DescriptionMaster CEH v9 and identify your weak spots
CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence—and skills—you need to pass. These tests cover all five sections of the exam, allowing you to test your knowledge of Assessment; Security; Tools and Systems; Procedures and Methodology; and Regulation, Policy, and Ethics. Coverage aligns with CEH version 9, including material on cloud, tablet, and mobile phone security and attacks, as well as the latest vulnerabilities including Heartbleed, shellshock, and Poodle. The exams are designed to familiarize CEH candidates with the test format, allowing them to become more comfortable reading a Wireshark .pcap file or viewing visual depictions of network attacks. The ideal companion for the Sybex CEH v9 Study Guide, this book is an invaluable tool for anyone aspiring to this highly-regarded certification.
Offered by the International Council of Electronic Commerce Consultants, the Certified Ethical Hacker certification is unique in the penetration testing sphere, and requires preparation specific to the CEH exam more than general IT security knowledge. This book of practice tests help you steer your study where it needs to go by giving you a glimpse of exam day while there's still time to prepare.
- Practice all five sections of the CEH v9 exam
- Test your knowledge of security, tools, procedures, and regulations
- Gauge your understanding of new vulnerabilities and threats
- Master the material well in advance of exam day
By getting inside the mind of a hacker, you gain a one-of-a-kind perspective that dramatically boosts your marketability and advancement potential. If you're ready to attempt this unique certification, the CEH: Certified Ethical Hacker Version 9 Practice Tests are the major preparation tool you should not be without.
Chapter 1 Practice Test 1 1
Chapter 2 Practice Test 2 27
Chapter 3 Practice Test 3 53
Chapter 4 Practice Test 4 79
Chapter 5 Practice Test 5 105
Appendix Answers to Review Questions 129
|1||8||Errata in Text,The answer for question 39 should be: |
A. During an XMAS scan, the adversary would receive an RST response from the port if it is closed because the scan sends the FIN, URG, and the PSH flags.
|2||29||Errata in Text,Question 10 option A, currently reads:|
|Answers to review questions||139||Errata in Text,Question 10 answer currently reads:|
A. In Linux, the read and execute permission value is 6 because of the number of bits set on the file record. If we wanted to give permission only to read, the value would be set to 1; for only write, the value would be 4; if we wanted to give read, write, and execute permissions, the value would be 7 because it?s the sum of 4, 2 , and 1
A. Read is set to 4, write is set to 2, execute is set to 1, no permission is set to 0. The value for Read and execute would be 4 and 1 which equals 5