EC-Council CEH-001 Certified Ethical Hacker (CEH) Online Training
EC-Council CEH-001 Online Training
The questions for CEH-001 were last updated at Dec 26,2024.
- Exam Code: CEH-001
- Exam Name: Certified Ethical Hacker (CEH)
- Certification Provider: EC-Council
- Latest update: Dec 26,2024
One of the effective DoS/DDoS countermeasures is ‘Throttling’.
Which statement correctly defines this term?
- A . Set up routers that access a server with logic to adjust incoming traffic to levels that will be safe for the server to process
- B . Providers can increase the bandwidth on critical connections to prevent them from going down in the event of an attack
- C . Replicating servers that can provide additional failsafe protection
- D . Load balance each server in a multiple-server architecture
One of the effective DoS/DDoS countermeasures is ‘Throttling’.
Which statement correctly defines this term?
- A . Set up routers that access a server with logic to adjust incoming traffic to levels that will be safe for the server to process
- B . Providers can increase the bandwidth on critical connections to prevent them from going down in the event of an attack
- C . Replicating servers that can provide additional failsafe protection
- D . Load balance each server in a multiple-server architecture
One of the effective DoS/DDoS countermeasures is ‘Throttling’.
Which statement correctly defines this term?
- A . Set up routers that access a server with logic to adjust incoming traffic to levels that will be safe for the server to process
- B . Providers can increase the bandwidth on critical connections to prevent them from going down in the event of an attack
- C . Replicating servers that can provide additional failsafe protection
- D . Load balance each server in a multiple-server architecture
One of the effective DoS/DDoS countermeasures is ‘Throttling’.
Which statement correctly defines this term?
- A . Set up routers that access a server with logic to adjust incoming traffic to levels that will be safe for the server to process
- B . Providers can increase the bandwidth on critical connections to prevent them from going down in the event of an attack
- C . Replicating servers that can provide additional failsafe protection
- D . Load balance each server in a multiple-server architecture
One of the effective DoS/DDoS countermeasures is ‘Throttling’.
Which statement correctly defines this term?
- A . Set up routers that access a server with logic to adjust incoming traffic to levels that will be safe for the server to process
- B . Providers can increase the bandwidth on critical connections to prevent them from going down in the event of an attack
- C . Replicating servers that can provide additional failsafe protection
- D . Load balance each server in a multiple-server architecture
One of the effective DoS/DDoS countermeasures is ‘Throttling’.
Which statement correctly defines this term?
- A . Set up routers that access a server with logic to adjust incoming traffic to levels that will be safe for the server to process
- B . Providers can increase the bandwidth on critical connections to prevent them from going down in the event of an attack
- C . Replicating servers that can provide additional failsafe protection
- D . Load balance each server in a multiple-server architecture
One of the effective DoS/DDoS countermeasures is ‘Throttling’.
Which statement correctly defines this term?
- A . Set up routers that access a server with logic to adjust incoming traffic to levels that will be safe for the server to process
- B . Providers can increase the bandwidth on critical connections to prevent them from going down in the event of an attack
- C . Replicating servers that can provide additional failsafe protection
- D . Load balance each server in a multiple-server architecture
Testing security periodically.
In which step would you engage a forensic investigator?
- A . 1
- B . 2
- C . 3
- D . 4
- E . 5
- F . 6
Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?
- A . Configure Port Security on the switch
- B . Configure Port Recon on the switch
- C . Configure Switch Mapping
- D . Configure Multiple Recognition on the switch
How does traceroute map the route a packet travels from point A to point B?
- A . Uses a TCP timestamp packet that will elicit a time exceeded in transit message
- B . Manipulates the value of the time to live (TTL) within packet to elicit a time exceeded in transit message
- C . Uses a protocol that will be rejected by gateways on its way to the destination
- D . Manipulates the flags within packets to force gateways into generating error messages