Ebook Download CEH Certified Ethical Hacker Practice Exams, 5th Edition Matt Walker - Ebook PDF All Chapter
Ebook Download CEH Certified Ethical Hacker Practice Exams, 5th Edition Matt Walker - Ebook PDF All Chapter
Ebook Download CEH Certified Ethical Hacker Practice Exams, 5th Edition Matt Walker - Ebook PDF All Chapter
http://ebooksecure.com/product/ceh-certified-ethical-hacker-all-
in-one-exam-guide-4th-edition-ebook-pdf/
http://ebooksecure.com/product/ebook-pdf-physics-5th-edition-by-
james-s-walker/
https://ebooksecure.com/download/cissp-practice-exams-fourth-
edition-ebook-pdf/
http://ebooksecure.com/product/ebook-pdf-housekeeping-
management-2nd-edition-by-matt-a-casado/
(eBook PDF) Legal and Ethical Issues for Health
Professionals 5th Edition
http://ebooksecure.com/product/ebook-pdf-legal-and-ethical-
issues-for-health-professionals-5th-edition/
http://ebooksecure.com/product/ebook-pdf-legal-and-ethical-
aspects-of-health-information-management-5th-edition/
http://ebooksecure.com/product/ebook-pdf-rules-for-writers-9th-
edition-by-diana-hacker/
http://ebooksecure.com/product/ebook-pdf-the-bedford-
handbook-10th-edition-by-diana-hacker/
http://ebooksecure.com/product/ebook-pdf-hacker-techniques-tools-
and-incident-handling-3rd-edition/
CEH
™
Matt Walker is currently working multiple contracts in cyber security and network management.
An IT security and education professional for more than 20 years, he has served as the director of
the Network Training Center and a curriculum lead/senior instructor for Cisco Networking Acad-
emy on Ramstein AB, Germany, and as a network engineer for NASA’s Secure Network Systems
(NSS), designing and maintaining secured data, voice, and video networking for the agency. Matt
also worked as an instructor supervisor and senior instructor at Dynetics, Inc., in Huntsville, Ala-
bama, providing on-site certification-awarding classes for (ISC)2, Cisco, and CompTIA, and after
two years came right back to NASA as an IT security manager for UNITeS, SAIC, at Marshall
Space Flight Center. He has written and contributed to numerous technical training books for
NASA, Air Education and Training Command, and the U.S. Air Force, as well as commercially,
and he continues to train and write certification and college-level IT and IA security courses.
Matt Walker
McGraw Hill is an independent entity from the International Council of E-Commerce Consultants® (EC-Council) and is not
affiliated with EC-Council in any manner. This study/training guide and/or material is not sponsored by, endorsed by, or affili-
ated with EC-Council in any manner. This publication and accompanying media may be used in assisting students to prepare
for the Certified Ethical Hacker (CEH™) exam. Neither EC-Council nor McGraw Hill warrants that use of this publication and
accompanying media will ensure passing any exam. CEH is a trademark or registered trademark of EC-Council in the United
States and certain other countries. All other trademarks are trademarks of their respective owners.
Copyright © 2022 by McGraw Hill. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no
part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system,
without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and
executed in a computer system, but they may not be reproduced for publication.
ISBN: 978-1-26-426997-6
MHID: 1-26-426997-8
The material in this eBook also appears in the print version of this title: ISBN: 978-1-26-426996-9,
MHID: 1-26-426996-X.
All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trade-
marked name, we use names in an editorial fashion only, and to the benet of the trademark owner, with no intention of infringe-
ment of the trademark. Where such designations appear in this book, they have been printed with initial caps.
McGraw-Hill Education eBooks are available at special quantity discounts to use as premiums and sales promotions or for use in
corporate training programs. To contact a representative, please visit the Contact Us page at www.mhprofessional.com.
TERMS OF USE
This is a copyrighted work and McGraw-Hill Education and its licensors reserve all rights in and to the work. Use of this work
is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and retrieve one copy of the
work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works based upon, transmit,
distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hill Education’s prior consent. You
may use the work for your own noncommercial and personal use; any other use of the work is strictly prohibited. Your right to
use the work may be terminated if you fail to comply with these terms.
