O'Reilly logo

CEH Certified Ethical Hacker Practice Exams by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image
  1.  You are examining connection logs from a client machine and come across this entry:
Which attack does this most likely indicate?
A.  Parameter manipulation
B.  XSS
C.  SQL injection
D.  Directory traversal
image  D. Sure directory traversal is an older attack (working mainly on now-outdated servers), but it’s still worth a shot and, more importantly to you dear reader, it’s going to be on your test. In this attack, the hacker attempts to access restricted directories and execute ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required