Quiz-summary
0 of 11 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 11 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- Answered
- Review
-
Question 1 of 11
1. Question
Web organizations assist in a wide array of efforts to improve the internet. What is this web organization, which is defined as a worldwide non-profit charitable organization focused on improving the security of software?
Correct
Open Web Application Security Project’s (OWASP) is a non-profit charitable organization focused on improving the security of software. Its mission is to make software security visible so that individuals and organizations worldwide can make informed decisions about true software security risks. OWASP publishes reports, documents, and training efforts to assist in web security.
Incorrect
Open Web Application Security Project’s (OWASP) is a non-profit charitable organization focused on improving the security of software. Its mission is to make software security visible so that individuals and organizations worldwide can make informed decisions about true software security risks. OWASP publishes reports, documents, and training efforts to assist in web security.
-
Question 2 of 11
2. Question
Web servers provide a majority of the services available on the internet and are therefore prime targets for attack. Which of the following sentences best describes the DNS amplification attack?
Correct
The domain name server (DNS) amplification attack is the method of using publicly accessible open DNS servers to overwhelm a target system with DNS response traffic. Attackers will typically submit a request for as much zone information as possible to maximize the amplification effect.
Incorrect
The domain name server (DNS) amplification attack is the method of using publicly accessible open DNS servers to overwhelm a target system with DNS response traffic. Attackers will typically submit a request for as much zone information as possible to maximize the amplification effect.
-
Question 3 of 11
3. Question
A web application provides an interface between the web server and the client to communicate. Web pages are generated at the server, and browsers present them at the client-side. There are several vulnerabilities in a web application which lead to a web application attack. Which of the following statements defines the XSS attack?
Correct
Cross-site scripting (XSS) attacks are a type of injection in which an attacker takes advantage of the scripting and makes it perform something other than the intended response. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end-user.
Incorrect
Cross-site scripting (XSS) attacks are a type of injection in which an attacker takes advantage of the scripting and makes it perform something other than the intended response. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end-user.
-
Question 4 of 11
4. Question
A trojan is a software that appears to perform a useful function for the user before installing it but instead performs a function without the user’s knowledge, that steals information and harms the system. Which of the following sentences defines the command shell trojan?
Correct
The command shell trojan provides backdoor access to a system that you connect to via command line. An example of a command shell trojan is NETCAT.
Incorrect
The command shell trojan provides backdoor access to a system that you connect to via command line. An example of a command shell trojan is NETCAT.
-
Question 5 of 11
5. Question
A virus is a self-replicating program that reproduces its code by attaching copies into other executable codes. Which of the following descriptions defines a cavity virus?
Correct
A cavity virus attempts to install itself inside of the file it is infecting. This is done using the null content sections of the file and leaves the file’s actual functionality intact.
Incorrect
A cavity virus attempts to install itself inside of the file it is infecting. This is done using the null content sections of the file and leaves the file’s actual functionality intact.
-
Question 6 of 11
6. Question
A worm is a self-replicating malware computer program that uses a computer network to send copies of itself to other systems without human intervention. Which of the following statements best describes a pretty park worm?
Correct
Pretty park worm comes in the form of an email attachment with the name prettypark.exe, files32.exe, or prettyorg.exe. Once the worm program is executed, it tries to email itself automatically every 30 minutes to email addresses registered in your internet address book. It also sends information to IRC every 30 seconds to keep itself connected and to retrieve any commands from the IRC channel.
Incorrect
Pretty park worm comes in the form of an email attachment with the name prettypark.exe, files32.exe, or prettyorg.exe. Once the worm program is executed, it tries to email itself automatically every 30 minutes to email addresses registered in your internet address book. It also sends information to IRC every 30 seconds to keep itself connected and to retrieve any commands from the IRC channel.
-
Question 7 of 11
7. Question
A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic or sending it information that triggers a crash. ECC listed several DoS application-level attacks, one of which is the TCP state-exhaustion attack. Which of the following statements best describes a TCP state-exhaustion attack?
Correct
The TCP state-exhaustion attack attempts to consume the connection state tables which are present in many infrastructure components such as load-balancers, firewalls, and the application servers themselves. Even high capacity devices capable of maintaining state on millions of connections can be taken down by these attacks.
Incorrect
The TCP state-exhaustion attack attempts to consume the connection state tables which are present in many infrastructure components such as load-balancers, firewalls, and the application servers themselves. Even high capacity devices capable of maintaining state on millions of connections can be taken down by these attacks.
-
Question 8 of 11
8. Question
In session hijacking, an attacker waits for a session to begin and, after the authentication gets done, jumps in to steal the session for himself. The server isn’t even aware of what happened, and the client simply connects again in a different session. Which of the following is the third step in session hijacking as listed by ECC?
Correct
Session hijacking steps as listed by ECC:
(1) Sniff the traffic between the client and the server.
(2) Monitor the traffic and predict the sequence numbering.
(3) Desynchronize the session with the client.
(4) Predict the session token and take over the session.
(5) Inject packets to the target server.Incorrect
Session hijacking steps as listed by ECC:
(1) Sniff the traffic between the client and the server.
(2) Monitor the traffic and predict the sequence numbering.
(3) Desynchronize the session with the client.
(4) Predict the session token and take over the session.
(5) Inject packets to the target server. -
Question 9 of 11
9. Question
Asymmetric encryption uses one key to encrypt a message and the other to decrypt it. The encryption key, also known as the public key, could be sent anywhere, to anyone. The decryption key, known as the private key, is kept secure on the system. There are several types of asymmetric algorithms, one of which is the RSA. Which of the following sentences defines RSA?
Correct
RSA uses two large prime numbers for encryption. Factoring these numbers creates key sizes up to 4096 bits. RSA can be used for encryption and digital signatures and is the modern de facto standard.
Incorrect
RSA uses two large prime numbers for encryption. Factoring these numbers creates key sizes up to 4096 bits. RSA can be used for encryption and digital signatures and is the modern de facto standard.
-
Question 10 of 11
10. Question
A phishing attack involves crafting an email that appears legitimate but contains links to fake websites or to download malicious content. There are several types of phishing, one of which is pharming. Which of the following sentences best describes pharming?
Correct
Pharming is a type of phishing attack wherein an attacker uses a malicious code of some sort that redirects a user’s web traffic. It is also known as phishing without a lure.
Incorrect
Pharming is a type of phishing attack wherein an attacker uses a malicious code of some sort that redirects a user’s web traffic. It is also known as phishing without a lure.
-
Question 11 of 11
11. Question
A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. Which of the following statements is true about deep packet inspection firewalls?
Correct
Deep packet inspection (DPI) is an advanced method of examining and managing network traffic. It is a form of packet filtering that locates, identifies, classifies, reroutes, or blocks packets with specific data or code payloads that conventional packet filtering, which examines only packet headers, cannot detect.
Incorrect
Deep packet inspection (DPI) is an advanced method of examining and managing network traffic. It is a form of packet filtering that locates, identifies, classifies, reroutes, or blocks packets with specific data or code payloads that conventional packet filtering, which examines only packet headers, cannot detect.