THE WORK IS PROVIDED “AS IS.” McGRAW-HILL EDUCATION AND ITS LICENSORS MAKE NO GUARANTEES
OR WARRANTIES AS TO THE ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS TO BE OBTAINED
FROM USING THE WORK, INCLUDING ANY INFORMATION THAT CAN BE ACCESSED THROUGH THE WORK VIA
HYPERLINK OR OTHERWISE, AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR IMPLIED, INCLUD-
ING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE. McGraw-Hill Education and its licensors do not warrant or guarantee that the functions contained in the work will
meet your requirements or that its operation will be uninterrupted or error free. Neither McGraw-Hill Education nor its licensors
shall be liable to you or anyone else for any inaccuracy, error or omission, regardless of cause, in the work or for any damages
resulting therefrom. McGraw-Hill Education has no responsibility for the content of any information accessed through the work.
Under no circumstances shall McGraw-Hill Education and/or its licensors be liable for any indirect, incidental, special, punitive,
consequential or similar damages that result from the use of or inability to use the work, even if any of them has been advised of
the possibility of such damages. This limitation of liability shall apply to any claim or cause whatsoever whether such claim or
cause arises in contract, tort or otherwise.
I dedicate this book to my father, Ronald Walker (1947–2008).
He was the best man I’ve ever met, and second place isn’t even close.
I miss you, Dad.
—Matthew Walker
This page intentionally left blank
CONTENTS AT A GLANCE
Chapter 12 Low Tech: Social Engineering and Physical Security .............. 279
vii
This page intentionally left blank
CONTENTS
Acknowledgments ................................................... xi
Introduction ........................................................ xiii
ix
Chapter 8 Mobile Communications and the IoT ........................... 187
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Quick Answer Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Chapter 12 Low Tech: Social Engineering and Physical Security .............. 279
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Quick Answer Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Contents
x
ACKNOWLEDGMENTS
I, like most of you, used to hardly ever read the acknowledgments portion of a book. When I
bought a book, I just wanted to get to the meat of the thing and see what I could drag out of
it—either intellectually or entertainment-wise—and couldn’t give a care about what the author
thought about those who helped put it all together. Then, of all things, I wrote a book.
Now, I read the acknowledgments section of every book I purchase. Why? Because having gone
through the trials and tribulations of writing, editing, arguing, planning, researching, rewriting,
screaming at a monitor, and restarting the whole thing all over again, I understand why it’s so
important. I know what it means when the writer says they “couldn’t have done it without fill-
in-the-blank.” Trust me, if it’s written there, then the author truly means they couldn’t have done
it without them. My fill-in-the-blanks deserve more than just a mention in an acknowledgments
section, though, because they really did make it all possible, and I most assuredly couldn’t have
done it without them.
My undying gratitude and heartfelt thanks go out to the entire team at McGraw Hill. Tim
Green originally roped me into this several years back, and without him I would have never even
thought of it. Caitlin Cromley-Linn and Lisa McClain provided the firm guidance that every
author needs to finish a product like this (okay, maybe not every author, but I sure needed it),
displayed the patience of Job, and had a great sense of humor during the whole ordeal. They
both deserve a vacation somewhere warm and beachy—I’ll get the first round of cold adult
beverages. Once again, thanks to everyone at McGraw Hill for providing me with the chance to
do something I dearly love, and for your patience with me in putting this all together.
Lastly, I can’t thank the technical editor, Brad Horton, enough. Brad makes a difficult
process—technically scrubbing everything to make sure it’s all in good order—not only bearable
but downright fun. His edits were spot on and were always designed to make this project the
absolute best it could be. He not only pointed out corrections when I messed something up but
added immeasurably to the real-world aspects of this book. I simply could not, would not, have
done this without him. It’s an honor to work with him and a great blessing in my life to call him
a friend.
xi
This page intentionally left blank
INTRODUCTION
Hello and welcome to the practice exams for Certified Ethical Hacker (CEH), now in
version 11. If you’re the proud owner of previous editions of this book or its companion book,
CEH™ Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, welcome back! If not and
you’re just picking this book up for the first time to see whether it’s for you, settle in for a moment
and let’s cover a few really important items.
Some of you may be curious about what a “hacking” study guide looks like, or you may be
thinking about attempting a new certification or career choice. Some of you may have already
taken that decisive leap and started down the path, and are now looking for the next resource to
help you along the journey. And some of you reading this may even be simply looking for some
credentials for your career—most in this group are true professionals who already know how to do
this job and are just finally ready to get the certification knocked out, while a small few are simply
looking for a résumé bullet (one more certification you can put on your e-mail signature line to
impress others).
Regardless of where you stand in your career or your desire for this certification, there are a
couple of things I need to clear the air about before you commit to purchasing and reading this
book. First (before I get to the bad stuff ), I firmly believe this book will assist you in attaining your
CEH certification. The entire team involved in this effort has spent a lot of time, energy, thought,
research, and bourbon on producing what we think is the best companion resource guide on the
market. I’m proud of it and proud to have been associated with the professionals who helped put
it together.
That said, if you’re looking for a silver bullet—a virtual copy of the exam so you can simply
memorize, go take the test, and forget about it—please stop reading now and go take your chances
elsewhere. Part of the ethics of attaining, and maintaining, a CEH credential is the nondisclosure
agreement all candidates sign before attempting the exam. I, and everyone else involved in this
project, have taken great pains to provide you with examples of questions designed to test your
knowledge of the subject at hand, not to provide you with questions to memorize. Those who
are looking for that, and use that method to attain the certification, belittle and cheapen the hard
work the community puts into this, and I would be sickened to know of anyone using this work
for that purpose.
If you want to pass this exam and have the respect and benefits that come along with holding
the certification, you better know how to do the job. The memorization/test-taking junkies out
there may get an interview or two with this certification on their résumé, but trust me, they’ll
be discovered as frauds before they ever get to round 2. This community knows the difference
between a contender and a pretender, so don’t try to take shortcuts. Learn the material. Become
an expert in it. Then go take the exam. If you’re not willing to put in the effort, maybe you should
pick up another line of work—like professional dodge ball player or pharmaceutical test subject.
To quote a really bad but totally awesome 1980s movie, “There’s always barber college.”
xiii
With all that out of the way—and now that I’m talking to the real candidates for this
certification—once again I firmly believe this book will help you in your attempt to attain the
certification. As always, however, I must provide a word of caution: relying on a single book—any
single book—to pass this exam is a recipe for disaster. Yes, this is a great resource, and you should
definitely buy it (right now—don’t wait!). However, you simply will not pass this exam without the
time and benefit that can come only from experience. As a matter of fact, EC-Council requires
candidates sitting for the exam to have at least two years of IT security–related experience. Bolster
your study in this book with practice, practice, and more practice. You’ll thank me for it later.
Lastly, keep in mind this certification isn’t a walk in the park. CEH didn’t gain the reputation
and value it has by being easy to attain. Its worth has elevated it as one of the top certifications
a technician can attain and is now part of DoD 8570’s call for certification on DoD networks.
In short, this certification actually means something to employers because they know the effort it
takes to attain it.
The exam itself is a four-hour, 125-question grueling marathon that will leave you exhausted
when you click the Finish button. EC-Council offers a handbook (as of this writing, located at
https://cert.eccouncil.org/images/doc/CEH-Handbook-v5.pdf ) that provides all you’ll need to
know about qualifications, content, and other information about the exam and certification. I’ve
included some highlights in the following sections, detailing the exam and what you’ll need.
• MasterClass Live Online This is a “live, online, instructor-led training course, which
means you can attend a course with a live instructor from anywhere with an internet
connection.” Also, per the site: “Our Virtual Classroom training combines our live,
virtual cyber range, real-world instructors, content, exercises and peer collaboration to
give you the best chance at certification and the biggest return on your investment.”
• MasterClass In Person This is exactly what it sounds like: a class provided by an
affiliate in cities throughout North America. The site describes this training option
as follows: “Instructor-led training in your own town is offered to provide you world
class instruction conveniently located in your backyard, and since the course is live,
you will collaborate with your peers and gain real-world skills while receiving in-person
instruction and interaction.”
