Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
In Brute force, The CNAME refers to which of the following?
Correct
CNAME stands for canonical name, and in the output, these show up as canonical name (CNAME) responses. The canonical name (CNAME) refers to another user, computer system or hostname and it is then resolved until there is an IP address of the system.
Incorrect
CNAME stands for canonical name, and in the output, these show up as canonical name (CNAME) responses. The canonical name (CNAME) refers to another user, computer system or hostname and it is then resolved until there is an IP address of the system.
-
Question 2 of 10
2. Question
p0f is a TCP/IP stack fingerprinting tool. Which of the following categories does p0f fall?
Correct
p0f is a passive TCP/IP stack fingerprinting tool. p0f can attempt to identify the system running on machines that send network traffic to the box it is running on, or to a machine that shares a medium with the machine, it is running on. p0f can also assist in analyzing other aspects of the remote system.
Incorrect
p0f is a passive TCP/IP stack fingerprinting tool. p0f can attempt to identify the system running on machines that send network traffic to the box it is running on, or to a machine that shares a medium with the machine, it is running on. p0f can also assist in analyzing other aspects of the remote system.
-
Question 3 of 10
3. Question
Which of the following website will give hosting history for websites?
Correct
In order to find hosting history for websites, this can be done by visiting the website netcraft.com. This website will provide the owner of the netblock that also includes the IP address. Furthermore, it will also briefly display the operating system installed on the webserver runs on.
Incorrect
In order to find hosting history for websites, this can be done by visiting the website netcraft.com. This website will provide the owner of the netblock that also includes the IP address. Furthermore, it will also briefly display the operating system installed on the webserver runs on.
-
Question 4 of 10
4. Question
When you visit a website, Wappalyzer will provide a list of technologies it identifies. Which of the following categories does Wappalyzer belong to?
Correct
Wappalyzer is a Plug-in can be added to both Chrome and Firefox. When visiting a webpage, Wappalyzer will create a list of technologies it recognizes. This may include the web server, programming frameworks, programming language, ad networks, and tracking technology.
Incorrect
Wappalyzer is a Plug-in can be added to both Chrome and Firefox. When visiting a webpage, Wappalyzer will create a list of technologies it recognizes. This may include the web server, programming frameworks, programming language, ad networks, and tracking technology.
-
Question 5 of 10
5. Question
Which of the following tool is used to mirror a website?
Correct
HTTrack is a tool which is used to mirror the website. By using HTTrack tool, we can download different World Wide Web sites from the Internet on our local computer. By default, HTTrack tool also used to arrange the downloaded site by the actual site’s relative link-structure. The downloaded (or “mirrored”) or saved website can be browsed by opening a web page of the website in a browser.
Incorrect
HTTrack is a tool which is used to mirror the website. By using HTTrack tool, we can download different World Wide Web sites from the Internet on our local computer. By default, HTTrack tool also used to arrange the downloaded site by the actual site’s relative link-structure. The downloaded (or “mirrored”) or saved website can be browsed by opening a web page of the website in a browser.
-
Question 6 of 10
6. Question
In Google search, inurl:index would find pages which of the following categories?
Correct
If someone want to search in the URL, What will he do is simply use inurl word in the google search bar, for example, inurl:index. This example, the google search engine would find pages/websites that included the word index anywhere in the URL.
Incorrect
If someone want to search in the URL, What will he do is simply use inurl word in the google search bar, for example, inurl:index. This example, the google search engine would find pages/websites that included the word index anywhere in the URL.
-
Question 7 of 10
7. Question
In Google search, by typing (site:Microsoft.com filetype:pdf “Windows 10”) which of the following results would be shown?
Correct
In Google search, by typing (site:Microsoft.com filetype:pdf “Windows 10”), All files with filetype pdf containing windows 10 in website Microsoft.com would be shown in google result.
Incorrect
In Google search, by typing (site:Microsoft.com filetype:pdf “Windows 10”), All files with filetype pdf containing windows 10 in website Microsoft.com would be shown in google result.
-
Question 8 of 10
8. Question
Which of the following is not categorized as Internet of thing?
Correct
If a device that has a keyboard and a screen and also can run general applications, for example, a computer, tablet, or smartphone is not categorised as part of the IoT. Many other devices which have operating system for operation connected with the network, for example, network-connected thermostats, tube light, electric fans, smart refrigerators, and a number of other essentially single-purpose devices, are IoT devices.
Incorrect
If a device that has a keyboard and a screen and also can run general applications, for example, a computer, tablet, or smartphone is not categorised as part of the IoT. Many other devices which have operating system for operation connected with the network, for example, network-connected thermostats, tube light, electric fans, smart refrigerators, and a number of other essentially single-purpose devices, are IoT devices.
-
Question 9 of 10
9. Question
Which of the following is a search engine specifically for IoT devices?
Correct
A search engine which is developed specifically for IoT devices is called Shodan and its web address is http://www.shodan.io. Shodan the search engine keeps a record of a large number of IoT devices along with vendors, device types, device model and device capabilities.
Incorrect
A search engine which is developed specifically for IoT devices is called Shodan and its web address is http://www.shodan.io. Shodan the search engine keeps a record of a large number of IoT devices along with vendors, device types, device model and device capabilities.
-
Question 10 of 10
10. Question
Being an ethical hacker, what is the purpose of port scan?
Correct
Port Scanning is defined as the technique used to recognized open ports and services available on a network host or computer user. utilization of port scanning is carried out by security technicians to audit computers systems for vulnerabilities, however, the major use of port scanning is carried out by hackers to target victims.
Incorrect
Port Scanning is defined as the technique used to recognized open ports and services available on a network host or computer user. utilization of port scanning is carried out by security technicians to audit computers systems for vulnerabilities, however, the major use of port scanning is carried out by hackers to target victims.