

 

__________ is a free, open source tool that quickly and efficiently performs ping sweeps, port scanning, service identification, IP address detection, and operating system detection. It has the benefit of scanning a large number of machines in a single session. It’s supported by many operating systems, including Unix, Windows, and Linux.

 

 

 

 

____________is a steganography application that hides information inside BMP (bitmap)images. It’s a command-line utility.

 

 

 

 

A piece of software or technology that takes advantage of a bug, glitch, or vulnerability, leading to unauthorized access, privilege escalation, or denial of service on a computer system.

 

 

 

 

_________________ Viruses are encrypted to avoid detection.

 

 

 

 

Which of the below is not a Trojan program ?

 

 

 

 

The _________________ file in Windows contains the usernames and hashed passwords. It’s located in theWindows\system32\config directory.

 

 

 

 

____________ reports all open TCP/IP and UDP ports and maps them to the owning application. Youcan use this tool to quickly identify unknown open ports and their associated applications.

 

 

 

 

User 2SID and SID2 User are command-line tools that look up Windows service identifiers SIDs from username input.

 

 

 

 

Which of the below DNS Records, Maps IP addresses to hostnames

 

 

 

 


Question 1 of 10