Certified Ethical Hacker (CEHv9) Questions and answers
11. To determine if a software program properly handles a wide range of invalid input, a form of automated
testing can be used to randomly generate invalid input in an attempt to crash the program. What term is commonly used when referring
to this type of testing?
12. You have compromised a server on a network and successfully opened a shell.
You aimed to identify all operating systems running on the network. However, as you attempt to fingerprint all machines in
the network using the nmap syntax below, it is not going through. invictusavictim_server-$ nmap -T4 -0 10.10.0.0/24 TCP/IP
fingerprinting (for OS scan) xx.xxx x,00Docxxxxxxxxx. QUITTING! What seems to be wrong?
A. The outgoing TCP/IP fingerprinting is blocked by the host firewall.
B. This is a common behavior for a corrupted nmap application.