O'Reilly logo

CEH Certified Ethical Hacker Practice Exams by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image
  1.  A Certified Ethical Hacker follows a specific methodology for testing a system. Which step comes after footprinting in the CEH methodology?
A.  Scanning
B.  Enumeration
C.  Reconnaissance
D.  Application attack
  2.  You’ve been hired as part of a pen test team. During the in brief, you learn the client wants the pen test attack to simulate a normal user who finds ways to elevate privileges and create attacks. Which test type does the client want?
A.  White box
B.  Gray box
C.  Black box
D.  Hybrid
  3.  Which of the following is true regarding an ethical hacker?
A.  The ethical hacker points out vulnerabilities, but does not ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required