Exam Name: | Certified Professional Ethical Hacker (CPEH) | ||
Exam Code: | CPEH-001 Dumps | ||
Vendor: | GAQM | Certification: | Information Systems Security |
Questions: | 736 Q&A's | Shared By: | arnie |
You have successfully gained access to your client's internal network and successfully comprised a Linux server which is part of the internal IP network. You want to know which Microsoft Windows workstations have file sharing enabled.
Which port would you see listening on these Windows machines in the network?
A hacker has successfully infected an internet-facing server which he will then use to send junk mail, take part in coordinated attacks, or host junk email content.
Which sort of trojan infects this server?
It is a short-range wireless communication technology intended to replace the cables connecting portable of fixed devices while maintaining high levels of security. It allows mobile phones, computers and other devices to connect and communicate using a short-range wireless connection.
Which of the following terms best matches the definition?
The purpose of a __________ is to deny network access to local area networks and other information assets by unauthorized wireless devices.