O'Reilly logo

CEH Certified Ethical Hacker Practice Exams by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image
  1.  Examine the Wireshark TCP flow capture here:
images
Which of the following represents the next appropriate acknowledgement from Host A?
A.  Sequence Number 701, Acknowledgement Number 3986.
B.  Sequence Number 701, Acknowledgement Number 2664.
C.  Sequence Number 2664, Acknowledgement Number 2023.
D.  Sequence Number 2664, Acknowledgement Number 701.
  2.  You have established a netcat connection to a target machine. Which flag can be used to launch a program?
A.  -p
B.  -a
C.  -l
D.  -e
  3.  Which virus type will rewrite itself after ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required