O'Reilly logo

CEH Certified Ethical Hacker Practice Exams by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Answers
    1.  A. CEH methodology is laid out this way: reconnaissance (footprinting), scanning and enumeration, gaining access, escalating privileges, maintaining access, and covering tracks.
B, C, and D are incorrect. These answers have the methodology in incorrect order.
    2.  C. The security element of availability, obviously, is all about maintaining the availability of the resource to authorized individuals.
A, B, and D are incorrect. Confidentiality keeps the wrong eyes from seeing the data, and integrity ensures message data is not changed. Authentication is a distracter.
    3.  C. Using the Security, Functionality, and Ease of Use triangle, if you move from the middle of the triangle to any of the points, you are moving away ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required