Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
In the result screen of the OpenVAS, What is the meaning of quality of detection (QoD) displayed on the right of the severity?
Correct
In the right side of the severity button is QoD (Quality of detection). It is called the quality of detection which defines as how particular OpenVAS is about and what is the result of the vulnerability scan, whether it is a true positive.
Incorrect
In the right side of the severity button is QoD (Quality of detection). It is called the quality of detection which defines as how particular OpenVAS is about and what is the result of the vulnerability scan, whether it is a true positive.
-
Question 2 of 10
2. Question
Which of the following tool/program by the developer to be the Swiss Army knife of TCP/IP packets?
Correct
The hacking tool/program hping may be described as the Swiss Army knife of TCP/IP packets by the developer of the hping tool. It can be used as a straight forward ping program, which sends multiple ICMP echo requests. As hping is primarily a packet crafting tool, which allows initiating connections by using different network protocols with the custom header settings, the default mode is not a good option as it may not work well.
Incorrect
The hacking tool/program hping may be described as the Swiss Army knife of TCP/IP packets by the developer of the hping tool. It can be used as a straight forward ping program, which sends multiple ICMP echo requests. As hping is primarily a packet crafting tool, which allows initiating connections by using different network protocols with the custom header settings, the default mode is not a good option as it may not work well.
-
Question 3 of 10
3. Question
By default, if you don’t specify anything other than the target host or IP address, hping will send messages to port 0 on your target with which of the following address?
Correct
By default, The hping program/tool will send messages to port 0 of target system with a varying source address, if nothing is specified other than the target host or IP address. Port address 0 is typically an invalid destination as it is described as reserved and has not any purpose in the vulnerability scan.
Incorrect
By default, The hping program/tool will send messages to port 0 of target system with a varying source address, if nothing is specified other than the target host or IP address. Port address 0 is typically an invalid destination as it is described as reserved and has not any purpose in the vulnerability scan.
-
Question 4 of 10
4. Question
Which of the following provides programmers with the ability to bypass the network stack and receive raw packets?
Correct
Raw sockets provide programmers/developers with the capacity to bypass the whole network stack. When a programmer/developer uses raw sockets, It is expected to manage all the things which the network stack does, it means that all the values in the headers must be set. Raw sockets also give the opportunity to the programmer with total control over what the packet/frame will end up looking like.
Incorrect
Raw sockets provide programmers/developers with the capacity to bypass the whole network stack. When a programmer/developer uses raw sockets, It is expected to manage all the things which the network stack does, it means that all the values in the headers must be set. Raw sockets also give the opportunity to the programmer with total control over what the packet/frame will end up looking like.
-
Question 5 of 10
5. Question
In packETH, which of the following action is recommended to send specify number of packets?
Correct
Once a packet is built it is ready for transmitting. Transmitting more than a single packet, Either Gen-b or Gen-s button will be used. Gen-b gives the ability to send a specific number of packets which are to transmit.
Incorrect
Once a packet is built it is ready for transmitting. Transmitting more than a single packet, Either Gen-b or Gen-s button will be used. Gen-b gives the ability to send a specific number of packets which are to transmit.
-
Question 6 of 10
6. Question
In packETH, which of the following action is recommended to send a single packet?
Correct
Once a packet is built it is ready for transmitting. A single packet is transmitted by clicking the Send button in the toolbar. Transmitting more than a single packet, Either Gen-b or Gen-s button will be used. Gen-b gives the ability to send a specific number of packets which are to transmit.
Incorrect
Once a packet is built it is ready for transmitting. A single packet is transmitted by clicking the Send button in the toolbar. Transmitting more than a single packet, Either Gen-b or Gen-s button will be used. Gen-b gives the ability to send a specific number of packets which are to transmit.
-
Question 7 of 10
7. Question
In packETH, which of the following action is recommended to send a stream of packets?
Correct
Gen-s gives you the ability to generate streams. A stream can be defined as a pattern of packets which must have been store to different files at different locations. Once the pattern is created by nominating the packets which are to be used, and also configure the transmitting pattern by packETH, for example, send them—burst, continuous, or random.
Incorrect
Gen-s gives you the ability to generate streams. A stream can be defined as a pattern of packets which must have been store to different files at different locations. Once the pattern is created by nominating the packets which are to be used, and also configure the transmitting pattern by packETH, for example, send them—burst, continuous, or random.
-
Question 8 of 10
8. Question
Which of the following is a program used to mangle packets before they are sent to a target you specify?
Correct
fragroute is a program/tool which is used to hack packets before transmitting to a specific target. It works by adjusting in the routing tables so all the messages sending to the target are transmitted through the fragroute application first.
Incorrect
fragroute is a program/tool which is used to hack packets before transmitting to a specific target. It works by adjusting in the routing tables so all the messages sending to the target are transmitted through the fragroute application first.
-
Question 9 of 10
9. Question
In order to make fragroute work, a configuration file is to be created. It has directives telling fragroute how to handle packets that pass through the application. What is the meaning of “dup last 30%” written in the configuration file?
Correct
Here the directives to handle the packets is to tell fragroute for doing a number of things to the packets. The meaning of “dup last 30%” written in the configuration file is that there is a 30 per cent chance of duplicating the last packet.
Incorrect
Here the directives to handle the packets is to tell fragroute for doing a number of things to the packets. The meaning of “dup last 30%” written in the configuration file is that there is a 30 per cent chance of duplicating the last packet.
-
Question 10 of 10
10. Question
Use of encryption or obfuscation to disguise what you are doing is which of the following evasion technique?
Correct
Use of encryption or obfuscation is to disguise or hide the one’s activities on system, equipment or infrastructure from the attacker or hacker. Encrypted traffic can’t be investigated/hacked without violating the end-to-end encryption.
Incorrect
Use of encryption or obfuscation is to disguise or hide the one’s activities on system, equipment or infrastructure from the attacker or hacker. Encrypted traffic can’t be investigated/hacked without violating the end-to-end encryption.