Computer Lab for Rent
Meeting Room Rental
Training Facility Rental
Exam Testing Center
Purchase Exam Vouchers
Custom Course Development
Who We Are
Work With Us
Take this free CEH quiz to prove you have what it takes to stop the bad guys!:
Step 1 of 11
Which OSI layer does TCP/IP communicate on?
Which attacker possesses the highest risk to your network?
White hat hackers
Grey hat hackers
Black hat hackers
What message is replied from ICMP to denote TTL has reached 0?
Which of these is used by SHA-1?
What countermeasure can be implemented to specifically protect against both the MAC Flood and MAC Spoofing attacks?
Configure Switch Mapping
Configure Multiple Recognition on the switch
Configure Port Recon on the switch
Configure Port Security on the switch
Which technique will not defend against ARP spoofing?
Tune IDS Sensors to look for large amounts of ARP traffic on local subnets.
Use private VLANS.
Place static ARP entries on servers, workstations and routers.
Use ARPWALL system and block ARP spoofing attacks.
Which protocol is used by SNMP?
What scanner utilizes automated processes to identify vulnerabilities of the computing systems present on a network?
Which of the following tools would most likely be used to perform security audit on various forms of network systems?
Intrusion detection system
How does traceroute determine each node a packet reaches until making it to its destination?
Manipulates the flags within packets to force gateways into generating error messages.
Uses a protocol that will be rejected by gateways on its way to its destination.
Manipulates the value of the time to live (TTL) within packet to elicit a time exceeded to transit message.
Uses a TCP time stamp packet that will elicit a time exceeded in transit message.
Confirm Your Email to See Your Score!