Certified Ethical Hacker (CEHv9) Questions and answers
53. After trying multiple exploits, you've gained root access to a Centos 6 server. To ensure you maintain access,
what would you do first?
A. Create User Account
B. Disable Key Services
C. Download and Install Netcat
D. Disable IPTables
54. Which of the following is the structure designed to verify and authenticate the identity of individuals
within the enterprise taking part in a data exchange?
B. single site on
< Prev.Page             CEHv9 Home             Next page>