Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Quiz 312-50 (CEH v6)

Recent Comments

  1. Jan Dowsky on which type of Layer 2 attack can you intercept traffic …
  2. Joao on Which happens if the swap file of a virtual machine is …
  3. P.C.S.O.R. on What could cause this error?
  4. mur on Which two statements about administrative access to the Cisco Secure ACS SE are true?
  5. rubik on Which GPOs will apply to User2 when the user signs in t…

Quiz 312-50 (CEH v6)

Which of the following is not an effective countermeasure against replay attacks?

You may be able to identify the IP addresses and machine names for the firewall, and the names of internal mail servers by:

What type of attack changes its signature and/or payload to avoid detection by antivirus programs?

If you come across a sheepdip machine at your client's site, what should you do?

Why is this happening?

Which of the following IP addresses will respond to the ping and hence will likely be responsible for the the intrusion?

Which one of the following techniques can be very effective at avoiding proper detection?

Bob, an Administrator at pass4sure was furious when he discovered that his buddy Trent, has launched a session hijack attack against his network, and sniffed on his communication, including administrative tasks suck as configuring routers, firewalls, IDS, via Telnet. Bob, being an unhappy administrator, seeks your help to assist him in ensuring that attackers such as Trent will not be able to launch a session hijack in pass4sure. Based on the above scenario, please choose which would be your corrective measurement actions (Choose two)

What type of technique might be used by these offenders to access the Internet without restriction?

Carl has successfully compromised a web server from behind a firewall by exploiting a vulnerability in the web server program. He wants to proceed by installing a backdoor program. However, he is aware that not all inbound ports on the firewall are in the open state. From the list given below, identify the port that is most likely to be open and allowed to reach the server that Carl has just compromised.

Posts navigation

Previous 1 … 14 15 16 … 201 Next
Equizzing
    Privacy Policy

© 2025 Equizzing