Certified Ethical Hacker Practice Test 1 CEH (312-50)

Certified Ethical Hacker Practice Test 1 CEH (312-50)


____________ reports all open TCP/IP and UDP ports and maps them to the owning application. Youcan use this tool to quickly identify unknown open ports and their associated applications.

 

 

 

 

Which of the below DNS Records, Maps IP addresses to hostnames

 

 

 

 

____________is a steganography application that hides information inside BMP (bitmap)images. It’s a command-line utility.

 

 

 

 

__________ is a free, open source tool that quickly and efficiently performs ping sweeps, port scanning, service identification, IP address detection, and operating system detection. It has the benefit of scanning a large number of machines in a single session. It’s supported by many operating systems, including Unix, Windows, and Linux.

 

 

 

 

Which of the below is not a Trojan program ?

 

 

 

 

User 2SID and SID2 User are command-line tools that look up Windows service identifiers SIDs from username input.

 

 

 

 

A piece of software or technology that takes advantage of a bug, glitch, or vulnerability, leading to unauthorized access, privilege escalation, or denial of service on a computer system.

 

 

 

 

_____________performs ping sweeps, port scanning, service identification, IP address detection, and operating system detection. It has the benefit of scanning a large number of machines in a single session. It’s supported by many operating systems, including Unix, Windows, and Linux.

 

 

 

 

The _________________ file in Windows contains the usernames and hashed passwords. It’s located in theWindows\system32\config directory.

 

 

 

 

_________________ Viruses are encrypted to avoid detection.

 

 

 

 


Question 1 of 10