CEH v11
eBook - ePub

CEH v11

Certified Ethical Hacker Version 11 Practice Tests

Ric Messier

Partager le livre
  1. English
  2. ePUB (adapté aux mobiles)
  3. Disponible sur iOS et Android
eBook - ePub

CEH v11

Certified Ethical Hacker Version 11 Practice Tests

Ric Messier

DĂ©tails du livre
Aperçu du livre
Table des matiĂšres
Citations

À propos de ce livre

Master CEH v11 and identify your weak spots

CEH: Certified Ethical Hacker Version11Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence—and skills—you need to pass. These tests cover allsectionsections of the examblueprint, allowing you to test your knowledge ofBackground, Analysis/Assessment, Security, Tools/Systems/Programs, Procedures/Methodology, Regulation/Policy, and Ethics. Coverage aligns with CEH version11, including materialto test your knowledge ofreconnaissance and scanning, cloud, tablet, and mobileand wirelesssecurity and attacks, the latest vulnerabilities, and the new emphasis on Internet of Things (IoT). The exams are designed to familiarize CEH candidates with the test format, allowing them to become more comfortableapply their knowledge and skills in a high-pressure test setting. The ideal companion for the SybexCEH v11 Study Guide, this book is an invaluable tool for anyone aspiring to thishighly-regardedcertification.

Offered by the International Council of Electronic Commerce Consultants, the Certified Ethical Hacker certification is unique in the penetration testingsphere, andrequires preparation specific to the CEH exam more than general IT security knowledge. This book of practice tests help you steer your study where it needs to go by giving you a glimpse of exam day while there's still time to prepare.

  • Practice allsevensections of the CEH v11 exam
  • Test your knowledge of security, tools, procedures, and regulations
  • Gauge your understanding ofvulnerabilities and threats
  • Master the material well in advance of exam day

By getting inside the mind ofan attacker, you gain a one-of-a-kind perspective that dramatically boosts your marketability and advancement potential. If you're ready to attempt this unique certification, the CEH: Certified Ethical Hacker Version 11 Practice Tests are the major preparation tool you should not be without.

Foire aux questions

Comment puis-je résilier mon abonnement ?
Il vous suffit de vous rendre dans la section compte dans paramĂštres et de cliquer sur « RĂ©silier l’abonnement ». C’est aussi simple que cela ! Une fois que vous aurez rĂ©siliĂ© votre abonnement, il restera actif pour le reste de la pĂ©riode pour laquelle vous avez payĂ©. DĂ©couvrez-en plus ici.
Puis-je / comment puis-je télécharger des livres ?
Pour le moment, tous nos livres en format ePub adaptĂ©s aux mobiles peuvent ĂȘtre tĂ©lĂ©chargĂ©s via l’application. La plupart de nos PDF sont Ă©galement disponibles en tĂ©lĂ©chargement et les autres seront tĂ©lĂ©chargeables trĂšs prochainement. DĂ©couvrez-en plus ici.
Quelle est la différence entre les formules tarifaires ?
Les deux abonnements vous donnent un accĂšs complet Ă  la bibliothĂšque et Ă  toutes les fonctionnalitĂ©s de Perlego. Les seules diffĂ©rences sont les tarifs ainsi que la pĂ©riode d’abonnement : avec l’abonnement annuel, vous Ă©conomiserez environ 30 % par rapport Ă  12 mois d’abonnement mensuel.
Qu’est-ce que Perlego ?
Nous sommes un service d’abonnement Ă  des ouvrages universitaires en ligne, oĂč vous pouvez accĂ©der Ă  toute une bibliothĂšque pour un prix infĂ©rieur Ă  celui d’un seul livre par mois. Avec plus d’un million de livres sur plus de 1 000 sujets, nous avons ce qu’il vous faut ! DĂ©couvrez-en plus ici.
Prenez-vous en charge la synthÚse vocale ?
Recherchez le symbole Écouter sur votre prochain livre pour voir si vous pouvez l’écouter. L’outil Écouter lit le texte Ă  haute voix pour vous, en surlignant le passage qui est en cours de lecture. Vous pouvez le mettre sur pause, l’accĂ©lĂ©rer ou le ralentir. DĂ©couvrez-en plus ici.
Est-ce que CEH v11 est un PDF/ePUB en ligne ?
Oui, vous pouvez accĂ©der Ă  CEH v11 par Ric Messier en format PDF et/ou ePUB ainsi qu’à d’autres livres populaires dans Computer Science et Cyber Security. Nous disposons de plus d’un million d’ouvrages Ă  dĂ©couvrir dans notre catalogue.

Informations

Éditeur
Sybex
Année
2021
ISBN
9781119824527
Édition
2
Sous-sujet
Cyber Security

Chapter 1
Practice Test 1

  1. Which of the following is considered a passive reconnaissance action?
    1. Searching through the local paper
    2. Calling Human Resources
    3. Using the nmap -sT command
    4. Conducting a man-in-the-middle attack
  2. Which encryption was selected by NIST as the principal method for providing confidentiality after the DES algorithm?
    1. 3DES
    2. Twofish
    3. RC4
    4. AES
  3. What cloud service would you be most likely to use if you wanted to share documents with another person?
    1. Software as a Service
    2. Platform as a Service
    3. Storage as a Service
    4. Infrastructure as a Service
  4. What is the difference between a traditional firewall and an IPS?
    1. Firewalls don't generate logs.
    2. An IPS cannot drop packets.
    3. An IPS does not follow rules.
    4. An IPS can inspect and drop packets.
  5. What is one of the advantages of IPv6 over IPv4 from a security perspective?
    1. IPv4 has a smaller address space.
    2. IPv6 allows for header authentication.
    3. IPv6 is more flexible about extensions.
    4. IPv6 is typically represented in hexadecimal.
  6. You are the senior manager in the IT department for your company. What is the most cost-effective way to prevent social engineering attacks?
    1. Install HIDS.
    2. Ensure that all patches are up-to-date.
    3. Monitor and control all email activity.
    4. Implement security awareness training.
  7. In which phase within the ethical hacking framework do you alter or delete log information?
    1. Scanning and enumeration
    2. Gaining access
    3. Reconnaissance
    4. Covering tracks
  8. An attacker is conducting the following on the target workstation: nmap -sT 192.33.10....

Table des matiĂšres