25,99 €
Master CEH v9 and identify your weak spots CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence--and skills--you need to pass. These tests cover all five sections of the exam, allowing you to test your knowledge of Assessment; Security; Tools and Systems; Procedures and Methodology; and Regulation, Policy, and Ethics. Coverage aligns with CEH version 9, including material on cloud, tablet, and mobile phone security and attacks, as well as the latest vulnerabilities including Heartbleed, shellshock, and Poodle. The exams are designed to familiarize CEH candidates with the test format, allowing them to become more comfortable reading a Wireshark .pcap file or viewing visual depictions of network attacks. The ideal companion for the Sybex CEH v9 Study Guide, this book is an invaluable tool for anyone aspiring to this highly-regarded certification. Offered by the International Council of Electronic Commerce Consultants, the Certified Ethical Hacker certification is unique in the penetration testing sphere, and requires preparation specific to the CEH exam more than general IT security knowledge. This book of practice tests help you steer your study where it needs to go by giving you a glimpse of exam day while there's still time to prepare. * Practice all five sections of the CEH v9 exam * Test your knowledge of security, tools, procedures, and regulations * Gauge your understanding of new vulnerabilities and threats * Master the material well in advance of exam day By getting inside the mind of a hacker, you gain a one-of-a-kind perspective that dramatically boosts your marketability and advancement potential. If you're ready to attempt this unique certification, the CEH: Certified Ethical Hacker Version 9 Practice Tests are the major preparation tool you should not be without.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 241
Veröffentlichungsjahr: 2016
Raymond Blockmon
Executive Editor: Jim Minatel Development Editor: Kim Wimpsett Technical Editors: Dwayne Machinski; Paul Calatayud; Charles Tendell Production Editor: Dassi Zeidel Copy Editor: Judy Flynn Editorial Manager: Mary Beth Wakefield Production Manager: Kathleen Wisor Supervising Producer: Rich Graves Book Designers: Judy Fung and Bill Gibson Proofreader: Nancy Carrasco Indexer: Ted Laux Project Coordinator, Cover: Brent Savage
Cover Designer: Wiley Cover Image: © Getty Images Inc./Jeremy Woodhouse
Copyright © 2016 by John Wiley & Sons, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-1-119-25215-3
ISBN: 978-1-119-29516-7 (ebk.)
ISBN: 978-1-119-25216-0 (ebk.)
Manufactured in the United States of America
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.
Library of Congress Control Number: 2016934920
& Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CEH is a trademark of EC-Council. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
I’d like to dedicate this exam book to my children, Samarea, Raeleah, Ray J, and Savion. These four are the inspiration in all that I do.
I would also like to dedicate this to my mom, Olga Blockmon, and my dad, Paul Blockmon. They have been there for me at every step of the way. My father is truly the inspiration of what I wanted to be—a hard worker and a dedicated family man. He epitomizes what a father should truly be. My mother always believed in me and always spared no expense when it came to supporting me. Thank you, Mom and Dad, for everything. There is no way I can ever repay you.
And to my Lord and Savior Jesus Christ—with You, nothing can stop me.
Thank you to Dan Kasperon, the chief building inspector of Suisun City, California. This gentleman gave me a chance to do something great. He hired me as an intern for desktop support. Little did I know, I was the only person in the IT shop. I supported over 300 employees, and at several different locations. Needless to say, it was the best job I have ever had in my life; great people and a great city to work for.
Thank you to Dwayne Machinski and John Glover—two of the best IT pros I have ever had the pleasure of working with. They gave me the tools and confidence to tackle anything—and they believed in me. Thanks guys.
Thank you to Jim Minatel and the Wiley & Son's publishing family for giving me the opportunity to work on this wonderful project. I truly thank each and every one of you.
Raymond Blockmon worked as an intern for the Suisun City, California, government offices. California. Supporting more than 300 personnel and several locations, he realized that this was a job he enjoyed. Eventually, he would move on and enlist in the army as a fire direction specialist.
Raymond served two combat tours in Iraq as a fire support specialist and a fire support officer. He received his commission as a field artillery officer at Cameron University, Lawton, Oklahoma. He later transitioned as a signal officer. Raymond was then assigned as the regional network operation security center officer in charge at Camp Arifjan, Kuwait. He directly oversaw all US Army installation tier 2 network operations in the Middle East, to include Egypt, Saudi Arabia, Iraq, Bahrain, Jordan, and Qatar.
He was then selected to become a cyber network defense manager with the newly activated US Army Cyber Protection Brigade at Fort Gordon, Georgia.
Raymond has also taught CEH, CISSP, and PMP courses and freelances as a CISSP and PMP course developer for commercial vendors.
Raymond holds a bachelor of science degree in Computer Information Systems from Cameron University and a master of arts in Organizational Leadership from Brandman University. His certifications are Network+, CCNA Routing and Switching, CEH, CISSP, and PMP. Raymond is currently enrolled at Webster University and is pursuing a master of arts in Information Technology Management.
Introduction
Chapter 1 Practice Test 1
Chapter 2 Practice Test 2
Chapter 3 Practice Test 3
Chapter 4 Practice Test 4
Chapter 5 Practice Test 5
Appendix Answers to Review Questions
Practice Test 1
Practice Test 2
Practice Test 3
Practice Test 4
Practice Test 5
Index
Advert
EULA
Cover
Table of Contents
Chapter
iii
iv
vii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
173
174
175
176
177
178
179
180
181
182
183
184
This exam book is designed to give the CEH candidate a realistic idea of what the CEH exam will look like. As a candidate, you should be familiar with Wireshark, Nmap, and other tools. To get the most out of these exams, you should consider constructing a virtual lab and practicing with the tools to become familiar with viewing the logs that are generated. In preparing for the CEH exam, you will benefit greatly by using YouTube. YouTube is a goldmine of information—and it’s free. It is also recommended that you keep up with the latest malware and cybersecurity news provided online. Most cybersecurity-related websites provide insight on the latest vulnerabilities and exploits that are in the wild. Keeping up to date with this information will only add value to your CEH knowledge and will help solidify your understanding even more.
Finally, this exam book should not be the only resource you use to prepare. You should use other exam books and study guides as well. The more diverse the exposure in terms of reading and preparation material, the better. Take your time studying; invest at least one hour per day prior to your exam date.
If you have not already read CEHv9: Certified Ethical Hacker Version 9 Study Guide by Sean-Philip Oriyano (Sybex, 2016) and you’re not seeing passing grades on these practice tests, you should invest in the Study Guide since it is an excellent resource to master any of the CEH topics that may be causing you problems.
1.Which of the following is considered a passive reconnaissance action?
Searching through the local paperCalling Human ResourcesUsing the nmap -sT commandConducting a man-in-the-middle attackSetting up a rogue hot spot2. Which encryption was selected by NIST as the principal method for providing confidentiality after the DES algorithm?
3DESTwofishRC4AES3. What tool is able to conduct a man-in-the-Middle Attack on an 802.3 environment?
EttercapCain & AbelWiresharkNmap4. What is the difference between a traditional firewall and an IPS?
Firewalls do not generate logs.IPS cannot drop packets.IPS does not follow rules.IPS can dissect packets.5. Why is it important to scan your target network slowly?
To avoid alerting the IDSIt is not necessary to scan the network slowly.To evade the firewallServices may not have started, so starting slowly ensures that you capture services that started late.6. You are the senior manager in the IT department for your company. What is the most cost effective way to prevent social engineering attacks?
Install HIDS.Ensure that all patches are up-to-date.Monitor and control all email activity.Implement user awareness training.Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!