O'Reilly logo

CEH Certified Ethical Hacker Practice Exams by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image
  1.  What is the second step in the TCP three-way handshake?
A.  SYN
B.  ACK
C.  SYN/ACK
D.  ACK-SYN
E.  FIN
  2.  You wish to perform a ping sweep of a subnet within your target organization. Which of the following nmap command lines is your best option?
A.  nmap 192.168.1.0/24
B.  nmap -sT 192.168.1.0/24
C.  nmap –sP 192.168.1.0/24
D.  nmap –P0 192.168.1.0/24
  3.  Which of the following TCP flags is used to reset a connection?
A.  SYN
B.  ACK
C.  PSH
D.  URG
E.  FIN
F.  RST
  4.  A pen test team member is attempting to enumerate a Windows machine and uses a tool called enum to enumerate user accounts on the device. Doubtful ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required