Computer Lab for Rent
Meeting Room Rental
Training Facility Rental
Exam Testing Center
Purchase Exam Vouchers
Custom Course Development
Who We Are
Work With Us
Take this free CEH quiz to prove you have what it takes to stop the bad guys!:
Step 1 of 11
What countermeasure can be implemented to specifically protect against both the MAC Flood and MAC Spoofing attacks?
Configure Multiple Recognition on the switch
Configure Switch Mapping
Configure Port Recon on the switch
Configure Port Security on the switch
What message is replied from ICMP to denote TTL has reached 0?
Which of these is used by SHA-1?
What scanner utilizes automated processes to identify vulnerabilities of the computing systems present on a network?
Which of the following tools would most likely be used to perform security audit on various forms of network systems?
Intrusion detection system
Which attacker possesses the highest risk to your network?
Black hat hackers
Grey hat hackers
White hat hackers
Which protocol is used by SNMP?
Which OSI layer does TCP/IP communicate on?
Which technique will not defend against ARP spoofing?
Use ARPWALL system and block ARP spoofing attacks.
Tune IDS Sensors to look for large amounts of ARP traffic on local subnets.
Place static ARP entries on servers, workstations and routers.
Use private VLANS.
How does traceroute determine each node a packet reaches until making it to its destination?
Manipulates the value of the time to live (TTL) within packet to elicit a time exceeded to transit message.
Uses a protocol that will be rejected by gateways on its way to its destination.
Uses a TCP time stamp packet that will elicit a time exceeded in transit message.
Manipulates the flags within packets to force gateways into generating error messages.
Confirm Your Email to See Your Score!