Quiz-summary
0 of 9 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 9 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- Answered
- Review
-
Question 1 of 9
1. Question
Which of the following is about implementing multiple security controls at every layer of the OSI reference. It is also about the automation of the security controls and processes?
Correct
Defense in breadth can be defined as implementing multiple system security enhancement controls/tools at each layer of the OSI reference. It can also be defined as the automation of security controls, tools, programs and processes. A planned, systematic set of multidisciplinary activities or procedure that seek for effective management, efficient identification and reduce risk of exploitable vulnerabilities at each and every stage of the system, network, equipment or sub-component life cycle.
Incorrect
Defense in breadth can be defined as implementing multiple system security enhancement controls/tools at each layer of the OSI reference. It can also be defined as the automation of security controls, tools, programs and processes. A planned, systematic set of multidisciplinary activities or procedure that seek for effective management, efficient identification and reduce risk of exploitable vulnerabilities at each and every stage of the system, network, equipment or sub-component life cycle.
-
Question 2 of 9
2. Question
The process of getting the size and scope of the target is known as which of the following?
Correct
Footprinting can be defined as the process of obtaining the size and scope of the target system. In other words, the attacker, or hacker, also known as the ethical hacker, are trying to obtain the footprint of the target computer of the victim organization.
Incorrect
Footprinting can be defined as the process of obtaining the size and scope of the target system. In other words, the attacker, or hacker, also known as the ethical hacker, are trying to obtain the footprint of the target computer of the victim organization.
-
Question 3 of 9
3. Question
Which of the following is the term that describes identifying information about your target using freely available sources?
Correct
There are many places for an ethical hacker from where he can get information about the target organizations or target equipment. Open-source intelligence is the term which can be defined as to describe identifying information about target using freely available sources.
Incorrect
There are many places for an ethical hacker from where he can get information about the target organizations or target equipment. Open-source intelligence is the term which can be defined as to describe identifying information about target using freely available sources.
-
Question 4 of 9
4. Question
Which of the following social website is often useful for news and updates, as well as marketing information and making announcements?
Correct
Twitter is a website which is often very useful for news and updates. It is also very useful for the marketing of information and making announcements about new products or ideas. Twitter is an American website for microblogging and social networking service on which users or account holders can post and interact with messages known as “tweets”. Registered users or account holder can post, like, mention, inbox and retweet tweets, but unregistered users can only read tweets.
Incorrect
Twitter is a website which is often very useful for news and updates. It is also very useful for the marketing of information and making announcements about new products or ideas. Twitter is an American website for microblogging and social networking service on which users or account holders can post and interact with messages known as “tweets”. Registered users or account holder can post, like, mention, inbox and retweet tweets, but unregistered users can only read tweets.
-
Question 5 of 9
5. Question
Which of the following social website is useful for all sorts of business purposes?
Correct
LinkedIn is an American business website which is an employment-oriented service that operates via websites and mobile apps. It was founded on December 28, 2002, and finally, it was launched on May 5, 2003, the scope of this website is mainly professional networking, where employers posting of their jobs and job seekers posting their CVs.
Incorrect
LinkedIn is an American business website which is an employment-oriented service that operates via websites and mobile apps. It was founded on December 28, 2002, and finally, it was launched on May 5, 2003, the scope of this website is mainly professional networking, where employers posting of their jobs and job seekers posting their CVs.
-
Question 6 of 9
6. Question
www in a website address instead WWW, What does it mean?
Correct
If the letters “WWW” are written in capitalized form, it refers to the World Wide Web WWW. When the letters “www” are written in running form or not capitalized, it will simply refer to the hostname rather than the overall World Wide Web.
Incorrect
If the letters “WWW” are written in capitalized form, it refers to the World Wide Web WWW. When the letters “www” are written in running form or not capitalized, it will simply refer to the hostname rather than the overall World Wide Web.
-
Question 7 of 9
7. Question
The URL consists, commonly, of two parts. The first is the Uniform Resource Identifier (URI). Which of the following protocols are used by the URI?
Correct
When visiting a website, Simply enter in the address bar of the browser (internet explorer or chrome) something called a Uniform Resource Locator (URL) and this URL primarily consists of two parts. The first part of the URL is the Uniform Resource Identifier (URI). These are the protocols used by URI e.g., http:// or ftp://.
Incorrect
When visiting a website, Simply enter in the address bar of the browser (internet explorer or chrome) something called a Uniform Resource Locator (URL) and this URL primarily consists of two parts. The first part of the URL is the Uniform Resource Identifier (URI). These are the protocols used by URI e.g., http:// or ftp://.
-
Question 8 of 9
8. Question
Why do we use nslookup tool?
Correct
nslookup is a network administration command-line tool/program which is available in many computers operating systems (Window, Linux etc) for querying the Domain Name System (DNS) to get domain name or IP address mapping, or other DNS records.
Incorrect
nslookup is a network administration command-line tool/program which is available in many computers operating systems (Window, Linux etc) for querying the Domain Name System (DNS) to get domain name or IP address mapping, or other DNS records.
-
Question 9 of 9
9. Question
Which of the following are typically used to replicate DNS data across a number of DNS servers or to back up DNS files?
Correct
Zone transfers are typically used to duplicate or making exact copies of DNS data across a number of DNS servers or to back up DNS files. A computer user or computer server will perform a zone transfer request from a name server.
Incorrect
Zone transfers are typically used to duplicate or making exact copies of DNS data across a number of DNS servers or to back up DNS files. A computer user or computer server will perform a zone transfer request from a name server.