Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Quiz 312-50 (CEH v6)

Recent Comments

  1. Jan Dowsky on which type of Layer 2 attack can you intercept traffic …
  2. Joao on Which happens if the swap file of a virtual machine is …
  3. P.C.S.O.R. on What could cause this error?
  4. mur on Which two statements about administrative access to the Cisco Secure ACS SE are true?
  5. rubik on Which GPOs will apply to User2 when the user signs in t…

Quiz 312-50 (CEH v6)

Which definition below best describes a covert channel?

Why does the host respond to hping2 and not ping packet?

Which port does SMB over TCP/IP use?

How would the attacker use netcat to encrypt the information before transmitting onto the wire?

The two halves are hashed individually. If the password is 7 characters or less, than the second half of the hash is always?

If Lori is supposed to scan all known TCP ports, how many ports should she select in the software?

Hackers usually control Bots through…?

What Internet registry should Bill look in to find the IP address?

What is the first character that Bob should use to attempt breaking valid SQL request?

What can Angela's IT department do to get access to the education website?

Posts navigation

Previous 1 … 114 115 116 … 201 Next
Equizzing
    Privacy Policy

© 2025 Equizzing