Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
In the IP header, Which of the following indicates how long a message can live on the network before it is considered to be expired?
Correct
The time to live (TTL) field shows the time period of a message can live on the network before it is supposed to be discarded. The properties of TTL are given below:-
(A) It is to be calculated in seconds
(B) The packet may pass through many devices or network infrastructure in a second, the initial definition of TTL may not relevant anymore
(C) TTL actually shows the number of network devices the message can pass through.
(D) The message is expired as soon as this field hits 0
(E) An error message is sent back to the sender
(F) This field is 8 bits long.Incorrect
The time to live (TTL) field shows the time period of a message can live on the network before it is supposed to be discarded. The properties of TTL are given below:-
(A) It is to be calculated in seconds
(B) The packet may pass through many devices or network infrastructure in a second, the initial definition of TTL may not relevant anymore
(C) TTL actually shows the number of network devices the message can pass through.
(D) The message is expired as soon as this field hits 0
(E) An error message is sent back to the sender
(F) This field is 8 bits long. -
Question 2 of 10
2. Question
Which of the following are a 32-bit number that masks an IP address, and divides the IP address into network address and host address?
Correct
A Subnet mask is a 32-bit number that masks or hide an IP address, and also divides the IP address into two parts, one of it is the network address and the other is the host address. Subnet Mask is created by changing network bits to all “1”s and changing host bits to all “0”s
Incorrect
A Subnet mask is a 32-bit number that masks or hide an IP address, and also divides the IP address into two parts, one of it is the network address and the other is the host address. Subnet Mask is created by changing network bits to all “1”s and changing host bits to all “0”s
-
Question 3 of 10
3. Question
Which of the following protocol is a much lighter-weight protocol gives no guarantee of delivering of the message?
Correct
UDP is a lighter-weight protocol as compared to TCP and it gives no assurance of delivering the message to the receiver. UDP (User Datagram Protocol) is a substitute communications protocol of Transmission Control Protocol (TCP) used basically for maintaining low-abeyance and loss tolerating connections between computer applications on the internet.
Incorrect
UDP is a lighter-weight protocol as compared to TCP and it gives no assurance of delivering the message to the receiver. UDP (User Datagram Protocol) is a substitute communications protocol of Transmission Control Protocol (TCP) used basically for maintaining low-abeyance and loss tolerating connections between computer applications on the internet.
-
Question 4 of 10
4. Question
Which of the following protocols work well with streaming video and audio?
Correct
UDP protocol is best in Streaming video and audio and TCP protocol doesn’t work well for streaming video and audio. One biggest reason is that with UDP, it depends on the application to do any type of reordering of messages (packets or datagram), as required. If a datagram (the PDU for UDP) receives out of order with streaming audio or video, the application at the receiver side will just destroy it.
Incorrect
UDP protocol is best in Streaming video and audio and TCP protocol doesn’t work well for streaming video and audio. One biggest reason is that with UDP, it depends on the application to do any type of reordering of messages (packets or datagram), as required. If a datagram (the PDU for UDP) receives out of order with streaming audio or video, the application at the receiver side will just destroy it.
-
Question 5 of 10
5. Question
All of the systems are local and probably in the same room or building or on the same floor is the definition for which of the following?
Correct
A local area network is defined as a computer network that connects or interconnects two or more computers within a limited area such as a building, house, clinic, laboratory, university, restaurant, cafeteria, bank or office building. As a comparison with WAN, a wide area network not only covers a larger area but also generally involves leased or purchased telecommunication circuits for a special purpose, for example, banking network.
Incorrect
A local area network is defined as a computer network that connects or interconnects two or more computers within a limited area such as a building, house, clinic, laboratory, university, restaurant, cafeteria, bank or office building. As a comparison with WAN, a wide area network not only covers a larger area but also generally involves leased or purchased telecommunication circuits for a special purpose, for example, banking network.
-
Question 6 of 10
6. Question
Which of the following is a LAN where the isolation at layer 2 is handled by software/firmware rather than physically?
Correct
A virtual LAN (VLAN) is defined as any broadcast domain that is divided and isolated in a computer network (i.e. internet) at the data link layer (OSI layer 2). In networking language, LAN is the abbreviation for local area network and in the same sense, virtual refers to a physical object reproduced and changed by additional logic.
Incorrect
A virtual LAN (VLAN) is defined as any broadcast domain that is divided and isolated in a computer network (i.e. internet) at the data link layer (OSI layer 2). In networking language, LAN is the abbreviation for local area network and in the same sense, virtual refers to a physical object reproduced and changed by additional logic.
-
Question 7 of 10
7. Question
Which of the following is a network whose nodes are more than 10 or so miles apart?
Correct
A Wide Area Network is defined as a network whose nodes (computers or hosts) are more than 10 or so miles apart from each other. Any Internet service provider on backbone of the internet would have a WAN. Additionally, businesses like banks may have WANs where they have network connections that make connections between their offices located at different places.
Incorrect
A Wide Area Network is defined as a network whose nodes (computers or hosts) are more than 10 or so miles apart from each other. Any Internet service provider on backbone of the internet would have a WAN. Additionally, businesses like banks may have WANs where they have network connections that make connections between their offices located at different places.
-
Question 8 of 10
8. Question
Any of these devices that have embedded software and also have network access are considered to be part of the Internet of Things (IoT). Which of the following is an example of Internet of Things (IoT)?
Correct
Anything or any device or equipment that can be connected to the network and doesn’t have a built-in screen or keyboard or the ability to take direct user input or interaction is part of the Internet of Things. Smartphones like apple or android or general-purpose computers would not be part of the Internet of Things as they have traditional input/output devices like a screen and keyboard, even if the keyboard is virtual.
Incorrect
Anything or any device or equipment that can be connected to the network and doesn’t have a built-in screen or keyboard or the ability to take direct user input or interaction is part of the Internet of Things. Smartphones like apple or android or general-purpose computers would not be part of the Internet of Things as they have traditional input/output devices like a screen and keyboard, even if the keyboard is virtual.
-
Question 9 of 10
9. Question
Triad is a model designed to guide policies for information security within an organization. It has three elements, Which of the following is not an element of TRIAD?
Correct
The CIA triad is a model which can be defined as a model designed to guide policies and procedure for information safety and security within an organization and it consists of the following:-
(A) Confidentiality
(B) Integrity
(C) AvailabilityIncorrect
The CIA triad is a model which can be defined as a model designed to guide policies and procedure for information safety and security within an organization and it consists of the following:-
(A) Confidentiality
(B) Integrity
(C) Availability -
Question 10 of 10
10. Question
Which of the following means that data, objects and resources are protected from unauthorized viewing and other access?
Correct
Confidentiality is one aspect of CIA triad which making sure that no one gets unauthorized access to information of the organization. This can be achieved by using strong passwords on user login credential to make sure attackers or hacker can’t get in. It can also be achieved by keeping certain information offline or disconnected from the internet so it is impossible to get accessed remotely by hackers. the use of encryption is a simple way to achieve confidentiality.
Incorrect
Confidentiality is one aspect of CIA triad which making sure that no one gets unauthorized access to information of the organization. This can be achieved by using strong passwords on user login credential to make sure attackers or hacker can’t get in. It can also be achieved by keeping certain information offline or disconnected from the internet so it is impossible to get accessed remotely by hackers. the use of encryption is a simple way to achieve confidentiality.