Certified Ethical Hacker 2

Certified Ethical Hacker 2

University

10 Qs

quiz-placeholder

Similar activities

Food Safety

Food Safety

University - Professional Development

10 Qs

Managing inventories

Managing inventories

University - Professional Development

11 Qs

KUIS 5,6,7 PEMASARAN FARMASI

KUIS 5,6,7 PEMASARAN FARMASI

University

10 Qs

TT - Quiz - Italy

TT - Quiz - Italy

10th Grade - University

10 Qs

Purification & Types of water

Purification & Types of water

1st Grade - Professional Development

15 Qs

rubiks cube quiz

rubiks cube quiz

KG - Professional Development

13 Qs

Basic Nutrition

Basic Nutrition

University

10 Qs

RAPAT TELECONFERENCE

RAPAT TELECONFERENCE

12th Grade - University

10 Qs

Certified Ethical Hacker 2

Certified Ethical Hacker 2

Assessment

Quiz

Other

University

Hard

Created by

Evgeny Stroev

Used 10+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

During the process of encryption and decryption, what keys are shared?

Private keys

User passwords

Public keys

Public and private keys

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security engineer has been asked to deploy a secure remote access solution that will allow employees to connect to the company's internal network. Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?

SSL

Mutual authentication

IPSec

Static IP addresses

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

On a Linux device, which of the following commands will start the Nessus client in the background so that the Nessus server can be configured?

nessus +

nessus *s

nessus &

nessus -d

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a hashing algorithm?

MD5

PGP

DES

ROT13

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of vulnerability/attack is it when the malicious person forces the user's browser to

send an authenticated request to a server?

Cross-site request forgery

Cross-site scripting

Session hijacking

Server side request forgery

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following command line switch would you use for OS detection in Nmap?

-D

-O

-P

-X

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Supposed you are the Chief Network Engineer of a certain Telco. Your company is planning for a big business expansion and it requires that your network authenticate users connecting using analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network. Which AAA protocol would you implement?

TACACS+

DIAMETER

Kerberos

RADIUS

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?