Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Passive reconnaissance is an important tool for penetration testing and the beginning point of many data breaches. It involves gathering available public information that could be used to compromise the organization. One of the useful tools for conducting passive reconnaissance is the recon tool. Which of the following sentences best defines a recon tool?
Correct
Recon is a plug-in or extension for Chrome. It provides a context menu when you right-click on a link on a page. The recon menu gives you quick access to look up information about the link or word you have selected. You can also get the translation of words, do package tracking, search video sites, and perform several other quick searches where your selection is passed into the site you have selected from the menu.
Incorrect
Recon is a plug-in or extension for Chrome. It provides a context menu when you right-click on a link on a page. The recon menu gives you quick access to look up information about the link or word you have selected. You can also get the translation of words, do package tracking, search video sites, and perform several other quick searches where your selection is passed into the site you have selected from the menu.
-
Question 2 of 10
2. Question
Web applications are a common point of attack for adversaries who want to gather website intelligence. Several tools can be used in gathering website intelligence, one of which is the Wapplyzer plug-in. Which of the following sentences best describes the Wapplyzer plug-in?
Correct
Wapplyzer is a plug-in that can be added to both Chrome and Firefox. When you visit a website, it provides a list of technologies it identifies, including web servers, programming networks, ad networks, and tracking technology.
Incorrect
Wapplyzer is a plug-in that can be added to both Chrome and Firefox. When you visit a website, it provides a list of technologies it identifies, including web servers, programming networks, ad networks, and tracking technology.
-
Question 3 of 10
3. Question
Ping sweep tools can be useful in auditing networks, helping you identify inactive IP addresses, and determining which IP addresses map to live hosts in a DHCP environment. One of the most common tools that can perform a ping sweep is fping. Which of the following statements best defines fping?
Correct
Fping uses the Internet Control Message Protocol (ICMP) echo request to determine if a target host is responding. It differs from ping in that you can specify any number of targets on the command line or specify a file containing the lists of targets to ping.
Incorrect
Fping uses the Internet Control Message Protocol (ICMP) echo request to determine if a target host is responding. It differs from ping in that you can specify any number of targets on the command line or specify a file containing the lists of targets to ping.
-
Question 4 of 10
4. Question
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are transport protocols. TCP is more commonly used in port scanning and provides connection-oriented communication while UDP is a non-connection-oriented protocol that is sometimes used with services for which speed of transmission is more important than data integrity. There are different types of TCP scans that Nmap can perform, one of which is the FIN scan. Which of the following sentences best describes the FIN scan?
Correct
The FIN scan sends a packet with the FIN flag set without first establishing a connection with the target. If an RST packet is received from the target due to the way the RFC is written, the port is considered closed. If no packet is received at all, the port is considered open.
Incorrect
The FIN scan sends a packet with the FIN flag set without first establishing a connection with the target. If an RST packet is received from the target due to the way the RFC is written, the port is considered closed. If no packet is received at all, the port is considered open.
-
Question 5 of 10
5. Question
The objective of performing a vulnerability scan is to create an overview of the security risks to a network and then use that overview as a guideline to resolve those threats. One of the useful tools in vulnerability scanning is the Security Auditors Research Assistant (SARA). Which of the following sentences describes SARA?
Correct
Security Auditors Research Assistant (SARA) is a network analysis tool for finding vulnerabilities in your network. It reports its findings via an integrated web server by running an analysis against its dictionary, which uses the Common Vulnerabilities and Exposure (CVE) dictionary.
Incorrect
Security Auditors Research Assistant (SARA) is a network analysis tool for finding vulnerabilities in your network. It reports its findings via an integrated web server by running an analysis against its dictionary, which uses the Common Vulnerabilities and Exposure (CVE) dictionary.
-
Question 6 of 10
6. Question
Packet crafting is the process of manually creating or editing the existing data packets on a network to test network devices. Hackers and network administrators use this process to test a network, check firewall rules, find entry points and test the network device’s behaviors. The packETH tool is one of the useful tools in crafting or otherwise manipulating the header data. Which of the following descriptions best defines a packETH tool?
Correct
The packETH tool is a GUI and CLI packet generator tool for ethernet. It allows you to create and send any possible packet or sequence of packets on the ethernet link. It is very simple to use, powerful and supports many adjustments of parameters while sending.
Incorrect
The packETH tool is a GUI and CLI packet generator tool for ethernet. It allows you to create and send any possible packet or sequence of packets on the ethernet link. It is very simple to use, powerful and supports many adjustments of parameters while sending.
-
Question 7 of 10
7. Question
Organizations have security mechanisms in place to defend themselves from intruders; this may be firewalls, intrusion detection systems, or intrusion prevention systems. Fortunately, some evasion techniques may help you get around these devices. What is this evasion technique wherein attackers use encryption to disguise what they are doing?
Correct
Hiding/Obscuring the data is an evasion technique wherein attackers use encryption to disguise what they are doing. Encrypted traffic can’t be investigated without violating the end-to-end nature of encryption. The goal with encryption is that the message is encrypted from the sender to the recipient without being decrypted at waypoints in between.
Incorrect
Hiding/Obscuring the data is an evasion technique wherein attackers use encryption to disguise what they are doing. Encrypted traffic can’t be investigated without violating the end-to-end nature of encryption. The goal with encryption is that the message is encrypted from the sender to the recipient without being decrypted at waypoints in between.
-
Question 8 of 10
8. Question
The goal of enumeration is to get a complete picture of the target. In this phase, a penetration tester tries to identify valid user accounts or poorly-protected shared resources using active connections to systems. There are several protocols and tools that you would use during enumeration, one of which is the Simple Network Management Protocol (SNMP). Which of the following statements best defines SNMP?
Correct
Simple Network Management Protocol (SNMP) is a protocol used for exchanging device management information between network devices on a TCP/IP network. It is most often used for collecting statistical and configuration information about network devices such as computers, hubs, switches, routers, and even network printers.
Incorrect
Simple Network Management Protocol (SNMP) is a protocol used for exchanging device management information between network devices on a TCP/IP network. It is most often used for collecting statistical and configuration information about network devices such as computers, hubs, switches, routers, and even network printers.
-
Question 9 of 10
9. Question
Malware analysis is a study or process of determining the functionality, origin, and potential impact of a given malware. Several tools can be used in conducting malware analysis, one of which is the OllyDbg tool. Which of the following statements is true about OllyDbg?
Correct
OllyDbg is an x86 debugger that emphasizes binary code analysis, which is useful when source code is not available. It traces registers, recognizes procedures, API calls, switches, tables, constants, and strings, as well as locates routines from object files and libraries. It has a user-friendly interface, and its functionality can be extended by third-party plugins.
Incorrect
OllyDbg is an x86 debugger that emphasizes binary code analysis, which is useful when source code is not available. It traces registers, recognizes procedures, API calls, switches, tables, constants, and strings, as well as locates routines from object files and libraries. It has a user-friendly interface, and its functionality can be extended by third-party plugins.
-
Question 10 of 10
10. Question
Packet capture is a computer networking term for intercepting a data packet that is crossing or moving over a specific computer network. Once a packet is captured, it is stored temporarily so that it can be analyzed. One valuable tool used in packet capturing is the Berkeley Packet Filter (BPF). Which of the following sentences best defines BPF?
Correct
The Berkeley Packet Filter (BPF) is an interface to the Data Link layer of a system. It is used across many systems and applications, including tcdump, tshark, and Wireshark. It was developed in 1992, and its main task is to filter data packets from networks and embed them in the kernel. The BPF provides an interface with security layers for data content or programs. The security layers are responsible for ensuring reliable transmission of data packets and regulating access to these packets.
Incorrect
The Berkeley Packet Filter (BPF) is an interface to the Data Link layer of a system. It is used across many systems and applications, including tcdump, tshark, and Wireshark. It was developed in 1992, and its main task is to filter data packets from networks and embed them in the kernel. The BPF provides an interface with security layers for data content or programs. The security layers are responsible for ensuring reliable transmission of data packets and regulating access to these packets.