tutorialpoint.org

Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    101. You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly. What is the best nmay command you will use?

    A. nmap -T4 -r 10.10.1.0/24

    B. nmap -T4 -F 10.10.0.0/24

    C. nmap -T4 -q 10.10.0.0/24

    D. nmap -T4 -0 10.10.0.0/24



    102. To maintain compliance with regulatory requirements, a security audit of the systems on a network most be performed to determine their compliance with security policies. Which one of the following tools would most likely be used in such an audit?

    A. Protocol analyzer

    B. Port scanner

    C. Intrusion Detection System

    D. Vulnerability scanner



    < Prev.Page             CEHv9 Home             Next page>