Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
A port scan type is defined by three things: what flags are set in the packets before delivery, what responses you expect from ports, and how stealthily the scan works. Which of the following statements best describes a stealth port scan?
Correct
A stealth scan is also known as a half-open scan. In this type of scan, only SYN packets are sent to ports. Responses from ports are the same as they are for a TCP connect scan. This technique is useful in hiding your scanning efforts, possibly bypassing firewalls and monitoring efforts by hiding as normal traffic.
Incorrect
A stealth scan is also known as a half-open scan. In this type of scan, only SYN packets are sent to ports. Responses from ports are the same as they are for a TCP connect scan. This technique is useful in hiding your scanning efforts, possibly bypassing firewalls and monitoring efforts by hiding as normal traffic.
-
Question 2 of 10
2. Question
A ping sweep is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts. Hping is a powerful tool used for pinging sweeps and scanning ports. Which of the following statements best describes Hping?
Correct
Hping is a command-line oriented handy packet-crafting tool for TCP/IP and works on Windows and Linux versions. It supports TCP, UDP, ICMP, and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.
Incorrect
Hping is a command-line oriented handy packet-crafting tool for TCP/IP and works on Windows and Linux versions. It supports TCP, UDP, ICMP, and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.
-
Question 3 of 10
3. Question
Hiding your activities from security professionals is something you’ll need to prepare for and master in each step of the hacking phases, and scanning is no exception. One method used to evade detection by an IDS is by using a proxy. Which of the following statements best describes proxy?
Correct
Proxy is a system you set up to act as an intermediary between you and your targets. It is usually used by the network administrators to control traffic and provide additional security for internal users, or for things like remotely accessing intranets.
Incorrect
Proxy is a system you set up to act as an intermediary between you and your targets. It is usually used by the network administrators to control traffic and provide additional security for internal users, or for things like remotely accessing intranets.
-
Question 4 of 10
4. Question
Vulnerability scanning is the process of running a tool against a target to see what vulnerabilities it may hold. Tenable’s Nessus is the most widely deployed vulnerability scanner. Which of the following statements best describes the Nessus Professional tool?
Correct
Nessus Professional features high-speed discovery, configuration auditing, target profiling, malware detection, sensitive data discovery, and vulnerability analysis. It also scans for viruses, malware, backdoors, hosts communicating with botnet-infected systems, known/unknown processes, as well as web services linking to malicious content.
Incorrect
Nessus Professional features high-speed discovery, configuration auditing, target profiling, malware detection, sensitive data discovery, and vulnerability analysis. It also scans for viruses, malware, backdoors, hosts communicating with botnet-infected systems, known/unknown processes, as well as web services linking to malicious content.
-
Question 5 of 10
5. Question
Banner Grabbing is the process of sending an unsolicited request to an open port to see what, if any, default message is returned. ECC listed the two different categories of banner grabbing: active and passive banner grabbing. Which of the following sentences does not describe passive banner grabbing?
Correct
Passive banner grabbing is the method of gathering information while avoiding a high level of exposure from the origin connection by using different software and platforms as a gateway to avoid a direct connection, while the active banner grabbing is the act of sending packets to the remote host and waiting for their response to analyze the data.
Incorrect
Passive banner grabbing is the method of gathering information while avoiding a high level of exposure from the origin connection by using different software and platforms as a gateway to avoid a direct connection, while the active banner grabbing is the act of sending packets to the remote host and waiting for their response to analyze the data.
-
Question 6 of 10
6. Question
The enumeration in ethical hacking means listing the items we find within a specific target. When we enumerate a target, we’re moving from passive information gathering to a much more active state. What tools can you use if you want to conduct a NetBIOS Enumeration?
Correct
Some of the useful tools that can be used in NetBIOS Enumeration include the following:
(1) nbstat
(2) SuperScan
(3) Hyena
(4) Winfingerprint
(5) NetBIOS Enumerator
(6) NSAuditorIncorrect
Some of the useful tools that can be used in NetBIOS Enumeration include the following:
(1) nbstat
(2) SuperScan
(3) Hyena
(4) Winfingerprint
(5) NetBIOS Enumerator
(6) NSAuditor -
Question 7 of 10
7. Question
Sniffing is the art of capturing packets as they pass on a wire, or over the airwaves, to review for interesting information. An example of a sniffing technique is DHCP starvation. Which of the following descriptions defines DHCP starvation?
Correct
In a DHCP starvation attack, an attacker broadcasts a large number of DHCP request messages with spoofed source MAC addresses. If the legitimate DHCP server in the network starts responding to all these fake DHCP request messages, available IP addresses in the DHCP server will be depleted within a short period.
Incorrect
In a DHCP starvation attack, an attacker broadcasts a large number of DHCP request messages with spoofed source MAC addresses. If the legitimate DHCP server in the network starts responding to all these fake DHCP request messages, available IP addresses in the DHCP server will be depleted within a short period.
-
Question 8 of 10
8. Question
A firewall is an appliance within a network that is designed to protect internal sources from an unauthorized external process. Which of the following statements best defines the circuit-level gateway firewall?
Correct
A circuit-level gateway firewall provides the User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) connection security. It works at the OSI model’s session layer and allows or prevents data stream. It also monitors TCP data packet handshaking and session fulfillment of firewall rules and policies.
Incorrect
A circuit-level gateway firewall provides the User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) connection security. It works at the OSI model’s session layer and allows or prevents data stream. It also monitors TCP data packet handshaking and session fulfillment of firewall rules and policies.
-
Question 9 of 10
9. Question
The windows registry is a collection of all the settings and configurations that make the system run. Two basic elements make up a registry setting: keys and values. Which of the following descriptions defines the root-level key HKEY_CURRENT_USER (HKCU)?
Correct
HKEY_CURRENT_USER (HKCU) is a root-level key in the windows registry which contains configuration information that applies to the current user logged on.
Incorrect
HKEY_CURRENT_USER (HKCU) is a root-level key in the windows registry which contains configuration information that applies to the current user logged on.
-
Question 10 of 10
10. Question
A rootkit is a collection of software put in place by an attacker that is designed to obscure system compromise. Which of the following statements best describes horse pill rootkits?
Correct
Horse pill rootkit is a proof-of-concept Linux rootkit that demonstrates two interesting techniques:
(1) Infecting systems via the initial ramdisk
(2) Deceiving system owners using container primitivesIncorrect
Horse pill rootkit is a proof-of-concept Linux rootkit that demonstrates two interesting techniques:
(1) Infecting systems via the initial ramdisk
(2) Deceiving system owners using container primitives