Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. There are two different types of IDS: host-based IDS and network IDS. Which of the following sentences is true about network IDS?
Correct
Network-based intrusion detection systems (NIDS) are devices that analyze incoming network traffic. NIDS can be hardware or software-based systems and, depending on the manufacturer of the system, can attach to various network mediums such as Ethernet and FDDI.
Incorrect
Network-based intrusion detection systems (NIDS) are devices that analyze incoming network traffic. NIDS can be hardware or software-based systems and, depending on the manufacturer of the system, can attach to various network mediums such as Ethernet and FDDI.
-
Question 2 of 10
2. Question
Implementing security solutions requires understanding where your resources are, like your information assets, technology assets, and human assets. A defense-in-depth approach is a layered approach to security design and architecture. Which of the following statements is not true about defense in depth?
Correct
Defense in depth originates from a military strategy by the same name, which uses multiple defensive measures in case a security control fails or a vulnerability is exploited. If one line of defense is compromised, additional layers of defense are in place to ensure that threats don’t slip through the cracks. This method is based on controls that are designed to protect the physical, technical and administrative aspects of your network.
Incorrect
Defense in depth originates from a military strategy by the same name, which uses multiple defensive measures in case a security control fails or a vulnerability is exploited. If one line of defense is compromised, additional layers of defense are in place to ensure that threats don’t slip through the cracks. This method is based on controls that are designed to protect the physical, technical and administrative aspects of your network.
-
Question 3 of 10
3. Question
Several organizations govern the internet when it comes to domains and addresses. One of these organizations is the Internet Corporation for Assigned Names and Numbers (ICANN). Which of the following statements defines ICANN?
Correct
The Internet Corporation for Assigned Names and Numbers (ICANN) is a non-profit public benefit corporation established in the U.S in 1998 that develops policy on unique identifiers and coordinates the internet’s naming, addressing, protocol systems, and accredits domain name registrars. In other words, the ICANN is the overseeing body for the domain names on the internet
Incorrect
The Internet Corporation for Assigned Names and Numbers (ICANN) is a non-profit public benefit corporation established in the U.S in 1998 that develops policy on unique identifiers and coordinates the internet’s naming, addressing, protocol systems, and accredits domain name registrars. In other words, the ICANN is the overseeing body for the domain names on the internet
-
Question 4 of 10
4. Question
A regional internet registry (RIR) is an organization that manages and controls internet addresses in a specific region, usually a country and sometimes an entire continent. There are five types of RIR based in different geographic regions. Which of the following is not included in the five types of RIR?
Correct
The five types of RIR and the geographical areas they are responsible for include the following:
(1) African Network Information Center (AfriNIC) Africa
(2) American Registry for Internet Numbers (ARIN) North America (the US and Canada) as well as Antarctica and parts of the Caribbean
(3) Asia Pacific Network Information Centre (APNIC) Asia, Australia, New Zealand, and neighboring countries
(4) Latin America and Caribbean Network Information Centre (LACNIC) Latin America and parts of the Caribbean
(5) Réseaux IP Européens Network Coordination Centre (RIPE NCC) Europe, Russia, West Asia, and Central AsiaIncorrect
The five types of RIR and the geographical areas they are responsible for include the following:
(1) African Network Information Center (AfriNIC) Africa
(2) American Registry for Internet Numbers (ARIN) North America (the US and Canada) as well as Antarctica and parts of the Caribbean
(3) Asia Pacific Network Information Centre (APNIC) Asia, Australia, New Zealand, and neighboring countries
(4) Latin America and Caribbean Network Information Centre (LACNIC) Latin America and parts of the Caribbean
(5) Réseaux IP Européens Network Coordination Centre (RIPE NCC) Europe, Russia, West Asia, and Central Asia -
Question 5 of 10
5. Question
In the domain name system (DNS), a name lookup is the process of a resolver sending a request to a name server. The resolver sends the hostname of a TCP/IP host on the internetwork, and the name server returns the host’s IP address. Nslookup is an effective tool that can be used to perform the name lookups. Which of the following sentences best describes the nslookup?
Correct
In nslookup, you can issue many requests without having to keep running the program. When you run nslookup without any parameters, you will be placed into an nslookup shell, where you are interacting with the program, issuing requests.
