Certified Ethical Hacker (CEHv9) Questions and answers
117. During a security audit of IT processes, an IS auditor found that there were no documented security procedures. What should the IS auditor do?
A. Conduct compliance testing
B. Terminate the audit
C. Create a procedures document
D. Identify and evaluate existing practices
118. You are using NMAP to resolve domain names into IP addresses for a ping sweep later.
Which of the following commands looks for IP addresses?
A. > host 4 AXFR hackeddomain.com
B. host 4 a hackeddomain.com (host -t a hackedme.com)
C. >host 4 soa hackeddomain.com
D. host 4 ns hackeddomain.com
< Prev.Page             CEHv9 Home             Next page>