Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Quiz 312-50 (CEH v6)

Recent Comments

  1. Jan Dowsky on which type of Layer 2 attack can you intercept traffic …
  2. Joao on Which happens if the swap file of a virtual machine is …
  3. P.C.S.O.R. on What could cause this error?
  4. mur on Which two statements about administrative access to the Cisco Secure ACS SE are true?
  5. rubik on Which GPOs will apply to User2 when the user signs in t…

Quiz 312-50 (CEH v6)

In the context of Windows Security, what is a 'null' user?

Which definition below best describes a covert channel?

Which port does SMB over TCP/IP use?

The two halves are hashed individually. If the password is 7 characters or less, than the second half of the hash is always?

If Lori is supposed to scan all known TCP ports, how many ports should she select in the software?

Hackers usually control Bots through…?

How would the attacker use netcat to encrypt the information before transmitting onto the wire?

What Internet registry should Bill look in to find the IP address?

What is the first character that Bob should use to attempt breaking valid SQL request?

What can Angela's IT department do to get access to the education website?

Posts navigation

Previous 1 … 114 115 116 … 201 Next
Equizzing
    Privacy Policy

© 2026 Equizzing