CEH v9 - Raymond Blockmon - E-Book

CEH v9 E-Book

Raymond Blockmon

3,8
25,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

Master CEH v9 and identify your weak spots CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence--and skills--you need to pass. These tests cover all five sections of the exam, allowing you to test your knowledge of Assessment; Security; Tools and Systems; Procedures and Methodology; and Regulation, Policy, and Ethics. Coverage aligns with CEH version 9, including material on cloud, tablet, and mobile phone security and attacks, as well as the latest vulnerabilities including Heartbleed, shellshock, and Poodle. The exams are designed to familiarize CEH candidates with the test format, allowing them to become more comfortable reading a Wireshark .pcap file or viewing visual depictions of network attacks. The ideal companion for the Sybex CEH v9 Study Guide, this book is an invaluable tool for anyone aspiring to this highly-regarded certification. Offered by the International Council of Electronic Commerce Consultants, the Certified Ethical Hacker certification is unique in the penetration testing sphere, and requires preparation specific to the CEH exam more than general IT security knowledge. This book of practice tests help you steer your study where it needs to go by giving you a glimpse of exam day while there's still time to prepare. * Practice all five sections of the CEH v9 exam * Test your knowledge of security, tools, procedures, and regulations * Gauge your understanding of new vulnerabilities and threats * Master the material well in advance of exam day By getting inside the mind of a hacker, you gain a one-of-a-kind perspective that dramatically boosts your marketability and advancement potential. If you're ready to attempt this unique certification, the CEH: Certified Ethical Hacker Version 9 Practice Tests are the major preparation tool you should not be without.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 241

Veröffentlichungsjahr: 2016

Bewertungen
3,8 (18 Bewertungen)
6
6
2
4
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



CEH™ v9 Certified Ethical Hacker Version 9 Practice Tests

Raymond Blockmon

Executive Editor: Jim Minatel Development Editor: Kim Wimpsett Technical Editors: Dwayne Machinski; Paul Calatayud; Charles Tendell Production Editor: Dassi Zeidel Copy Editor: Judy Flynn Editorial Manager: Mary Beth Wakefield Production Manager: Kathleen Wisor Supervising Producer: Rich Graves Book Designers: Judy Fung and Bill Gibson Proofreader: Nancy Carrasco Indexer: Ted Laux Project Coordinator, Cover: Brent Savage

Cover Designer: Wiley Cover Image: © Getty Images Inc./Jeremy Woodhouse

Copyright © 2016 by John Wiley & Sons, Inc., Indianapolis, Indiana

Published simultaneously in Canada

ISBN: 978-1-119-25215-3

ISBN: 978-1-119-29516-7 (ebk.)

ISBN: 978-1-119-25216-0 (ebk.)

Manufactured in the United States of America

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.

For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.

Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.

Library of Congress Control Number: 2016934920

& Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CEH is a trademark of EC-Council. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

I’d like to dedicate this exam book to my children, Samarea, Raeleah, Ray J, and Savion. These four are the inspiration in all that I do.

I would also like to dedicate this to my mom, Olga Blockmon, and my dad, Paul Blockmon. They have been there for me at every step of the way. My father is truly the inspiration of what I wanted to be—a hard worker and a dedicated family man. He epitomizes what a father should truly be. My mother always believed in me and always spared no expense when it came to supporting me. Thank you, Mom and Dad, for everything. There is no way I can ever repay you.

And to my Lord and Savior Jesus Christ—with You, nothing can stop me.

Acknowledgments

Thank you to Dan Kasperon, the chief building inspector of Suisun City, California. This gentleman gave me a chance to do something great. He hired me as an intern for desktop support. Little did I know, I was the only person in the IT shop. I supported over 300 employees, and at several different locations. Needless to say, it was the best job I have ever had in my life; great people and a great city to work for.

Thank you to Dwayne Machinski and John Glover—two of the best IT pros I have ever had the pleasure of working with. They gave me the tools and confidence to tackle anything—and they believed in me. Thanks guys.

Thank you to Jim Minatel and the Wiley & Son's publishing family for giving me the opportunity to work on this wonderful project. I truly thank each and every one of you.

