Quiz-summary
0 of 11 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 11 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- Answered
- Review
-
Question 1 of 11
1. Question
HTTP works as a request-response protocol, and several request methods are available. What is this type of HTTP request method, which involves retrieving whatever information is identified by the request-URI?
Correct
The GET method requests a representation of the specified source. Requests using GET should only retrieve data.
Incorrect
The GET method requests a representation of the specified source. Requests using GET should only retrieve data.
-
Question 2 of 11
2. Question
The two main modes a wireless network can operate in are ad-hoc mode and infrastructure mode. Which of the following statements best describes the ad-hoc mode?
Correct
Ad-hoc mode refers to a wireless network structure where devices can communicate directly with each other. This type of wireless network is also called a peer-to-peer mode.
Incorrect
Ad-hoc mode refers to a wireless network structure where devices can communicate directly with each other. This type of wireless network is also called a peer-to-peer mode.
-
Question 3 of 11
3. Question
What is this type of wireless encryption, which was introduced in 1997, and is defined as a security protocol for wireless local area networks (WLAN) stated in the 802.11b standard; it aims to provide security as data is transmitted from one end-point to another, but was found to be inadequate and was superseded by other security protocols?
Correct
Wired Equivalent Privacy (WEP) uses passwords that are entered manually at both ends. It uses the RC4 encryption algorithm, and originally specified a 40-bit key, but was later boosted to 104-bits.
Incorrect
Wired Equivalent Privacy (WEP) uses passwords that are entered manually at both ends. It uses the RC4 encryption algorithm, and originally specified a 40-bit key, but was later boosted to 104-bits.
-
Question 4 of 11
4. Question
In 2015, the Open Web Application Security Project (OWASP) performed a survey and initiated a call for data submission globally. This process helped them analyze and re-categorize the Top 10 mobile risks for 2016. Which of the following is not included in the Top 10 list?
Correct
OWASP’s Top 10 Mobile Risks as of 2016:
(1) Improper Platform Usage
(2) Insecure Data Storage
(3) Insecure Communication
(4) Insecure Authentication
(5) Insufficient Cryptography
(6) Insecure Authorization
(7) Client Code Quality
(8) Code Tampering
(9) Reverse Engineering
(10) Extraneous FunctionalityIncorrect
OWASP’s Top 10 Mobile Risks as of 2016:
(1) Improper Platform Usage
(2) Insecure Data Storage
(3) Insecure Communication
(4) Insecure Authentication
(5) Insufficient Cryptography
(6) Insecure Authorization
(7) Client Code Quality
(8) Code Tampering
(9) Reverse Engineering
(10) Extraneous Functionality -
Question 5 of 11
5. Question
Rooting or jailbreaking a mobile device grants you administrative access to the device so you can do whatever you want with it. If you own an android device, and you want to jailbreak it, what tool will you use?
Correct
Some of the useful tools in rooting an android device include the following:
(1) KingoRoot
(2) TunesGo
(3) OneClickRoot
(4) MTK DroidIncorrect
Some of the useful tools in rooting an android device include the following:
(1) KingoRoot
(2) TunesGo
(3) OneClickRoot
(4) MTK Droid -
Question 6 of 11
6. Question
What is this type of IOS jailbreaking technique, wherein the kernel will remain patched after the reboot, with or without a system connection?
Correct
Untethered jailbreaking is a type of IOS jailbreaking technique, wherein if the user turns the device off and back on, the device will start unhindered.
Incorrect
Untethered jailbreaking is a type of IOS jailbreaking technique, wherein if the user turns the device off and back on, the device will start unhindered.
-
Question 7 of 11
7. Question
Cloud computing provides user and organization subscribers an on-demand delivery of different IT services. What is this type of cloud computing, which is defined as an instant computing infrastructure, provisioned, and managed over the internet?
Correct
Infrastructure as a service provides virtualized computing resources over the internet. It scales up and down with demand, letting you pay only for what you use. It also helps to avoid the expense and complexity of buying and managing your physical servers and other datacenter infrastructure.
Incorrect
Infrastructure as a service provides virtualized computing resources over the internet. It scales up and down with demand, letting you pay only for what you use. It also helps to avoid the expense and complexity of buying and managing your physical servers and other datacenter infrastructure.
-
Question 8 of 11
8. Question
A cloud deployment model indicates how cloud services are made available to users. There are four deployment models associated with cloud computing: private, public, community, and hybrid cloud models. What is this type of cloud deployment model, which is defined as a composition of two or more cloud deployment models?
Correct
The hybrid cloud model is a computing environment that connects a company’s on-premises private cloud services and third-party public cloud into a single, flexible infrastructure for running the organization’s applications and workloads.
Incorrect
The hybrid cloud model is a computing environment that connects a company’s on-premises private cloud services and third-party public cloud into a single, flexible infrastructure for running the organization’s applications and workloads.
-
Question 9 of 11
9. Question
The Federal Risk and Authorization Management Program (FedRAMP) is probably the most recognized and referenced regulatory effort regarding cloud computing. Which of the following statements does not describe FedRAMP?
Correct
The Federal Risk and Management Program (FedRAMP) is a cybersecurity risk management program for the purchase and use of cloud products and services used by U.S. federal agencies. The program was initiated by the Office of Management and Budget (OMB) in response to the U.S. government’s 2011 Cloud First Policy.
Incorrect
The Federal Risk and Management Program (FedRAMP) is a cybersecurity risk management program for the purchase and use of cloud products and services used by U.S. federal agencies. The program was initiated by the Office of Management and Budget (OMB) in response to the U.S. government’s 2011 Cloud First Policy.
-
Question 10 of 11
10. Question
Malware refers to software programs designed to damage or do other unwanted actions on a computer system. What is this type of malware, which is defined as a self-replicating computer program that uses a computer network to send copies of itself to other systems without human intervention?
Correct
A worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program to cause damage.
Incorrect
A worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program to cause damage.
-
Question 11 of 11
11. Question
Encryption is the process of converting data into an unrecognizable form. What is this type of encrypted communication method, which is used for signing, compressing, and encrypting and decrypting emails, files, directories, and even whole disk partitions, mainly to increase the security of email communications?
Correct
Pretty Good Privacy (PGP) is a methodology used for encrypting and decrypting digital files and communications over the internet. It provides data integrity services by digitally signing messages, allowing receivers to learn whether or not the message confidentiality is compromised.
Incorrect
Pretty Good Privacy (PGP) is a methodology used for encrypting and decrypting digital files and communications over the internet. It provides data integrity services by digitally signing messages, allowing receivers to learn whether or not the message confidentiality is compromised.