Certified Ethical Hacker Practice Exam - Part Vl
Volume F
Sign in to Google to save your progress. Learn more
Email *
Write down your name. *
Write down your contact. *
Q501: At a Windows Server command prompt, which command could be used to list the running services? *
1 point
Q502: Which of the following is optimized for confidential communications, such as bidirectional voice and video? *
1 point
Q503: The use of alert thresholding in an IDS can reduce the volume of repeated alerts, but introduces which of the following vulnerabilities? *
1 point
Q504: Which of the following is considered an acceptable option when managing a risk? *
1 point
Q505: A person approaches a network administrator and wants advice on how to send an encrypted email from home. The end-user does not want to have to pay for any license fees or manage server services. Which of the following is the most secure encryption protocol that the network administrator should recommend? *
1 point
Q506: __________ is found in all versions of NTFS and is described as the ability to fork file data into existing files without affecting their functionality, size, or display to traditional file browsing utilities like dir or Windows Explorer *
1 point
Q507: A company is legally liable for the content of the email that is sent from its systems, regardless of whether the message was sent for private or business-related purposes. This could lead to prosecution for the sender and for the company's directors if, for example, an outgoing email was found to contain material that was pornographic, racist, or likely to incite someone to commit an act of terrorism. You can always defend yourself by the "ignorance of the law" clause. *
1 point
Q508: Paul has just finished setting up his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Paul notices that when he uses his wireless connection, the speed is sometimes54 Mbps, and sometimes it is only 24Mbps or less. Paul connects to his wireless router management utility and notices that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that the unfamiliar machine has the same MAC address as his laptop. What is Paul seeing here? *
1 point
Q509: What two things will happen if a router receives an ICMP packet, which has a TTL value of 1, and the destination host is several hops away? (Select 2 answers) *
1 point
Required
Q510: Which of the following LM hashes represents a password of fewer than 8 characters? *
1 point
Next
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy