Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Wireless encryption secures your wireless network with an authentication protocol. It requires a password or network key when a user or device tries to connect. If your wireless network isn’t secure, unauthorized users could access your network and obtain personal information or use your internet connection for malicious or illegal activity. Several types of wireless encryption are commonly supported on most Wi-Fi enables devices, one of which is the Wi-Fi Protected Access (WPA). Which of the following sentences is true about WPA?
Correct
The Wi-Fi Protected Access (WPA) is a security protocol designed to create secure wireless networks. It introduced the Temporal Key Integrity Protocol (TKIP), which dynamically changes the key that the systems use. This prevents intruders from creating their own encryption key to match the one used by the secure network. WPA also implements something called the Extensible Authentication Protocol (EAP) for authorizing users. Instead of authorizing computers based on solely their MAC address, WPA can use several other methods to verify each computer’s identity. This makes it more difficult for unauthorized systems to gain access to the wireless network.
Incorrect
The Wi-Fi Protected Access (WPA) is a security protocol designed to create secure wireless networks. It introduced the Temporal Key Integrity Protocol (TKIP), which dynamically changes the key that the systems use. This prevents intruders from creating their own encryption key to match the one used by the secure network. WPA also implements something called the Extensible Authentication Protocol (EAP) for authorizing users. Instead of authorizing computers based on solely their MAC address, WPA can use several other methods to verify each computer’s identity. This makes it more difficult for unauthorized systems to gain access to the wireless network.
-
Question 2 of 10
2. Question
Several companies have policies that allow employees to use their own devices on enterprise networks. This policy is referred to as bring your own device (BYOD). A company that practices the BYOD policy may not have a form of network access control (NAC). Which of the following statements defines NAC?
Correct
A network access control (NAC) can restrict which devices can connect to an organization’s wireless networks. They can do this by blocking the MAC address to prevent anyone, not on the white list from even getting to the point of user-level authentication.
Incorrect
A network access control (NAC) can restrict which devices can connect to an organization’s wireless networks. They can do this by blocking the MAC address to prevent anyone, not on the white list from even getting to the point of user-level authentication.
-
Question 3 of 10
3. Question
The objective of social engineering is to convince or manipulate someone into doing something they wouldn’t normally do for someone they don’t know. An example of successful social engineering is the circulation of the I Love You virus. Which of the following sentences is true about the I Love You virus?
Correct
The I Love You virus is a computer worm that infected over ten million Windows personal computers on and after May 4, 2000. Before the virus could run, someone had to be convinced to open the mail and then run the script that was contained in the message. The subject line used is ILOVEYOU. The message directs you to open the attached “text” file.
Incorrect
The I Love You virus is a computer worm that infected over ten million Windows personal computers on and after May 4, 2000. Before the virus could run, someone had to be convinced to open the mail and then run the script that was contained in the message. The subject line used is ILOVEYOU. The message directs you to open the attached “text” file.
-
Question 4 of 10
4. Question
Badge access is a credential used to gain entry to an area having automated access control entry points. Entry points may be doors, turnstiles, parking gates, or other barriers. There are problems with this approach, as attackers can sometimes bypass these door locking devices that allow them to gain access to a building. One of the techniques to bypass door locking devices is to use near-field communication (NFC) technology. Which of the following statements defines NFC?
Correct
The near-field communication (NFC) technology is a set of communication protocols for communication between two electronic devices over a distance of 4cm or less. It can also act as electronic identity documents and keycards. It may also be possible to clone an RFID card using the NFC technology on your phone. In fact, some hotels are starting to make use of that technology to allow you to use your phone to unlock doors.
Incorrect
The near-field communication (NFC) technology is a set of communication protocols for communication between two electronic devices over a distance of 4cm or less. It can also act as electronic identity documents and keycards. It may also be possible to clone an RFID card using the NFC technology on your phone. In fact, some hotels are starting to make use of that technology to allow you to use your phone to unlock doors.
-
Question 5 of 10
5. Question
Port mirroring is used on a network switch to send a copy of network packets seen on one switch port to a networking monitoring connection on another switch port. What feature can you use if you want to mirror ports on Cisco switches?
Correct
The Switched Port Analyzer (SPAN) is an open-source mirroring device on Cisco switches. It runs as a VLAN filtering and traffic monitoring system to keep track of the port activity within your network. Although, as free open-source software, SPAN is supported by a resourceful online help desk made up of Cisco users, its capabilities are far less broad than more sophisticated closed-source monitors.
Incorrect
The Switched Port Analyzer (SPAN) is an open-source mirroring device on Cisco switches. It runs as a VLAN filtering and traffic monitoring system to keep track of the port activity within your network. Although, as free open-source software, SPAN is supported by a resourceful online help desk made up of Cisco users, its capabilities are far less broad than more sophisticated closed-source monitors.
-
Question 6 of 10
6. Question
Address Resolution Protocol (ARP) spoofing, also known as ARP poisoning, is a Man-in-the-Middle (MitM) attack that allows attackers to intercept communication between network devices. One of the effective tools in conducting ARP spoofing that has multiple uses, in fact, is Ettercap. Which of the following statements is true about Ettercap?
Correct
Ettercap is a free and open-source network security tool that has two modes: console-based mode and a GUI-based mode. It is capable of intercepting traffic on a network segment, capturing passwords, and conducting active eavesdropping against a number of common protocols. It works by putting the network interface into promiscuous mode and by ARP poisoning the target machines.
Incorrect
Ettercap is a free and open-source network security tool that has two modes: console-based mode and a GUI-based mode. It is capable of intercepting traffic on a network segment, capturing passwords, and conducting active eavesdropping against a number of common protocols. It works by putting the network interface into promiscuous mode and by ARP poisoning the target machines.
-
Question 7 of 10
7. Question
An Internet Protocol (IP) address is a unique address that identifies a device on the Internet or a local network. It allows a system to be recognized by other systems connected via the Internet Protocol. There are two primary types of IP address formats used today: Internet Protocol version 4 and Internet Protocol version 6. Which of the following statements is true about IPv4?
Correct
Internet Protocol version 4 (IPv4) is the fourth revision of the Internet Protocol and a widely used protocol in data communication over different kinds of networks. It uses 32-bit addresses for Ethernet communication in five classes: A, B, C, D, and E. Classes A, B, and C have a different bit length for addressing the network host. Class D addresses are reserved for multicasting, while class E addresses are reserved for future use.
Incorrect
Internet Protocol version 4 (IPv4) is the fourth revision of the Internet Protocol and a widely used protocol in data communication over different kinds of networks. It uses 32-bit addresses for Ethernet communication in five classes: A, B, C, D, and E. Classes A, B, and C have a different bit length for addressing the network host. Class D addresses are reserved for multicasting, while class E addresses are reserved for future use.
-
Question 8 of 10
8. Question
A computer network is a group of computers that use a set of communication protocols over digital interconnections to share resources located on or provided by the network nodes. Computer networks can be categorized based on their functionality, geography, ownership, and communication media used. Wide Area Network (WAN) is a type of computer network based on the geographical area. Which of the following sentences is true about WAN?
Correct
A Wide Area Network (WAN) is a network whose nodes are more than 10 or so miles apart. There are several ways to provide that sort of connectivity between geographically dispersed locations, including virtual private networks, private network circuits, or just tunneling traffic without encrypting it as a virtual private network would do.
Incorrect
A Wide Area Network (WAN) is a network whose nodes are more than 10 or so miles apart. There are several ways to provide that sort of connectivity between geographically dispersed locations, including virtual private networks, private network circuits, or just tunneling traffic without encrypting it as a virtual private network would do.
-
Question 9 of 10
9. Question
The Open System Interconnection (OSI) model is consists of seven layers, and each layer performs a particular network function. Which of the following statements defines the Presentation layer in the OSI model?
Correct
The Presentation layer is the sixth layer in the Open System Interconnection (OSI) model. It is responsible for preparing data for the Application layer. It makes sure that the data is handed up to the application is in the right format so it can be consumed. When systems are communicating, there may be disconnects in formatting between the two endpoints, and the Presentation layer makes sure that data is formatted correctly.
Incorrect
The Presentation layer is the sixth layer in the Open System Interconnection (OSI) model. It is responsible for preparing data for the Application layer. It makes sure that the data is handed up to the application is in the right format so it can be consumed. When systems are communicating, there may be disconnects in formatting between the two endpoints, and the Presentation layer makes sure that data is formatted correctly.
-
Question 10 of 10
10. Question
A penetration test is an attempt to evaluate the security of an IT infrastructure by trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configuration, or risky end-user behavior. The pen test is consists of five phases. Which of the following sentences best describes the scanning and enumeration phase?
Correct
The scanning and enumeration phase is the second phase in ethical hacking. It involves identifying systems that are accessible within the network blocks. It also involves identifying services running on any available host. The objective of this phase is to gather as much information as you can to have starting points for when you move into the next phase. This phase can be time-consuming, especially as the size of the networks you are working with grows.
Incorrect
The scanning and enumeration phase is the second phase in ethical hacking. It involves identifying systems that are accessible within the network blocks. It also involves identifying services running on any available host. The objective of this phase is to gather as much information as you can to have starting points for when you move into the next phase. This phase can be time-consuming, especially as the size of the networks you are working with grows.