Advanced CEH Certified Ethical Hacker Practice Exams providing in-depth questions, realistic scenarios, and complete preparation support for mastering essential cybersecurity skills and passing certification. 1. Examine the Wireshark TCP flow capture here: Which of the following represents the next appropriate acknowledgement from Host A? A. Sequence Number 701, Acknowledgement Number 3986. B. Sequence Number 701, Acknowledgement Number 2664. C. Sequence Number 2664, Acknowledgement Number 2023. D. Sequence Number 2664, Acknowledgement Number 701.2. You have established a netcat connection to a target machine. Which flagcan be used to launch a program? A. -p B. -a C. -l D. -e 3. Which virus type will rewrite itself after each new infection? A. Multipartite B. Metamorphic C. Cavity D. Macro 4. A pen test colleague is carrying out attacks. In one attack, she attempts toguess the ISN for a TCP session. Which attack is she most likely carrying out? A. XSS B. Session splicing C. Session hijacking D. Multipartite attack 5. Malware takes many forms and is activated on a machine in a variety ofways. Which of the following malware types does not require user intervention to spread? A. Trojan B. Virus C. Worm D. Polymorphic 6. An attacker is attempting a DoS