Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Port scanning refers to the act of searching for a computer’s ports through the use of specialized software. CurrPorts is an important tool used in port scanning. Which of the following statements does not describe CurrPorts?
Correct
CurrPorts displays the list of all currently opened TCP/IP and UDP ports on your local computer, including information about the process that opened the port, the process name, full path, version information, the time it was created, and the user who created it. It also automatically marks with pink color suspicious TCP/UDP ports owned by unidentified applications.
Incorrect
CurrPorts displays the list of all currently opened TCP/IP and UDP ports on your local computer, including information about the process that opened the port, the process name, full path, version information, the time it was created, and the user who created it. It also automatically marks with pink color suspicious TCP/UDP ports owned by unidentified applications.
-
Question 2 of 10
2. Question
IPv4 addresses are the most widely used version of the internet protocol. It defines IP addresses in a 32-bit format. Which of the following is not included in the rules governing IPv4 addresses?
Correct
Here are some rules you’ll need to know about IPv4 addresses and the bits that make them up:
(1) If all the bits in the host field are 1’s, the address is broadcast.
(2) If all the bits in the host field are set to 0’s, that’s the network address.
(3) Any combination other than these two present the usable range of addresses in that network.Incorrect
Here are some rules you’ll need to know about IPv4 addresses and the bits that make them up:
(1) If all the bits in the host field are 1’s, the address is broadcast.
(2) If all the bits in the host field are set to 0’s, that’s the network address.
(3) Any combination other than these two present the usable range of addresses in that network. -
Question 3 of 10
3. Question
A broadcast address is a special internet protocol (IP) address used to transmit messages and data packets to network systems. It has two main types: limited broadcast address and directed broadcast address. Which of the following descriptions best defines a directed broadcast address?
Correct
Directed broadcasts are sent to all devices on a subset, and they use the subnet’s broadcast address. Routers may take action on these packets, depending on what’s involved.
Incorrect
Directed broadcasts are sent to all devices on a subset, and they use the subnet’s broadcast address. Routers may take action on these packets, depending on what’s involved.
-
Question 4 of 10
4. Question
ECC outlined the scanning methodology phases to ensure that ethical hackers don’t miss anything and that all bases are properly covered. Which of the following is the last phase in the scanning methodology?
Correct
The scanning methodology phases as listed by ECC:
(1) Check for live systems.
(2) Check for open ports.
(3) Scan beyond IDS.
(4) Perform banner grabbing.
(5) Scan for vulnerabilities.
(6) Draw network diagrams.
(7) Prepare proxies.Incorrect
The scanning methodology phases as listed by ECC:
(1) Check for live systems.
(2) Check for open ports.
(3) Scan beyond IDS.
(4) Perform banner grabbing.
(5) Scan for vulnerabilities.
(6) Draw network diagrams.
(7) Prepare proxies. -
Question 5 of 10
5. Question
A port scan type is defined by three things: what flags are set in the packets before delivery, what responses you expect from ports, and how stealthily the scan works. Which of the following statements best describes an IDLE port scanning?
Correct
An IDLE scan is a TCP based port scan where the attacker sends spoofed packets to a passive target host. Designed for stealth, this scan uses an SYN flag and monitors responses as with an SYN scan.
Incorrect
An IDLE scan is a TCP based port scan where the attacker sends spoofed packets to a passive target host. Designed for stealth, this scan uses an SYN flag and monitors responses as with an SYN scan.
-
Question 6 of 10
6. Question
Hiding your activities from security professionals is something you’ll need to prepare for and master in each step of the hacking phases, and scanning is no exception. One method used to evade detection by an IDS is source routing. Which of the following statements best describes source routing?
Correct
Source routing provides another means to disguise your identity on a network. It was designed to allow applications to specify the route a packet takes to a destination. Its main benefit used to be assisting network managers in forcing traffic around areas of potential congestion. Protection against source routing attacks is prevalent and effective, not to mention most firewalls and routers detect source-routed packets, so this won’t work on modern networks.
Incorrect
Source routing provides another means to disguise your identity on a network. It was designed to allow applications to specify the route a packet takes to a destination. Its main benefit used to be assisting network managers in forcing traffic around areas of potential congestion. Protection against source routing attacks is prevalent and effective, not to mention most firewalls and routers detect source-routed packets, so this won’t work on modern networks.
-
Question 7 of 10
7. Question
A firewall is an appliance within a network that is designed to protect internal sources from an unauthorized external process. Which of the following statements best defines the application-level firewall?
Correct
Application-level firewalls or proxy firewalls allow specific applications in and out of the network based on its ruleset. These firewalls are delivered via a cloud-based solution or another proxy device. Rather than letting traffic connect directly, the proxy firewall first establishes a connection to the source of the traffic and inspects incoming data packet.
Incorrect
Application-level firewalls or proxy firewalls allow specific applications in and out of the network based on its ruleset. These firewalls are delivered via a cloud-based solution or another proxy device. Rather than letting traffic connect directly, the proxy firewall first establishes a connection to the source of the traffic and inspects incoming data packet.
-
Question 8 of 10
8. Question
The password active online attack is carried out by directly communicating with the victim’s machine. Phishing is one example of an active online attack. Which of the following statements best describes phishing?
Correct
Phishing is a cybercrime in which a target is contacted by email by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
Incorrect
Phishing is a cybercrime in which a target is contacted by email by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
-
Question 9 of 10
9. Question
A rootkit is a collection of software put in place by an attacker that is designed to obscure system compromise. Which of the following descriptions best defines the hypervisor level rootkits?
Correct
Hypervisor level rootkits take advantage of the hardware virtualization and are installed between the hardware and the kernel acting as the real hardware. Hence, it can modify the boot sequence of the host system to load a virtual machine as the host operating system.
Incorrect
Hypervisor level rootkits take advantage of the hardware virtualization and are installed between the hardware and the kernel acting as the real hardware. Hence, it can modify the boot sequence of the host system to load a virtual machine as the host operating system.
-
Question 10 of 10
10. Question
Web servers provide a majority of the services available on the internet and are therefore prime targets for attack. Which of the following statements does not describe the directory traversal attack?
Correct
A directory traversal or dot-dot-slash attack aims to access restricted directories and execute commands outside the intended webserver directories. By manipulating variables that reference files with dot-dot-slash sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system including application source code or configuration and critical system files.
Incorrect
A directory traversal or dot-dot-slash attack aims to access restricted directories and execute commands outside the intended webserver directories. By manipulating variables that reference files with dot-dot-slash sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system including application source code or configuration and critical system files.