Certified Ethical Hacker Practice Exam - Part Vl
Volume D
Sign in to Google to save your progress. Learn more
Email *
Write down your name. *
Write down your contact number. *
Q301: Employees in a company are no longer able to access Internet web sites on their computers. The network administrator is able to successfully ping the IP address of web servers on the Internet and is able to open websites by using an IP address in place of the URL. The administrator runs the lookup command for www.eccouncil.org and receives an error message stating there is no response from the server. What should the administrator do next? *
1 point
Q302: Which initial procedure should an ethical hacker perform after being brought into an organization?   *
1 point
Q303: Which of the following guidelines or standards is associated with the credit card industry? *
1 point
Q304: An attacker has captured a target file that is encrypted with public-key cryptography. Which of the attacks below is likely to be used to crack the target file? *
1 point
Q305: Which tool can be used to silently copy files from USB devices? *
1 point
Q306: How can a rootkit bypass Windows 7 operating system’s kernel mode, code signing policy? *
1 point
Q307: A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature? *
1 point
Q308: A consultant has been hired by the V.P. of a large financial organization to assess the company's security posture. During the security testing, the consultant comes across child pornography on the V.P.'s computer. What is the consultant's obligation to the financial organization? *
1 point
Q309: How is sniffing broadly categorized? *
1 point
Q310: An engineer is learning to write exploits in C++ and is using the exploit tool Backtrack. The engineer wants to compile the newest C++ exploit and name it calc.exe. Which command would the engineer use to accomplish this? *
1 point
Next
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy