Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Quiz 312-50 (CEH v6)

Recent Comments

  1. Jan Dowsky on which type of Layer 2 attack can you intercept traffic …
  2. Joao on Which happens if the swap file of a virtual machine is …
  3. P.C.S.O.R. on What could cause this error?
  4. mur on Which two statements about administrative access to the Cisco Secure ACS SE are true?
  5. rubik on Which GPOs will apply to User2 when the user signs in t…

Quiz 312-50 (CEH v6)

Tyler logs onto this client computer and types in the following command:What is Tyler trying to accomplish by using this command?

What is most likely occurring here?

What would be the best password attack methodfor Lauren to use in this situation?

From one of the client computers running Linux, you open a command shell and type in the following command:What are you trying to accomplish?

What software utility can Paul use to notify him if any war dialing attempts are made on his PBX?

What type of scan is Hayden attempting here?

He types in the following command:What is Jonathan trying to accomplish by using HPING2?

This external auditor types in the folloing Google search attempting to glean information from the web server: What is the auditor trying to accomplish here?

Kyle then types in another URL:What is Kyle attempting here?

What are you trying to do here?

Posts navigation

Previous 1 … 11 12 13 … 201 Next
Equizzing
    Privacy Policy

© 2025 Equizzing