CEH
Table of Exercises Exercise 2 .1 Finding the maC address........................................ 41 Exercise 4 .1 Finding the IP ...
flast.indd 20 22-07-2014 11:36:25 ...
Introduction If you’re preparing to take the CEH exam, you’ll undoubtedly want to find as much infor- mation as you can about co ...
In many books, the glossary is filler added to the back of the text; this book’s glossary (located on the companion website at h ...
Introduction xxiii How to Become a CEH Certified Professional The first place to start on your way to certification is to regist ...
xxiv Introduction Chapter 1: Getting Started with Ethical Hacking This chapter covers the purpose of ethical hacking, defines th ...
Introduction xxv Tips for Taking the CEH Exam Here are some general tips for taking your exam successfully: ■ (^) Bring two form ...
xxvi Introduction Chapter Review Questions To test your knowledge as you progress through the book, there are review questions a ...
Introduction xxvii Answer all of the review questions at the end of each chapter. Specifically note any questions that confuse ...
xxviii Introduction Objectives Objective Chapter Background Networking technologies (e.g., hardware, infrastructure) 2 Web techn ...
Introduction xxix Network/wireless sniffers (e.g., Wireshark, Airsnort) 9 Access control mechanisms (e.g., smart cards) 3 Crypto ...
xxx Assessment Test Assessment Test What is the focus of a security audit or vulnerability assessment? A. Locating vulnerabilit ...
Assessment Test xxxi C. PPP D. SLIP Which design concept limits access to systems from outside users while protecting users and ...
xxxii Assessment Test Which mechanism is used by PKI to allow immediate verification of a certificate’s validity? A. CRL B. MD5 ...
Assessment Test xxxiii An individual presents herself at your office claiming to be a service technician. She is attempting to ...
xxxiv Assessment Test Which algorithm is an asymmetric encryption protocol? A. RSA B. AES C. DES D. 3DES Which of the following ...
Assessment Test xxxv Which of the following is seen as a replacement for protocols such as telnet and FTP? A. SSL B. SCP C. Tel ...
xxxvi Answers to Assessment Test Answers to Assessment Test A. A vulnerability assessment is focused on uncovering vulnerabilit ...
Answers to Assessment Test xxxvii C. A firewall between a web server and the Internet would enhance security and should always ...
xxxviii Answers to Assessment Test B. Passwords are the simplest form of authentication and are commonly used. They fall under ...
«
1
2
3
4
5
6
7
8
9
10
»
Free download pdf