Computer Lab for Rent
Meeting Room Rental
Training Facility Rental
Exam Testing Center
Purchase Exam Vouchers
Custom Course Development
Who We Are
Work With Us
Take this free CEH quiz to prove you have what it takes to stop the bad guys!:
Step 1 of 11
How does traceroute determine each node a packet reaches until making it to its destination?
Uses a protocol that will be rejected by gateways on its way to its destination.
Manipulates the value of the time to live (TTL) within packet to elicit a time exceeded to transit message.
Uses a TCP time stamp packet that will elicit a time exceeded in transit message.
Manipulates the flags within packets to force gateways into generating error messages.
What countermeasure can be implemented to specifically protect against both the MAC Flood and MAC Spoofing attacks?
Configure Port Security on the switch
Configure Switch Mapping
Configure Multiple Recognition on the switch
Configure Port Recon on the switch
What scanner utilizes automated processes to identify vulnerabilities of the computing systems present on a network?
Which attacker possesses the highest risk to your network?
White hat hackers
Grey hat hackers
Black hat hackers
Which OSI layer does TCP/IP communicate on?
What message is replied from ICMP to denote TTL has reached 0?
Which of the following tools would most likely be used to perform security audit on various forms of network systems?
Intrusion detection system
Which technique will not defend against ARP spoofing?
Use ARPWALL system and block ARP spoofing attacks.
Tune IDS Sensors to look for large amounts of ARP traffic on local subnets.
Place static ARP entries on servers, workstations and routers.
Use private VLANS.
Which protocol is used by SNMP?
Which of these is used by SHA-1?
Confirm Your Email to See Your Score!