CEH v9: Certified Ethical Hacker Version 9 Practice Tests
CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence—and skills—you need to pass. These tests cover all five sections of the exam, allowing you to test your knowledge of Assessment; Security; Tools and Systems; Procedures and Methodology; and Regulation, Policy, and Ethics. Coverage aligns with CEH version 9, including material on cloud, tablet, and mobile phone security and attacks, as well as the latest vulnerabilities including Heartbleed, shellshock, and Poodle. The exams are designed to familiarize CEH candidates with the test format, allowing them to become more comfortable reading a Wireshark .pcap file or viewing visual depictions of network attacks. The ideal companion for the Sybex CEH v9 Study Guide, this book is an invaluable tool for anyone aspiring to this highly-regarded certification.
Offered by the International Council of Electronic Commerce Consultants, the Certified Ethical Hacker certification is unique in the penetration testing sphere, and requires preparation specific to the CEH exam more than general IT security knowledge. This book of practice tests help you steer your study where it needs to go by giving you a glimpse of exam day while there's still time to prepare.
- Practice all five sections of the CEH v9 exam
- Test your knowledge of security, tools, procedures, and regulations
- Gauge your understanding of new vulnerabilities and threats
- Master the material well in advance of exam day
By getting inside the mind of a hacker, you gain a one-of-a-kind perspective that dramatically boosts your marketability and advancement potential. If you're ready to attempt this unique certification, the CEH: Certified Ethical Hacker Version 9 Practice Tests are the major preparation tool you should not be without.
Chapter 1 Practice Test 1 1
Chapter 2 Practice Test 2 27
Chapter 3 Practice Test 3 53
Chapter 4 Practice Test 4 79
Chapter 5 Practice Test 5 105
Appendix Answers to Review Questions 129
ABOUT THE AUTHOR
Ray Blockmon, CEH, CISSP, PMP, is a cyber network defense manager in the U.S. Army. He has led, managed, and directed over 200 U.S. contractors and U.S. Army soldiers providing IT support to various agencies within the Department of Defense (DoD), as well as drafted, published, and enforced Information Security Policies protecting the DoD network. He is an online lesson developer for Hakin9 magazine, IT consultant and online IT lesson developer, and CISSP and CEH instructor.
Do you think you've discovered an error in this book? Please check the list of errata below to see if we've already addressed the error. If not, please submit the error via our Errata Form. We will attempt to verify your error; if you're right, we will post a correction below.
|1||8||Errata in Text
The answer for question 39 should be:
A. During an XMAS scan, the adversary would receive an RST response from the port if it is closed because the scan sends the FIN, URG, and the PSH flags.
|2||29||Errata in Text
Question 10 option A, currently reads:
|Answers to review questions||139||Errata in Text
Question 10 answer currently reads:
A. In Linux, the read and execute permission value is 6 because of the number of bits set on the file record. If we wanted to give permission only to read, the value would be set to 1; for only write, the value would be 4; if we wanted to give read, write, and execute permissions, the value would be 7 because it?s the sum of 4, 2 , and 1
A. Read is set to 4, write is set to 2, execute is set to 1, no permission is set to 0. The value for Read and execute would be 4 and 1 which equals 5