Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    117. During a security audit of IT processes, an IS auditor found that there were no documented security procedures. What should the IS auditor do?

    A. Conduct compliance testing

    B. Terminate the audit

    C. Create a procedures document

    D. Identify and evaluate existing practices

    118. You are using NMAP to resolve domain names into IP addresses for a ping sweep later. Which of the following commands looks for IP addresses?

    A. > host 4 AXFR hackeddomain.com

    B. host 4 a hackeddomain.com (host -t a hackedme.com)

    C. >host 4 soa hackeddomain.com

    D. host 4 ns hackeddomain.com

    < Prev.Page             CEHv9 Home             Next page>