Certified Ethical Hacker Practice Test 1 CEH (312-50)

Certified Ethical Hacker Practice Test 1 CEH (312-50)


Which of the below is not a Trojan program ?

 

 

 

 

_____________performs ping sweeps, port scanning, service identification, IP address detection, and operating system detection. It has the benefit of scanning a large number of machines in a single session. It’s supported by many operating systems, including Unix, Windows, and Linux.

 

 

 

 

_________________ Viruses are encrypted to avoid detection.

 

 

 

 

__________ is a free, open source tool that quickly and efficiently performs ping sweeps, port scanning, service identification, IP address detection, and operating system detection. It has the benefit of scanning a large number of machines in a single session. It’s supported by many operating systems, including Unix, Windows, and Linux.

 

 

 

 

____________is a steganography application that hides information inside BMP (bitmap)images. It’s a command-line utility.

 

 

 

 

____________ reports all open TCP/IP and UDP ports and maps them to the owning application. Youcan use this tool to quickly identify unknown open ports and their associated applications.

 

 

 

 

User 2SID and SID2 User are command-line tools that look up Windows service identifiers SIDs from username input.

 

 

 

 

A piece of software or technology that takes advantage of a bug, glitch, or vulnerability, leading to unauthorized access, privilege escalation, or denial of service on a computer system.

 

 

 

 

Which of the below DNS Records, Maps IP addresses to hostnames

 

 

 

 

The _________________ file in Windows contains the usernames and hashed passwords. It’s located in theWindows\system32\config directory.

 

 

 

 


Question 1 of 10