About the Author

Raymond Blockmon worked as an intern for the Suisun City, California, government offices. California. Supporting more than 300 personnel and several locations, he realized that this was a job he enjoyed. Eventually, he would move on and enlist in the army as a fire direction specialist.

Raymond served two combat tours in Iraq as a fire support specialist and a fire support officer. He received his commission as a field artillery officer at Cameron University, Lawton, Oklahoma. He later transitioned as a signal officer. Raymond was then assigned as the regional network operation security center officer in charge at Camp Arifjan, Kuwait. He directly oversaw all US Army installation tier 2 network operations in the Middle East, to include Egypt, Saudi Arabia, Iraq, Bahrain, Jordan, and Qatar.

He was then selected to become a cyber network defense manager with the newly activated US Army Cyber Protection Brigade at Fort Gordon, Georgia.

Raymond has also taught CEH, CISSP, and PMP courses and freelances as a CISSP and PMP course developer for commercial vendors.

Raymond holds a bachelor of science degree in Computer Information Systems from Cameron University and a master of arts in Organizational Leadership from Brandman University. His certifications are Network+, CCNA Routing and Switching, CEH, CISSP, and PMP. Raymond is currently enrolled at Webster University and is pursuing a master of arts in Information Technology Management.

Contents

Introduction

Chapter 1 Practice Test 1

Chapter 2 Practice Test 2

Chapter 3 Practice Test 3

Chapter 4 Practice Test 4

Chapter 5 Practice Test 5

Appendix Answers to Review Questions

Practice Test 1

Practice Test 2

Practice Test 3

Practice Test 4

Practice Test 5

Index

Advert

EULA

Guide

Cover

Table of Contents

Chapter

Pages

iii

iv

vii

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

173

174

175

176

177

178

179

180

181

182

183

184

Introduction

This exam book is designed to give the CEH candidate a realistic idea of what the CEH exam will look like. As a candidate, you should be familiar with Wireshark, Nmap, and other tools. To get the most out of these exams, you should consider constructing a virtual lab and practicing with the tools to become familiar with viewing the logs that are generated. In preparing for the CEH exam, you will benefit greatly by using YouTube. YouTube is a goldmine of information—and it’s free. It is also recommended that you keep up with the latest malware and cybersecurity news provided online. Most cybersecurity-related websites provide insight on the latest vulnerabilities and exploits that are in the wild. Keeping up to date with this information will only add value to your CEH knowledge and will help solidify your understanding even more.

Finally, this exam book should not be the only resource you use to prepare. You should use other exam books and study guides as well. The more diverse the exposure in terms of reading and preparation material, the better. Take your time studying; invest at least one hour per day prior to your exam date.

If you have not already read CEHv9: Certified Ethical Hacker Version 9 Study Guide by Sean-Philip Oriyano (Sybex, 2016) and you’re not seeing passing grades on these practice tests, you should invest in the Study Guide since it is an excellent resource to master any of the CEH topics that may be causing you problems.

CHAPTER 1Practice Test 1

1.Which of the following is considered a passive reconnaissance action?

Searching through the local paperCalling Human ResourcesUsing the nmap -sT commandConducting a man-in-the-middle attackSetting up a rogue hot spot

2. Which encryption was selected by NIST as the principal method for providing confidentiality after the DES algorithm?

3DESTwofishRC4AES

3. What tool is able to conduct a man-in-the-Middle Attack on an 802.3 environment?

EttercapCain & AbelWiresharkNmap

4. What is the difference between a traditional firewall and an IPS?

Firewalls do not generate logs.IPS cannot drop packets.IPS does not follow rules.IPS can dissect packets.

5. Why is it important to scan your target network slowly?

To avoid alerting the IDSIt is not necessary to scan the network slowly.To evade the firewallServices may not have started, so starting slowly ensures that you capture services that started late.

6. You are the senior manager in the IT department for your company. What is the most cost effective way to prevent social engineering attacks?

Install HIDS.Ensure that all patches are up-to-date.Monitor and control all email activity.Implement user awareness training.

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!