Incorrect
In nslookup, you can issue many requests without having to keep running the program. When you run nslookup without any parameters, you will be placed into an nslookup shell, where you are interacting with the program, issuing requests.
-
Question 6 of 10
6. Question
A ping sweep is a technique used to identify if the hosts are alive in the networks using their IP addresses. Many tools can perform a ping sweep; one of the common ones is MegaPing. Which of the following statements is not true about MegaPing?
Correct
MegaPing is a GUI-based tool that runs under Windows that incorporates several functions into a single interface. It can scan your entire network and provide information such as open shared resources, open ports, services/drivers active on the computer, key registry entries, users, and groups, trusted domains, and printers. Scan results can be saved in HTML or TXT reports, which can be used to secure your network. You can conduct a ping sweep using MegaPing by utilizing the IP scanner tool, which you would select from the list on the left-hand side.
Incorrect
MegaPing is a GUI-based tool that runs under Windows that incorporates several functions into a single interface. It can scan your entire network and provide information such as open shared resources, open ports, services/drivers active on the computer, key registry entries, users, and groups, trusted domains, and printers. Scan results can be saved in HTML or TXT reports, which can be used to secure your network. You can conduct a ping sweep using MegaPing by utilizing the IP scanner tool, which you would select from the list on the left-hand side.
-
Question 7 of 10
7. Question
Transmission Control Protocol (TCP) scanning is the most detailed and complex type of port scanning. There are different types of TCP scans that Nmap can perform, one of which is the full connect scan. Which of the following sentences best describes the full connect scan?
Correct
In a full connect scan, instead of writing raw packets as most other scan types do, Nmap asks the underlying system to establish a connection with the target machine and port by issuing the connect system call. Nmap will complete the connection and then tear it down once the connection is complete.
Incorrect
In a full connect scan, instead of writing raw packets as most other scan types do, Nmap asks the underlying system to establish a connection with the target machine and port by issuing the connect system call. Nmap will complete the connection and then tear it down once the connection is complete.
-
Question 8 of 10
8. Question
A port scan identifies open ports on systems connected to the target network. It is a starting point for identifying services and applications that are listening on those ports. Masscan is an effective port scanner developed by Robert Graham. Which of the following statements best defines a masscan?
Correct
Masscan is an internet-scale port scanner that can scan the entire internet in under 6 minutes, transmitting 10 million packets per second, from a single machine.
Incorrect
Masscan is an internet-scale port scanner that can scan the entire internet in under 6 minutes, transmitting 10 million packets per second, from a single machine.
-
Question 9 of 10
9. Question
Vulnerability scanning is the inspection of the potential points of exploitation on a computer or network to identify security holes. Several tools can be used to perform vulnerability scanning, one of which is the Open Vulnerability Assessment System (OpenVAS). Which of the following sentences describes OpenVAS?
Correct
The Open Vulnerability Assessment System (OpenVAS) is a vulnerability scanner maintained and distributed by Greenbone Networks. It developed the Greenbone Security Assistant (GSA) as the user interface for its program. It is intended to be an all-in-one vulnerability scanner with a variety of built-in tests and a web interface designed to make setting up and running vulnerability scans fast and easy while providing a high level of user configurability.
Incorrect
The Open Vulnerability Assessment System (OpenVAS) is a vulnerability scanner maintained and distributed by Greenbone Networks. It developed the Greenbone Security Assistant (GSA) as the user interface for its program. It is intended to be an all-in-one vulnerability scanner with a variety of built-in tests and a web interface designed to make setting up and running vulnerability scans fast and easy while providing a high level of user configurability.
-
Question 10 of 10
10. Question
Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools. Nessus employs the Nessus Attack Scripting Language (NASL), a simple language that describes individual threats and potential attacks. If you’re using a Linux system, where can you find the NASL scripts?
Correct
On a Linux system, the Nessus Attack Scripting Language (NASL) are stored in /opt/nesses with the plugins in /opt/nessus/lib/plugins. Meanwhile, on a Windows system, the scripts are stored in the program files directory.
Incorrect
On a Linux system, the Nessus Attack Scripting Language (NASL) are stored in /opt/nesses with the plugins in /opt/nessus/lib/plugins. Meanwhile, on a Windows system, the scripts are stored in the program files directory.