Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
A broadcast address is a special IP address used to transmit messages and data packets to network systems. It has two main types: limited broadcast and directed broadcast. Which of the following statements best describes a limited broadcast address?
Correct
Limited broadcast uses the IP address 255.255.255.255. It is a type of broadcast that is limited to the local area network (LAN). Routers ignore all limited broadcast and do not even open the packets on receipt.
Incorrect
Limited broadcast uses the IP address 255.255.255.255. It is a type of broadcast that is limited to the local area network (LAN). Routers ignore all limited broadcast and do not even open the packets on receipt.
-
Question 2 of 10
2. Question
ECC outlined different phases in scanning methodology to ensure that ethical hackers don’t miss anything and that all bases are properly covered. Which of the following is the first phase in the scanning methodology?
Correct
In the ECC scanning methodology, checking for live systems is the initial step. The most convenient way to do this is to use the Internet Control Message Protocol (ICMP).
Incorrect
In the ECC scanning methodology, checking for live systems is the initial step. The most convenient way to do this is to use the Internet Control Message Protocol (ICMP).
-
Question 3 of 10
3. Question
Sniffing is defined as the process of monitoring internet traffic in real-time. There are certain protocols in the computer system that is susceptible to sniffing. What is this protocol, which is designed to carry an email message; everything sent through this protocol has no encryption added at another layer, meaning it can easily be read by someone sniffing the wire?
Correct
The Simple Mail Transfer Protocol (SMTP) is one of the three protocols used for email. It is designed to be plaintext and ASCII printable. This means that traffic sent over SMTP is visible and easily readable by eavesdroppers.
Incorrect
The Simple Mail Transfer Protocol (SMTP) is one of the three protocols used for email. It is designed to be plaintext and ASCII printable. This means that traffic sent over SMTP is visible and easily readable by eavesdroppers.
-
Question 4 of 10
4. Question
IPv6, also called IPng, is the next version of the IP address system. It uses 128-bit addresses, which increases the number of possible addresses by an exponential amount. What are the three scopes of IPv6?
Correct
IPv6 addresses are complex; the new system also adds security to computers connected to the internet. IPv6 has three scopes:
(1) Link-local, which applies only to hosts on the same subnet.
(2) Site local, which applies only to hosts within the same organization.
(3) Global, which includes everything.Incorrect
IPv6 addresses are complex; the new system also adds security to computers connected to the internet. IPv6 has three scopes:
(1) Link-local, which applies only to hosts on the same subnet.
(2) Site local, which applies only to hosts within the same organization.
(3) Global, which includes everything. -
Question 5 of 10
5. Question
What is this type of sniffing, which is defined as the process by which law enforcement agencies conduct electronic surveillance of circuit and packet-mode communications as authorized by judicial or administrative order?
Correct
Lawful Interception is the process of legally intercepting communications between two parties for surveillance on telecommunications, voice over IP data, and multiservice networks.
Incorrect
Lawful Interception is the process of legally intercepting communications between two parties for surveillance on telecommunications, voice over IP data, and multiservice networks.
-
Question 6 of 10
6. Question
The Windows Registry is a collection of all the settings and configurations that make the system run. What is this root-level key in the registry, which contains information on hardware and software applications?
Correct
The HKEY_LOCAL_MACHINE, also called as HKLM is a Windows Registry tree that contains configuration data that is used by all users in Windows. This includes information about Windows services, drivers, programs that automatically run for every user, and general OS settings.
Incorrect
The HKEY_LOCAL_MACHINE, also called as HKLM is a Windows Registry tree that contains configuration data that is used by all users in Windows. This includes information about Windows services, drivers, programs that automatically run for every user, and general OS settings.
-
Question 7 of 10
7. Question
If you’re using Microsoft Windows 10, and you want to access and edit the Windows Registry, what built-in application will you use?
Correct
The regedt32.exe is a built-in application in every Windows system. It opens the registry in an easy-to-view folder layout and is the preferred editor by Microsoft.
Incorrect
The regedt32.exe is a built-in application in every Windows system. It opens the registry in an easy-to-view folder layout and is the preferred editor by Microsoft.
-
Question 8 of 10
8. Question
A password attack is an attack wherein a third party is trying to gain access to your system by cracking a user’s password. What is this type of active online password attack wherein the attacker uses a hardware device or software application to capture the keystrokes a user types?
Correct
Keylogging is the process of monitoring software designed to record keystrokes made by a user. It is one of the oldest forms of cyber threat; the keystroke loggers record the information you type into a website or application and send back to a third party.
Incorrect
Keylogging is the process of monitoring software designed to record keystrokes made by a user. It is one of the oldest forms of cyber threat; the keystroke loggers record the information you type into a website or application and send back to a third party.
-
Question 9 of 10
9. Question
Web servers respond to requests from clients and provide a file or service in answer. What is this type of web server, which is defined as an open-source web server creation, deployment, and management software designed to create web servers that can host one or more HTTP-based websites?
Correct
Most web servers on the internet are Apache, making up 45.4 percent of the marketplace. It is an open-source, powerful, and fast web server that usually runs on a Unix or Linux platform, although it can still be used on a variety of operating systems.
Incorrect
Most web servers on the internet are Apache, making up 45.4 percent of the marketplace. It is an open-source, powerful, and fast web server that usually runs on a Unix or Linux platform, although it can still be used on a variety of operating systems.
-
Question 10 of 10
10. Question
HTTP works as a request-response protocol, and several request methods are available. What is this type of HTTP request method, which involves retrieving whatever information is identified by the request-URI?
Correct
The GET method requests a representation of the specified source. Requests using GET should only retrieve data.
Incorrect
The GET method requests a representation of the specified source. Requests using GET should only retrieve data.