• Self-Paced Directly from the site, this solution is “an asynchronous, self-study
environment which delivers EC-Council’s sought after IT Security training courses,
such as CEH, in a streaming video format. All lectures are delivered by a professional
practitioner to assure a real-world perspective on the course concepts…and provides
the benefits of classroom training at your own pace.” This also comes with the official
courseware via Aspen as well as six months of access to iLabs (EC-Council’s virtual lab
platform).
Introduction
xiv
• Certification Club For one U.S. dollar short of $3,000, you can join the iClass
Club, where you’ll “receive one full certification course as well as unlimited EC-Council
certification courses for only $499 during the subscription year and you decide whether
to train in either live online or self-paced online format, or even mix and match.”
In short, you’ll have access to a wide range of videos and training materials from
EC-Council, and can mix and match whatever training methods over however long
a timeframe you wish.
• Textbook Learning (self-study) If you want to study on your own and don’t care
about the class at all (that is, you’ve been doing this for a while and don’t see the value
of going to a class to have someone teach you what you already know), you can simply
buy the courseware (for $877 as of this writing) and study on your own. There are all the
necessary hoops and hurdles to step through to qualify for the exam, but EC-Council is
certainly happy to sell you their official curriculum and let you take your own chances.
The Examination
For this version, EC-Council retains the exam scoring methods and mechanisms (https://www
.eccouncil.org/programs/certified-ethical-hacker-ceh/) from the last version. The content itself
hasn’t changed much, other than new content we’ve covered in this book; however, the method to
tabulate whether or not you pass the exam definitely has.
The exam is a four-hour, computer-based proctored test (in other words, it’s taken in person
at an authorized testing facility) that allows you to skip and mark questions to revisit at the end
of each section. FAQs regarding the exam itself are updated continually and are located at https://
cert.eccouncil.org/faq.html. Your exam score is tabulated immediately after completion, so be
sure to review everything before clicking Finish. Unlike previous versions, however, there is no
cut-and-dry number of questions you need to get right and no score you need to attain. Whereas
in versions previous you needed to answer 70 percent of the questions correctly, you now need to
attain the appropriate “cut score” for your particular test bank. I know, I know—you’re wondering
what that means. I did, too, so I read up on it for you (you’re welcome).
CEH is provided to candidates as a series of multiple-test blocks of questions—in other words,
a candidate sitting on the left side of the room might get questions from block 1, while someone
on the right side might get questions from block 2 (or block 3, block 4, and so on). EC-Council
refers to these question banks as “forms” and has calculated a passing score based on the difficulty
rating of each block. Should you sit down and randomly get assigned an easy form, you’ll have
to score upward of 85 percent to pass; a hard one, and you’ll only need 60 percent. See? Isn’t that
fun and easy?
Lastly, I found this little nugget of information very enlightening and wanted to include it here
both to inform you and to validate something I’ve been saying for years now (in previous versions
of these books, as well as in this one): EC-Council openly admits their exam content and creation
are performed separately from course and curriculum content creation. This means the people
creating the test questions don’t necessarily use the official course curriculum. In other words, you
can and will see questions on your exam that aren’t even mentioned in the courseware or in your
classroom—or, dare I say, in the study material you’re looking at here.
Introduction
xv
To some of us, myself included, this seems odd. I mean, if you require folks to purchase
your courseware and/or sit for your specific training classes, you’d assume those would be the
key study materials for success on the exam—designed supposedly to validate your knowledge
and skills from aforementioned curriculum and training. EC-Council states it this way, however:
“All learning materials related to exams including EC-Council official courseware and trainings
are developed independently of exam content. This is because the exams are created to assess
competence when using the skills and knowledge, not the effectiveness of a specific courseware
or training.”
I include this here not to scare you off or to give you the impression that the courseware,
classrooms, or study guides aren’t valid, but to remind you, as I’ve said seemingly a billion times
now, not to rely on one source for your study. Build a lab. Practice. Get together with like-minded
folks and talk out issues you find in practicing with tools or taking practice exams. Trust me, you’ll
be better off for it.
Best of luck to you, dear reader. I sincerely hope your exam goes well for you and that your
career is filled with great experiences. Be honest, do a good job, and make every day and action
work toward a better world.
In This Book
I’ve organized this book so that each chapter consists of a battery of practice exam questions rep-
resenting part of the knowledge and skills you need to know to pass the Certified Ethical Hacker
exam. This book was designed to mirror the organization of CEH Certified Ethical Hacker All-in-
One Exam Guide, Fifth Edition, and it serves as an excellent companion.
Introduction
xvi
Tools, Sites, and References Disclaimer
All URLs listed in this book were current and live at the time of writing. McGraw Hill makes
no warranty as to the availability of these World Wide Web or Internet pages. McGraw Hill
has not reviewed or approved the accuracy of the contents of these pages and specifically
disclaims any warranties of merchantability or fitness for a particular purpose.
Introduction
xvii
This page intentionally left blank
Getting Started:
Essential Knowledge
CHAPTER
1
This chapter includes questions from the following topics:
• Identify components of TCP/IP computer networking
• Understand basic elements of information security
• Understand incident management steps
• Identify fundamentals of security policies
• Identify essential terminology associated with ethical hacking
• Define ethical hacker and classifications of hackers
• Describe the five stages of ethical hacking
• Define the types of system attacks
• Identify laws, acts, and standards affecting IT security
• Identify Cyber Kill Chain methodology terms
In one of my earliest memories, I’m sitting at the table on Thanksgiving, staring lovingly at a hot
apple pie being sliced into pieces and doled out onto plates. I remember watching an ice cream
bowl chase the pie slices around the table, and each person scooping out delicious vanilla goodness
for the top of their pie. And I remember looking at that flaky crust and the sugary, syrupy insides
and thinking how great it was going to be when I got mine. But then I remember my mom look-
ing right at me and saying, “Looks good, doesn’t it? All you’ve got to do is finish your vegetables
and you can have some.”
I dearly love apple pie à la mode. It’s my favorite dessert on the planet—my ambrosia, if you
will. I love it so much that aggressively displacing toddlers out of my way to get to dessert nirvana
isn’t out of the question (okay, maybe just sternly threatening them, but you get the idea). But I
absolutely despised most of the veggies I was forced to eat as a kid. Greens, peas, carrots, asparagus?
Might as well have been kryptonite for Superman. Mom, why not just ask me to stab my eyes out
with a fork—or, worse yet, ask me to wear Auburn colors?
But when push came to shove, I ate the vegetables. Not because I liked them or because I
wanted to, but because I had to in order to get what I really wanted.
1
Welcome to your veggie plate, dear reader. No, it’s not the exciting dessert you’re drooling
over—all those delicious hacking questions come later—but this is stuff you just have to get out
of the way first. The good news with this part of your exam is that this is the easy stuff. It’s almost
pure memorization and definitions—with no wacky formulas or script nuances to figure out. And
don’t worry, it’s not nearly as bad as you think it’s going to be. At least I’m not making you put
on blue and orange.
STUDY TIPS When it comes to studying this chapter, where mostly definitions
and rote memorization are all that is required for the exam, repetition is the
key. Tables with words on one side and corresponding definitions on the
other can be pretty effective—and don’t discount old-school flash cards
either. When studying, try to find some key words in each definition you can associate
with the term. That way, when you’re looking at a weird test question on the exam, a key
word will pop out and help provide the answer for you. And for goodness sake, please try
not to confuse the real world with the exam—trust what you get out of this book and your
other study material, and don’t read too much into the questions.
Some of the most confusing questions for you in this section will probably come from
security policies, laws and standards, and security control mechanisms. All these questions
can get really weird, and I’d love to offer help with them, but I can’t—you just have to
memorize the data. Especially when it comes to laws and standards questions, they will
sometimes be maddening. My best advice is to concentrate on key words and remember
that the process of elimination can sometimes be more helpful in narrowing the options
down to the correct answer than trying to memorize everything in the first place.
