Certified Ethical Hacker 2

Certified Ethical Hacker 2

University

10 Qs

quiz-placeholder

Similar activities

Guess the anime

Guess the anime

KG - Professional Development

6 Qs

pre-test modul 4

pre-test modul 4

University

10 Qs

Drug For Anti-Hypertension

Drug For Anti-Hypertension

University

11 Qs

Post Test Webinar 1 ATRO Bali

Post Test Webinar 1 ATRO Bali

University

15 Qs

PLANE TABLE SURVEYING

PLANE TABLE SURVEYING

University

15 Qs

Seatwork No. 2 AMT 2106

Seatwork No. 2 AMT 2106

University

10 Qs

Intro to Data Comm

Intro to Data Comm

University

10 Qs

Q-Confras-Mod1

Q-Confras-Mod1

University

10 Qs

Certified Ethical Hacker 2

Certified Ethical Hacker 2

Assessment

Quiz

Other

University

Hard

Created by

Evgeny Stroev

Used 10+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

During the process of encryption and decryption, what keys are shared?

Private keys

User passwords

Public keys

Public and private keys

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security engineer has been asked to deploy a secure remote access solution that will allow employees to connect to the company's internal network. Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?

SSL

Mutual authentication

IPSec

Static IP addresses

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

On a Linux device, which of the following commands will start the Nessus client in the background so that the Nessus server can be configured?

nessus +

nessus *s

nessus &

nessus -d

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a hashing algorithm?

MD5

PGP

DES

ROT13

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of vulnerability/attack is it when the malicious person forces the user's browser to

send an authenticated request to a server?

Cross-site request forgery

Cross-site scripting

Session hijacking

Server side request forgery

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following command line switch would you use for OS detection in Nmap?

-D

-O

-P

-X

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Supposed you are the Chief Network Engineer of a certain Telco. Your company is planning for a big business expansion and it requires that your network authenticate users connecting using analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network. Which AAA protocol would you implement?

TACACS+

DIAMETER

Kerberos

RADIUS

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?