لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What is the maximum value of a “tinyint” field in most database systems?
A. 222
B. 224 or more
C. 240 or less
D. 225 or more
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
A. Windows computers will not respond to idle scans
B. Linux/Unix computers are constantly talking
C. Linux/Unix computers are easier to compromise
D. Windows computers are constantly talking
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Many security and compliance projects begin with a simple idea: assess the organization's risk, vulnerabilities, and breaches. Implementing an IT security risk assessment is critical to the overall security posture of any organization. An effective security risk assessment can prevent breaches and reduce the impact of realized breaches. [ECCouncil-412-79v8-10.3/ECCouncil-412-79v8-8_2.png] What is the formula to calculate risk?
A. Risk = Budget x Time
B. Risk = Goodwill x Reputation
C. Risk = Loss x Exposure factor
D. Risk = Threats x Attacks
عرض الإجابة
اجابة صحيحة: C
السؤال #4
Which one of the following is a useful formatting token that takes an int * as an argument, and writes the number of bytes already written, to that location?
A. "%p"
B. "%n"
C. "%w"
D. "%s"
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which one of the following is a useful formatting token that takes an int * as an argument, and writes the number of bytes already written, to that location?
A. "%p"
B. "%n"
C. "%w"
D. "%s"
عرض الإجابة
اجابة صحيحة: B
السؤال #6
When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?
A. Passive IDS
B. Active IDS
C. Progressive IDS
D. NIPS
عرض الإجابة
اجابة صحيحة: B
السؤال #7
How many bits is Source Port Number in TCP Header packet?
A. 48
B. 32
C. 64
D. 16
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Network scanning is used to identify the available network resources. Which one of the following is also known as a half-open scan, because a full TCP connection is never completed and it is used to determine which ports are open and listening on a target device?
A. SYN Scan
B. TCP Connect Scan
C. XMAS Scan
D. Null Scan
عرض الإجابة
اجابة صحيحة: A
السؤال #9
TCP/IP provides a broad range of communication protocols for the various applications on the network. The TCP/IP model has four layers with major protocols included within each layer. Which one of the following protocols is used to collect information from all the network devices?
A. Simple Network Management Protocol (SNMP)
B. Network File system (NFS)
C. Internet Control Message Protocol (ICMP)
D. Transmission Control Protocol(TCP)
عرض الإجابة
اجابة صحيحة: A
السؤال #10
HTTP protocol specifies that arbitrary binary characters can be passed within the URL by using %xx notation, where 'xx' is the
A. ASCII value of the character
B. Binary value of the character
C. Decimal value of the character
D. Hex value of the character
عرض الإجابة
اجابة صحيحة: D
السؤال #11
One of the steps in information gathering is to run searches on a company using complex keywords in Google. Which search keywords would you use in the Google search engine to find all the PowerPoint presentations containing information about a target company, ROCHESTON?
A. ROCHESTON +ppt:filesearch
B. ROCHESTON filetype:ppt
C. ROCHESTON fileformat:+ppt
D. ROCHESTON ppt:filestring
عرض الإجابة
اجابة صحيحة: B
السؤال #12
After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the RestrictAnonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that?
A. RestrictAnonymous must be set to "2" for complete security
B. RestrictAnonymous must be set to "3" for complete security
C. There is no way to always prevent an anonymous null session from establishing
D. RestrictAnonymous must be set to "10" for complete security
عرض الإجابة
اجابة صحيحة: A
السؤال #13
TCP/IP model is a framework for the Internet Protocol suite of computer network protocols that defines the communication in an IP-based network. It provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved. Which of the following TCP/IP layers selects the best path through
A. Internet layer
B. Network Access layer
C. Transport layer
D. Application layer
عرض الإجابة
اجابة صحيحة: A
السؤال #14
An "idle" system is also referred to as what?
A. Zombie
B. PC not being used
C. Bot
D. PC not connected to the Internet
عرض الإجابة
اجابة صحيحة: A
السؤال #15
John, the penetration tester in a pen test firm, was asked to find whether NTP services are opened on the target network (10.0.0.7) using Nmap tool. Which one of the following Nmap commands will he use to find it?
A. nmap -sU -p 389 10
B. nmap -sU -p 123 10
C. nmap -sU -p 135 10
D. nmap -sU -p 161 10
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: