Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
The Internet Protocol (IP) is a protocol for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination. The protocol header is one of the headers defined for IP. Which of the following statements defines the protocol header?
Correct
The protocol header is a numeric value indicating what the next protocol is. It is an 8-bit field and tells the receiving system what headers to look for in the transport header.
Incorrect
The protocol header is a numeric value indicating what the next protocol is. It is an 8-bit field and tells the receiving system what headers to look for in the transport header.
-
Question 2 of 10
2. Question
There are several different logical and physical network topologies from which administrators can choose to build a secure, robust, and easily maintainable topology. One of the most popular configurations is the hybrid topology. Which of the following descriptions defines a hybrid topology?
Correct
A hybrid topology is a type of network topology that uses two or more differing network topologies. These topologies can include a mix of bus topology, mesh topology, ring topology, star topology, and tree topology. The two most commonly used types of hybrid topology are the following: Star-Ring hybrid topology and Star-Bus hybrid topology.
Incorrect
A hybrid topology is a type of network topology that uses two or more differing network topologies. These topologies can include a mix of bus topology, mesh topology, ring topology, star topology, and tree topology. The two most commonly used types of hybrid topology are the following: Star-Ring hybrid topology and Star-Bus hybrid topology.
-
Question 3 of 10
3. Question
Ethical hacking is an act of intruding into system or networks to find out threats and vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss, or other major damages. It is consists of five phases. Which of the following sentences best describes the maintaining access phase?
Correct
The maintaining access phase involves installing a trojan or rootkit that can provide you with a backdoor, as well a the means to obscure your actions and existence on the system. It may also involve installing additional software on the system to maintain access. This may require copying the software onto your target system once you have done the initial compromise.
Incorrect
The maintaining access phase involves installing a trojan or rootkit that can provide you with a backdoor, as well a the means to obscure your actions and existence on the system. It may also involve installing additional software on the system to maintain access. This may require copying the software onto your target system once you have done the initial compromise.
-
Question 4 of 10
4. Question
Cloud computing is offered in three different service models which each satisfy a unique set of business requirements. These three models are known as Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Which of the following statements best describes PaaS?
Correct
A Platform as a Service (PaaS) vendor provides hardware and software tools over the internet, and people use these tools to develop applications. This means developers don’t need to start from scratch when creating applications, saving them a lot of time on writing extensive code. PaaS is a popular choice for businesses who want to create unique applications without spending a fortune or taking on all the responsibility.
Incorrect
A Platform as a Service (PaaS) vendor provides hardware and software tools over the internet, and people use these tools to develop applications. This means developers don’t need to start from scratch when creating applications, saving them a lot of time on writing extensive code. PaaS is a popular choice for businesses who want to create unique applications without spending a fortune or taking on all the responsibility.
-
Question 5 of 10
5. Question
Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals, or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. Which of the following is not part of IoT?
Correct
Any devices that have embedded software and also have network access are considered to be part of the Internet of Things (IoT). Essentially, anything that can be reached over the network that doesn’t have a built-in screen or the ability to take direct user interaction is part of the Internet of Things. Smartphones or general-purpose computers would not be part of the Internet of Things because they have traditional input/output devices like a screen and keyboard.
Incorrect
Any devices that have embedded software and also have network access are considered to be part of the Internet of Things (IoT). Essentially, anything that can be reached over the network that doesn’t have a built-in screen or the ability to take direct user interaction is part of the Internet of Things. Smartphones or general-purpose computers would not be part of the Internet of Things because they have traditional input/output devices like a screen and keyboard.
-
Question 6 of 10
6. Question
The triad is a set of three attributes or properties that define what security is. The three elements are confidentiality, integrity, and availability. In 1998, Donn Parker extended the initial three properties by adding three more; it is called the Parkerian Hexad. What are the properties included in the Parkerian Hexad?
Correct
The Parkerian Hexad is a security model made up of six security attribute elements, originally proposed by Donn Parker in 1998.
It includes the following: Confidentiality, Integrity, Availability, Possession, Authenticity, and Utility.Incorrect
The Parkerian Hexad is a security model made up of six security attribute elements, originally proposed by Donn Parker in 1998.
It includes the following: Confidentiality, Integrity, Availability, Possession, Authenticity, and Utility. -
Question 7 of 10
7. Question
Security devices and system-level mechanisms are some of the elements needed to create a complete defense of an enterprise. Organizations must also create policies, guidelines, standards, and procedures to ensure the security of an enterprise. Which of the following statements best defines guidelines?
Correct
Guidelines are suggestions on how policies may be implemented. A guideline may provide information about best practices, with the hope that the best practices may be followed.
Incorrect
Guidelines are suggestions on how policies may be implemented. A guideline may provide information about best practices, with the hope that the best practices may be followed.
-
Question 8 of 10
8. Question
The purpose of an intrusion detection system (IDS) is to inform information security professionals that a network intrusion may be taking place. Alerting information will generally include information about the source address of the intrusion. the target address, and the type of attack that is suspected. There are two different types of IDS: host-based IDS and network IDS. Which of the following sentences is true about network IDS?
Correct
A network IDS is a system that analyzes incoming network traffic that passes by the network interface. Firewalls have the ability to block or allow packets in the network stream; a network IDS can take some of the same rules and generate log messages.
Incorrect
A network IDS is a system that analyzes incoming network traffic that passes by the network interface. Firewalls have the ability to block or allow packets in the network stream; a network IDS can take some of the same rules and generate log messages.
-
Question 9 of 10
9. Question
The first step in a penetration test is gathering intelligence on the target. While there are ways and means to do this covertly, intelligence gathering usually starts with scraping information from public sources, collectively known as Open Source Intelligence (OSINT). One of the useful tools in gathering OSINT is the Pipl tool. Which of the following sentences best describes the Pipl tool?
Correct
Pipl is a free search tool that can be used to identify an online presence for someone. Pipl turns up a good number of addresses, phone numbers, along with links to public records, online mentions, and other useful pieces of information. It also has the ability to search within a specific city, state, or zip code. If you know the geographic location of the person in question, you’ll be able to narrow down the results in that area.
Incorrect
Pipl is a free search tool that can be used to identify an online presence for someone. Pipl turns up a good number of addresses, phone numbers, along with links to public records, online mentions, and other useful pieces of information. It also has the ability to search within a specific city, state, or zip code. If you know the geographic location of the person in question, you’ll be able to narrow down the results in that area.
-
Question 10 of 10
10. Question
The Domain Name System (DNS) is also referred to as the phonebook of the internet. It is the internet’s system for converting alphabetic names into numeric IP addresses. One of the useful tools in conducting a DNS lookup is the host tool. Which of the following statements best describes the host tool?
Correct
The host tool is the easiest DNS lookup tool to use. This is a program that you will find on most Unix-like systems, including Linux Systems. If you don’t have it installed by default, you can probably get it installed. Using it is very straightforward; you just need to pass the hostname and you will get a response.
Incorrect
The host tool is the easiest DNS lookup tool to use. This is a program that you will find on most Unix-like systems, including Linux Systems. If you don’t have it installed by default, you can probably get it installed. Using it is very straightforward; you just need to pass the hostname and you will get a response.