Also, and at the risk of generating derision from the “Thank you, Captain Obvious”
crowd, here’s another piece of advice I have for you: spend your time on the things you
don’t already know (trust me, I’m on to something here). Many exam prospects and
students spend way too much valuable time repeating portions they already know
instead of concentrating on the things they don’t. If you understand the definitions
regarding white hat and black hat, don’t bother reviewing them. Instead, spend your
time concentrating on areas that aren’t so “common sense” to you.
And, finally, keep in mind that this certification is provided by an international organization.
Therefore, you will sometimes see some fairly atrocious grammar on test questions here
and there, especially in this section of the exam. Don’t worry about it—just keep focused
on the main point of the question and look for your key words.
1. A security team is implementing various security controls across the organization. After
considering several configurations and applications, a final agreed-on set of security
controls is put into place; however, not all risks are mitigated by the controls. Of the
following, which is the next best step?
Q
A. Continue applying controls until all risk is eliminated.
B. Ignore any remaining risk as “best effort controlled.”
C. Ensure that any remaining risk is residual or low and accept the risk.
D. Remove all controls.
2. A Certified Ethical Hacker (CEH) follows a specific methodology for testing a system.
Which step comes after footprinting in the CEH methodology?
A. Scanning
B. Enumeration
C. Reconnaissance
D. Application attack
3. Your organization is planning for the future and is identifying the systems and processes
critical for their continued operation. Which of the following best describes this effort?
A. BCP
B. BIA
C. DRP
D. ALE
4. Which incident response (IR) phase is responsible for setting rules, identifying the
workforce and roles, and creating backup and test plans for the organization?
A. Preparation
B. Identification
C. Containment
D. Recovery
5. You’ve been hired as part of a pen test team. During the brief, you learn the client wants
the pen test attack to simulate a normal user who finds ways to elevate privileges and
create attacks. Which test type does the client want?
A. White box
B. Gray box
C. Black box
D. Hybrid
1. C 10. A 19. D
2. A 11. B 20. C
3. B 12. B 21. A
4. A 13. C 22. D
5. B 14. B 23. A
6. A 15. C 24. B, D
7. C 16. B 25. B
8. D 17. D
9. A 18. A
1. A security team is implementing various security controls across the organization. After
considering several configurations and applications, a final agreed-on set of security
controls is put into place; however, not all risks are mitigated by the controls. Of the
following, which is the next best step?
A
A. Continue applying controls until all risk is eliminated.
B. Ignore any remaining risk as “best effort controlled.”
C. Ensure that any remaining risk is residual or low and accept the risk.
D. Remove all controls.
☑ C. Remember at the beginning of this chapter when I said the process of elimination
may be your best bet in some cases? Well, even if you aren’t well-versed in risk
management and security control efforts, you could narrow this down to the correct
answer. It is impossible to remove all risk from any system and still have it usable. I’m
certain there are exceptions to this rule (maybe super-secret machines in underground
vaults buried deep within the earth, running on geothermal-powered batteries,
without any network access at all and controlled by a single operator who hasn’t seen
daylight in many years), but in general the goal of security teams has always been to
reduce risk to an acceptable level.
☐
✗ A is incorrect because, as I just mentioned, it’s impossible to reduce risk to absolute
zero and still have a functional system. CEH Certified Ethical Hacker All-in-One Exam
Guide, Fifth Edition, discusses the Security, Functionality, and Usability triangle,
where as you move toward more security, you move further away from functionality
and usability.
☐
✗ B is incorrect because it’s just silly. If you’re a security professional and your
response to a risk—any risk—is to ignore it, I can promise you won’t be employed
for long. Sure, you can point out that it’s low or residual and that the chance for
actual exploitation is next to nonexistent, but you can’t ignore it. Best effort is for
kindergarten trophies and IP packet delivery.
☐
✗ D is incorrect because removing all controls is worse than ignoring the risk. If you
remove everything, then all risks remain. Remember, the objective is to balance your
security controls to cover as much risk as possible while leaving the system as usable
and functional as possible.
2. A Certified Ethical Hacker (CEH) follows a specific methodology for testing a system.
Which step comes after footprinting in the CEH methodology?
A. Scanning
B. Enumeration
C. Reconnaissance
D. Application attack