Books

5 Cybersecurity Books From The Experts

Cybersecurity professionals also have some must-read literature. In this article, we have collected five books that can be put at the top of the list or kept on hand as desktop books. All of the titles on the list are more suitable for practitioners with a base of core knowledge. 1. Malware Analyst’s Cookbook and […]

Q&A

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 14

QUESTION 300 Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs? A. Dsniff B. John the Ripper C. Snort D. Nikto Correct Answer: D QUESTION 301 Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, smallsized packets to the target computer, making […]

Q&A

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 13

QUESTION 277 Which of the following is the successor of SSL? A. GRE B. IPSec C. RSA D. TLS Correct Answer: D QUESTION 278 This international organization regulates billions of transactions daily and provides security guidelines to protect personally identifiable information (PII). These security controls provide a baseline and prevent low-level hackers sometimes known as […]

Q&A

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 12

QUESTION 254 Which of the following is assured by the use of a hash? A. Authentication B. Confidentially C. Availability D. Integrity Correct Answer: D QUESTION 255 Risks=Threats x Vulnerabilities is referred to as the: A. BIA equation B. Disaster recovery formula C. Risk equation D. Threat assessment Correct Answer: C QUESTION 256 The tools […]

Q&A

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 11

QUESTION 231 Which of the following is the least-likely physical characteristic to be used in biometric control that supports a large company? A. Voice B. Fingerprints C. Iris patterns D. Height and Weight Correct Answer: D QUESTION 232 While using your bank’s online servicing you notice the following string in the URL bar: “http: // […]

Q&A

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 10

QUESTION 208 A company’s Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application. What kind of Web application […]

Q&A

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 9

QUESTION 185 What is the role of test automation in security testing? A. It is an option but it tends to be very expensive. B. It should be used exclusively. Manual testing is outdated because of low speed and possible test setup inconsistencies. C. Test automation is not usable in security due to the complexity […]

Q&A

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 8

QUESTION 162 Which of the following Nmap commands will produce the following output? A. nmap –sT –sX –Pn –p 1-65535 192.168.1.1 B. nmap –sN –Ps –T4 192.168.1.1 C. nmap –sS –sU –Pn –p 1-65535 192.168.1.1 D. nmap –sS –Pn 192.168.1.1 Correct Answer: C QUESTION 163 As an Ethical Hacker you are capturing traffic from your […]

Q&A

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 7

QUESTION 139 An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next? A. He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer. B. He will activate OSPF on the spoofed root bridge. C. He […]

Q&A

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 6

QUESTION 116 A virus that attempts to install itself inside the file it is infecting is called? A. Tunneling virus B. Cavity virus C. Polymorphic virus D. Stealth virus Correct Answer: B QUESTION 117 Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the […]

Q&A

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 5

QUESTION 93 Which of the following security policies defines the use of VPN for gaining access to an internal corporate network? A. Network security policy B. Information protection policy C. Access control policy D. Remote access policy Correct Answer: D QUESTION 94 To determine if a software program properly handles a wide range of invalid […]

Q&A

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 4

QUESTION 70 Based on the below log, which of the following sentences are true? Mar 1, 2016, 7:33:28 AM 10.240.250.23 – 54373 10.249.253.15 – 22 tcp_ip A. SSH communications are encrypted it’s impossible to know who is the client or the server B. Application is FTP and 10.240.250.23 is the client and 10.249.253.15 is the […]

Q&A

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 3

QUESTION 47 The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation? A. ACK B. SYN C. RST D. SYN-ACK Correct Answer: B QUESTION 48 You need a tool that can do network intrusion prevention and […]

Q&A

Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 2

QUESTION 24 A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer’s software and hardware without the owner’s permission. Their intention can either be to simply gain knowledge or to illegally make changes. Which of the following class of hacker refers to an individual who works both offensively […]