CEH

(Jeff_L) #1

24 Chapter 1 ■ Getting Started with Ethical Hacking



  1. What does TOE stand for?
    A. Target of evaluation
    B. Time of evaluation
    C. Type of evaluation
    D. Term of evaluation

  2. Which of the following best describes a vulnerability?
    A. A worm
    B. A virus
    C. A weakness
    D. A rootkit

Free download pdf