Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Wireshark is a GUI-based packet capture program. Which of the following is an advantage of Wireshark over tshark and tcpdump?
Correct
Wireshark is a packet analyzer which is free and open-source and is used for software and communications protocol development. It is also used for network troubleshooting, analysis and education. It allows us to view the data packets easily, which are moving around and we can capture these packets completely.
Incorrect
Wireshark is a packet analyzer which is free and open-source and is used for software and communications protocol development. It is also used for network troubleshooting, analysis and education. It allows us to view the data packets easily, which are moving around and we can capture these packets completely.
-
Question 2 of 10
2. Question
Which of the following is a method of monitoring network traffic in which the switch sends a copy of all network packets seen on one port (or an entire VLAN) to another port, where the packet can be analyzed?
Correct
Port Mirroring which is also known as SPAN (Switched Port Analyzer). Network traffic is monitored by using this method. When port mirroring has been enabled, the switch itself transmits a copy of all available network packets which can be seen on one port (or an entire VLAN) to another port, where the packet can be assessed and analyzed.
Incorrect
Port Mirroring which is also known as SPAN (Switched Port Analyzer). Network traffic is monitored by using this method. When port mirroring has been enabled, the switch itself transmits a copy of all available network packets which can be seen on one port (or an entire VLAN) to another port, where the packet can be assessed and analyzed.
-
Question 3 of 10
3. Question
Robert Cialdini proposed six principles as part of his theory of influence. Which of the following satisfied the statement “If you see someone else doing something, such as using a product, you will see that it is acceptable to do that and you are willing to try the product, or whatever it is you’ve seen”?
Correct
Think about social proof as peer influence. By getting impressed, such as using a product by someone especially the dominant people, you will see that it is acceptable to do that. So we are willing to try the product or service. for example, apple Iphone, Microsoft window etc. This is known as the principle of Social Proof proposed by Robert Cialdini.
Incorrect
Think about social proof as peer influence. By getting impressed, such as using a product by someone especially the dominant people, you will see that it is acceptable to do that. So we are willing to try the product or service. for example, apple Iphone, Microsoft window etc. This is known as the principle of Social Proof proposed by Robert Cialdini.
-
Question 4 of 10
4. Question
Robert Cialdini proposed six principles as part of his theory of influence. Which of the following satisfy the principle of scarcity?
Correct
Scarcity is defined as the quality or state of being scare. The resources are limited and the demand of everyone is to avail these resources. For example, everyone wants to buy Apple iPhone, however, the manufacturing capacity of Apple to produce Apple iPhone is limited. They can’t manufacture six billion iPhones. This is called scarcity.
Incorrect
Scarcity is defined as the quality or state of being scare. The resources are limited and the demand of everyone is to avail these resources. For example, everyone wants to buy Apple iPhone, however, the manufacturing capacity of Apple to produce Apple iPhone is limited. They can’t manufacture six billion iPhones. This is called scarcity.
-
Question 5 of 10
5. Question
In the context of social engineering, which of the following is the story you have generated to explain the contact?
Correct
A pretext is defined as an icebreaking word with some stranger or an excuse to do something or say something, and keeping in view the context of social engineering, a pretext is a story or whatever you have created to engage the contact. pretexting is a social engineering attack by using pretext.
Incorrect
A pretext is defined as an icebreaking word with some stranger or an excuse to do something or say something, and keeping in view the context of social engineering, a pretext is a story or whatever you have created to engage the contact. pretexting is a social engineering attack by using pretext.
-
Question 6 of 10
6. Question
Which of the following is not included as Social Engineering Vectors?
Correct
There are really vectors that are used for social engineering which are as follows:-
(A) Phishing
(B) Vishing
(C) Smishing
(D) ImpersonationIncorrect
There are really vectors that are used for social engineering which are as follows:-
(A) Phishing
(B) Vishing
(C) Smishing
(D) Impersonation -
Question 7 of 10
7. Question
In the context of Social Engineering Vectors, which of the following is a technique used to acquire information through deception using electronic communications?
Correct
The source of the word phishing is fishing just replacing f with Ph. Fishing means doing some sort of bait out to get useful information. Phishing is a technique used to get information by using the method of deception through electronic communications. The attacker may use email or instant messaging for phishing. Social media platform are also exploited by the attacker for phishing attacks.
Incorrect
The source of the word phishing is fishing just replacing f with Ph. Fishing means doing some sort of bait out to get useful information. Phishing is a technique used to get information by using the method of deception through electronic communications. The attacker may use email or instant messaging for phishing. Social media platform are also exploited by the attacker for phishing attacks.
-
Question 8 of 10
8. Question
In the context of Social Engineering Vectors, which of the following is using phone calls to phish for information?
Correct
The source of the word phishing is fishing just replacing f with Ph. Fishing means doing some sort of bait out to get useful information. In the same sense, Voice phishing, or vishing is using phone calls to phish for information. A vishing attack may also be used for reconnaissance.
Incorrect
The source of the word phishing is fishing just replacing f with Ph. Fishing means doing some sort of bait out to get useful information. In the same sense, Voice phishing, or vishing is using phone calls to phish for information. A vishing attack may also be used for reconnaissance.
-
Question 9 of 10
9. Question
In the context of Social Engineering Vectors, which of the following is phishing with short message service (SMS) messages?
Correct
The source of the word phishing is fishing just replacing f with Ph. Fishing means doing some sort of bait out to get useful information. If phishing is done by using short message service (SMS) messages is called smishing. In this, attacker sends text messages from numbers unknown number, with a link in the message. As the usage of the smartphone increased, it’s easy for a target to touch the link and be taken to the website.
Incorrect
The source of the word phishing is fishing just replacing f with Ph. Fishing means doing some sort of bait out to get useful information. If phishing is done by using short message service (SMS) messages is called smishing. In this, attacker sends text messages from numbers unknown number, with a link in the message. As the usage of the smartphone increased, it’s easy for a target to touch the link and be taken to the website.
-
Question 10 of 10
10. Question
Which of the following is not considered as biometric verification?
Correct
Physical verification is not considered as biometric verification. Following are the types of biometric verification:-
(A) Fingerprints
(B) Iris scanning
(C) Retinal scanning
(D) VoiceprintIncorrect
Physical verification is not considered as biometric verification. Following are the types of biometric verification:-
(A) Fingerprints
(B) Iris scanning
(C) Retinal scanning
(D) Voiceprint