Hundreds of accurate practice questionsfully updated for the current version of the CEH examThoroughly revised for CEH v11 exam objectives, this self-study guide contains more than 350 practice questions to prepare candidates for the EC-Council's Certified Ethical Hacker exam. All questions match the actual exam in content, format, and feel. To aid in understanding the material, in-depth explanations of both the correct and incorrect answers are provided for every question. A valuable pre-assessment test evaluates readiness and identifies areas requiring further study.
CEH Certified Ethical Hacker Practice Exams, Fifth Edition offers practice test items from each domain of the latest edition of the examincluding knowledge, performance, and scenario-based questions. The book features up-to-date coverage of all phases of ethical hacking, including reconnaissance, gaining access, enumeration, maintaining access, and covering tracks. Designed to help readers pass the exam with ease, this is the perfect companion to the
All-in-One Exam Guide.
- Contains more than 350 realistic questions with detailed answer explanations
- Online content includes access to the TotalTester customizable practice exam engine with an additional 300 practice questions
- Written by an experienced trainer with more than 30 years of cybersecurity experience
Acknowledgments |
|
xi | |
Introduction |
|
xiii | |
|
Chapter 1 Getting Started: Essential Knowledge |
|
|
1 | (28) |
|
|
3 | (5) |
|
|
8 | (1) |
|
|
9 | (20) |
|
Chapter 2 Reconnaissance: Information Gathering for the Ethical Hacker |
|
|
29 | (28) |
|
|
31 | (7) |
|
|
38 | (1) |
|
|
39 | (18) |
|
Chapter 3 Scanning and Enumeration |
|
|
57 | (28) |
|
|
59 | (7) |
|
|
66 | (1) |
|
|
67 | (18) |
|
Chapter 4 Sniffing and Evasion |
|
|
85 | (26) |
|
|
87 | (6) |
|
|
93 | (1) |
|
|
94 | (17) |
|
Chapter 5 Attacking a System |
|
|
111 | (26) |
|
|
113 | (7) |
|
|
120 | (1) |
|
|
121 | (16) |
|
Chapter 6 Web-Based Hacking: Servers and Applications |
|
|
137 | (28) |
|
|
139 | (6) |
|
|
145 | (1) |
|
|
146 | (19) |
|
Chapter 7 Wireless Network Hacking |
|
|
165 | (22) |
|
|
167 | (5) |
|
|
172 | (1) |
|
|
173 | (14) |
|
Chapter 8 Mobile Communications and the IoT |
|
|
187 | (20) |
|
|
190 | (4) |
|
|
194 | (1) |
|
|
195 | (12) |
|
Chapter 9 Security in Cloud Computing |
|
|
207 | (20) |
|
|
209 | (4) |
|
|
213 | (1) |
|
|
214 | (13) |
|
Chapter 10 Trojans and Other Attacks |
|
|
227 | (26) |
|
|
229 | (6) |
|
|
235 | (1) |
|
|
236 | (17) |
|
Chapter 11 Cryptography 101 |
|
|
253 | (26) |
|
|
255 | (6) |
|
|
261 | (1) |
|
|
262 | (17) |
|
Chapter 12 Low Tech: Social Engineering and Physical Security |
|
|
279 | (26) |
|
|
281 | (6) |
|
|
287 | (1) |
|
|
288 | (17) |
|
Chapter 13 The Pen Test: Putting It All Together |
|
|
305 | (26) |
|
|
307 | (5) |
|
|
312 | (1) |
|
|
313 | (18) |
Appendix: About the Online Content |
|
331 | (1) |
System Requirements |
|
331 | (1) |
Your Total Seminars Training Hub Account |
|
331 | (1) |
Single User License Terms and Conditions |
|
331 | (2) |
Total Tester Online |
|
333 | (1) |
Technical Support |
|
333 | |
Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently including the IT Security Manager positions at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract).