I don’t think it’s D, that’s more about malware control. C is the one tied to strong access controls since assigning unique IDs is all about tracking who can get into systems. Saw similar wording in practice, B is tempting but that’s encryption, not access control. Let me know if you see it another way.
What is Eve trying to do?Pretty sure C is what they want, since wget pulls the HTML and you can pipe it to grep for filtering links. This is similar to examples shown in the official course labs. Maybe double-check with a practice test if uncertain.
ls -d), that's how you'd trigger an AXFR zone transfer in nslookup after connecting to the DNS server. A looks like a distractor. Pretty sure B is what CEH wants here.Leaning B since it's close to actual ls -d, but D looks tempting if you think they're after something zone specific. These CEH questions can be tricky with typos.
server 192.168.10.2? That would matter here.Seen this trick before, it's definitely False. MX priority works where lower numbers are tried first, not higher. Unless they're using some non-standard config but I doubt it here. Anyone think differently?
Isn’t the trap here that higher MX numbers are actually lower priority? I see why some would pick True, but DNS goes for the lowest number first. Feels like they’re testing if you know MX preference values work opposite to what you’d expect.
Nice and clear wording on this one. False
Yeah this is definitely false. With MX records, the lower the number, the higher the priority. So if the number increases, it's actually less preferred. Unless I'm missing something, standard DNS always works that way. Agree?
Option A makes more sense here. IoTSeeker is built to scan for IoT devices using default credentials, which matches what the scenario describes. C is more about device management, not actively finding vulnerable endpoints. Pretty sure on this one but let me know if I missed something.
A . Don't think C is right here, AT&T IoT Platform is more for device management not scanning for default creds. The scenario calls out automated discovery and credential checking, which lines up exactly with what IoTSeeker does. Easy to get tripped up by the big vendor names, but in this context A makes the most sense.
Had something like this in a mock, pretty sure it's C. SYN/FIN using IP fragments splits the TCP header so standard packet filters can't see the flags or port right away. Open to corrections if anyone's seen otherwise.