100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CEH v10 Memory Check | Questions And Answers Latest {} A+ Graded | 100% Verified $13.48   Add to cart

Exam (elaborations)

CEH v10 Memory Check | Questions And Answers Latest {} A+ Graded | 100% Verified

 1 view  0 purchase
  • Course
  • Top Academic Resources 2024/2025
  • Institution
  • Top Academic Resources 2024/2025

CEH v10 Memory Check | Questions And Answers Latest {} A+ Graded | 100% Verified

Preview 3 out of 21  pages

  • August 20, 2024
  • 21
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Top Academic Resources 2024/2025
  • Top Academic Resources 2024/2025
avatar-seller
oneclass
CEH v10 Memory Check | Questions And Answers Latest {2024- 2025} A+ Graded | 100%
Verified


An IT employee got a call from one of our best customers. The caller wanted to know about the
company's network infrastructure, systems, and team. New opportunities of integration are in sight for
both company and customer. What should this employee do?



A.

Since the company's policy is all about Customer Service, he/she will provide information.

B.

Disregarding the call, the employee should hang up.

C.

The employee should not provide any information without previous management authorization.

D.

The employees can not provide any information; but, anyway, he/she will provide the name of the
person in charge. - C.

The employee should not provide any information without previous management authorization.



Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he configure
properly the firewall to allow access just to servers/ports which can have direct internet access, and
block the access to workstations. Bob also concluded that DMZ really makes sense just when a stateful
firewall is available, which is not the case of TPNQM SA.



In this context, what you can say?



A.

Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations.

B.

Bob is partially right. Actually, DMZ doesn't make sense when a stateless firewall is available.

C.

Bob is partially right. He doesn't need to separate networks if he can create rules by destination IPs, one
by

,one.

D.

Bob can be right, DMZ doesn't make sense combined with stateless firewalls. - A.

Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations.



Bob received this text message on his mobile phone: ""Hello, this is Scott Smelby from the Yahoo Bank.
Kindly contact me for a vital transaction on: scottsmelby@yahoo.com"". Which statement below is true?



A.

This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.

B.

Bob should write to scottsmelby@yahoo.com to verify the identity of Scott.

C.

This is a scam because Bob does not know Scott

D.

This is probably a legitimate message as it comes from a respectable organization. - A.

This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.



You are using NMAP to resolve domain names into IP addresses for ping sweep later.

Which of the following commands looks for IP addresses?



A.

>host -t a hackeddomain.com

B.

>host -t ns hackeddomain.com

C.

>host -t soa hackeddomain.com

D.

>host -t AXFR hackeddomain.com - A.

, >host -t a hackeddomain.com



Why are containers are less secure that virtual machines?



A.

Containers may fullfill disk space of the host.

B.

A compromise container may cause a CPU starvation of the host.

C.

Containers are attached to the same virtual network.

D.

Host OS on containers has a larger surface attack. - B.

A compromise container may cause a CPU starvation of the host.



A bank stores and processes sensitive privacy information related to home loans. However, auditing has
never been enabled on the system. What is the first step that the bank should take before enabling the
audit feature?



A.

Perform a vulnerability scan of the system.

B.

Determine the impact of enabling the audit feature.

C.

Perform a cost/benefit analysis of the audit feature.

D.

Allocate funds for staffing of audit log review. - B.

Determine the impact of enabling the audit feature.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller oneclass. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.48. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73091 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.48
  • (0)
  Add to cart