CEH (Latest Exam Questions)
For Full List Email us at moonintdubai@gmail.com
1. It has been reported to you that someone
has caused an information spillage on their computer. You go to the computer,
disconnect it from the network, remove the keyboard and mouse, and power it
down. What step in incident handling did you just complete?
A. Discovery
B. Recovery
C. Containment
D. Eradication
C
Internet
Protocol Security IPSec is actually a suite of protocols. Each protocol within
the suite provides different functionality. Collective IPSec does everything
except.
A. Authenticate
B. Protect the payload and
the headers
C. Work at the Data Link
Layer
D. Encrypt
C
Which
Intrusion Detection System is best applicable for large environments where
critical assets on the network need extra scrutiny and is ideal for observing
sensitive network segments?
A. Network-based intrusion
detection system (NIDS)
B. Honeypots
C. Host-based intrusion
detection system (HIDS)
D. Firewalls
A
When
you are testing a web application, it is very useful to employ a proxy tool to
save every request and response. You can manually test every request and analyze
the response to find vulnerabilities. You can test parameter and headers
manually to get more precise results than if using web vulnerability scanners.
What
proxy tool will help you find web vulnerabilities?
A. Dimitry
B. Burpsuite
C. Maskgen
D. Proxychains
B
Which
one of the following Google advanced search operators allows an attacker to
restrict the results to those websites in the given domain?
A. [link:]
B. [site:]
C. [cache:]
D. [inurl:]
B
Great Information sharing.I am very happy to read this article .. thanks for giving us go through info. Fantastic nice. I appreciate this post Cyber Monday Hosting Deals 2020
ReplyDelete