Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Netstat is a command-line utility that reports the status of TCP/IP and Ethernet connections. What netstat command will you use if you want to display all connections and listening ports, with addresses and port numbers in numerical form?
Correct
Netstat commands display the current network connections, networking protocol statistics, and a variety of other interfaces. If you type netstat-an, the system will display all connections and listening ports in numerical form.
Incorrect
Netstat commands display the current network connections, networking protocol statistics, and a variety of other interfaces. If you type netstat-an, the system will display all connections and listening ports in numerical form.
-
Question 2 of 10
2. Question
Internet Protocol version 4 (IPv4) is the fourth revision of the Internet Protocol and a widely used protocol in data communication over different kinds of networks. The three main address types of IPv4 include unicast, multicast, and broadcast. Which of the following is not a rule involving IPv4 addresses?
Correct
Rules about IPv4 addresses include the following:
(1) If all the bits in the host field are 1’s, the address is broadcast.
(2) If all the bits in the host field are set to 0’s, that’s the network address.
(3) Any combination other than these two presents the usable range of addresses in that network.Incorrect
Rules about IPv4 addresses include the following:
(1) If all the bits in the host field are 1’s, the address is broadcast.
(2) If all the bits in the host field are set to 0’s, that’s the network address.
(3) Any combination other than these two presents the usable range of addresses in that network. -
Question 3 of 10
3. Question
ECC outlined the phases of scanning methodology to ensure that ethical hackers don’t miss anything and that all bases are properly covered. What is this phase in scanning methodology, wherein systems on a network are queried to see which ports they are listening to?
Correct
Port scanning on a network or server reveals which ports are open and listening, as well as divulging the presence of security devices such as firewalls that are present between the sender and the target.
Incorrect
Port scanning on a network or server reveals which ports are open and listening, as well as divulging the presence of security devices such as firewalls that are present between the sender and the target.
-
Question 4 of 10
4. Question
What is this tool, which works on Windows and Linux versions, and is useful for pinging sweeps, porting scans, and packet crafting TCP/IP?
Correct
Hping2 or Hping3 is a powerful tool that performs the following functions: test firewall rules, advanced port scanning, path MTU discovery, remote OS fingerprinting, TCP/IP stack auditing, etc.
Incorrect
Hping2 or Hping3 is a powerful tool that performs the following functions: test firewall rules, advanced port scanning, path MTU discovery, remote OS fingerprinting, TCP/IP stack auditing, etc.
-
Question 5 of 10
5. Question
Sniffing is a process of monitoring and capturing all data packets passing through a given network. What is this category of sniffing, which can only be done on networks that implement hubs instead of switches, and it is less direct and allows a hacker to remain relatively hidden on the network?
Correct
Passive sniffing only works if your machine’s NIC is part of the same collision domain as the targets you want to listen to, and the sniffer can sit there undetected for a long time and spy on the network.
Incorrect
Passive sniffing only works if your machine’s NIC is part of the same collision domain as the targets you want to listen to, and the sniffer can sit there undetected for a long time and spy on the network.
-
Question 6 of 10
6. Question
A honeypot is a system set up as a decoy to lure attackers. Specter, Honeyd, and KFSensor are examples of which type of honeypot?
Correct
A low-interaction honeypot reproduces a limited number of services and cannot be compromised completely. Examples of these include Specter, Honeyd, and KFSensor.
Incorrect
A low-interaction honeypot reproduces a limited number of services and cannot be compromised completely. Examples of these include Specter, Honeyd, and KFSensor.
-
Question 7 of 10
7. Question
Microsoft Windows uses cryptographic measures to prevent unauthenticated users from accessing the system. User’s passwords are stored in a hash format in a registry hive. Where do Microsoft Windows store authentication credentials and passwords?
Correct
Microsoft Windows stores and manages the local user and group accounts in a database file called Security Account Manager. It authenticates local user logons. The Windows SAM database file resides in C:\Windows\System32\config folder.
Incorrect
Microsoft Windows stores and manages the local user and group accounts in a database file called Security Account Manager. It authenticates local user logons. The Windows SAM database file resides in C:\Windows\System32\config folder.
-
Question 8 of 10
8. Question
Passwords in a Linux system can be stored in two files. What is this file in Linux, wherein the passwords are stored and displayed encrypted, and is accessible only by root?
Correct
The shadow file keeps a record of encrypted user’s passwords, as well as other passwords related information. It is owned by user root and group shadow.
Incorrect
The shadow file keeps a record of encrypted user’s passwords, as well as other passwords related information. It is owned by user root and group shadow.
-
Question 9 of 10
9. Question
A password attack is an attack wherein a third party is trying to gain access to your computer system by cracking a user’s password. What is this type of password offline attack, which is defined as the simplest and fastest technique, wherein hackers attempt to guess passwords by using well-known words or phrases?
Correct
A dictionary attack is done by using a list of passwords in a text file, which is then hashed by the same process the original password was put through.
Incorrect
A dictionary attack is done by using a list of passwords in a text file, which is then hashed by the same process the original password was put through.
-
Question 10 of 10
10. Question
A rootkit is a collection of software put in place by an attacker that is created to conceal system compromise. What type of rootkit uses system-level calls to hide their existence?
Correct
A library level rootkit is usually referred to as a user-level hook, which replaces or modifies the functionality of system calls to the Operating System.
Incorrect
A library level rootkit is usually referred to as a user-level hook, which replaces or modifies the functionality of system calls to the Operating System.