Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Domain Name System (DNS) translates domain names into IP addresses, allowing you to access an internet location by its domain name. Several tools can be used to conduct a DNS lookup, one of which is the dnsrecon tool. Which of the following statements best describes the dnsrecon tool?
Correct
The dnsrecon tool can be used to do a brute force scan and to extract some of the common resource records in DNS. It can also be used to identify hostnames as a result of repeated requests based on a wordlist provided to the program.
Incorrect
The dnsrecon tool can be used to do a brute force scan and to extract some of the common resource records in DNS. It can also be used to identify hostnames as a result of repeated requests based on a wordlist provided to the program.
-
Question 2 of 10
2. Question
Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the systems. P0f is one of the useful tools for conducting passive reconnaissance. Which of the following sentences defines p0f?
Correct
P0f can watch the network headers as they go by, from the layer 3 headers to the application headers, making observations as the traffic passes. Unfortunately, it wasn’t as useful as it once was because web servers are generally encrypting traffic by default, which means p0f can’t watch the HTTP headers, identify the server, and other useful information.
Incorrect
P0f can watch the network headers as they go by, from the layer 3 headers to the application headers, making observations as the traffic passes. Unfortunately, it wasn’t as useful as it once was because web servers are generally encrypting traffic by default, which means p0f can’t watch the HTTP headers, identify the server, and other useful information.
-
Question 3 of 10
3. Question
Google hacking, also called as Google Dorking is an information-gathering technique used by an attacker leveraging advanced Google searching techniques. What tool can you use if you want to search for terms that have been found to reveal sensitive data exposed by vulnerable servers and web applications?
Correct
The Google Hacking Database (https://www.exploit-db.com/google-hacking-database/) contains search terms that have been found to reveal sensitive data exposed by vulnerable servers and web applications. It stores search terms in several categories, including footholds, vulnerable files, error messages, and sensitive directories.
Incorrect
The Google Hacking Database (https://www.exploit-db.com/google-hacking-database/) contains search terms that have been found to reveal sensitive data exposed by vulnerable servers and web applications. It stores search terms in several categories, including footholds, vulnerable files, error messages, and sensitive directories.
-
Question 4 of 10
4. Question
A ping sweep is a technique used to identify if the hosts are alive in the networks using their IP addresses. Many tools can perform a ping sweep; one of the common ones is MegaPing. Which of the following statements best defines MegaPing?
Correct
MegaPing is a GUI-based tool that runs under Windows. It incorporates several functions into a single interface. The ping sweep can be accomplished using the IP scanner tool, which you would select from the list on the left-hand side of the application.
Incorrect
MegaPing is a GUI-based tool that runs under Windows. It incorporates several functions into a single interface. The ping sweep can be accomplished using the IP scanner tool, which you would select from the list on the left-hand side of the application.
-
Question 5 of 10
5. Question
Transmission Control Protocol (TCP) scanning is the most detailed and complex type of port scanning. There are different types of TCP scans that Nmap can perform, one of which is the Xmas scan. Which of the following sentences best describes the Xmas scan?
Correct
In a Xmas scan, the packets being sent have the FIN, PSH, and URG flags set, which makes the packet look lit up like a Christmas tree. There are no indications about open ports here. Instead, Nmap is telling us that the port is either open or filtered. If the port is closed, the system responds with an RST while open ports don’t respond at all because this is not a legal packet from the perspective of the protocol.
Incorrect
In a Xmas scan, the packets being sent have the FIN, PSH, and URG flags set, which makes the packet look lit up like a Christmas tree. There are no indications about open ports here. Instead, Nmap is telling us that the port is either open or filtered. If the port is closed, the system responds with an RST while open ports don’t respond at all because this is not a legal packet from the perspective of the protocol.
-
Question 6 of 10
6. Question
In UDP scanning, Nmap sends out UDP messages and then watches whatever responses may come back. The expectation is that if a port is closed, the system will respond with an ICMP port unreachable message. If a port is open, the service may respond with something, or it may just not respond at all. If you want to avoid detection, how will you set the throttle rate in a UDP scan?
Correct
By default, the throttle rate is set at 3, which is a common rate of message transmission. If you want it faster, you go up to 5. If you want it to go slower, potentially to avoid detection, you can turn it down to 1.
Incorrect
By default, the throttle rate is set at 3, which is a common rate of message transmission. If you want it faster, you go up to 5. If you want it to go slower, potentially to avoid detection, you can turn it down to 1.
-
Question 7 of 10
7. Question
Encryption is the process of converting data to an unrecognizable or encrypted form. It is commonly used to protect sensitive information so that only authorized parties can view it. There are several programs ethical hackers can use to try to break encrypted protocols, one of which is the sslstrip. Which of the following statements best describes the sslstrip program?
Correct
The sslstrip program was developed to grab SSL messages and strip the encryption from them. This program was developed by Moxie Marlinspike in conjunction with a presentation he made at Black Hat in 2009. This program has less of a likelihood of success because the vulnerabilities that allowed it to work have been resolved
Incorrect
The sslstrip program was developed to grab SSL messages and strip the encryption from them. This program was developed by Moxie Marlinspike in conjunction with a presentation he made at Black Hat in 2009. This program has less of a likelihood of success because the vulnerabilities that allowed it to work have been resolved
-
Question 8 of 10
8. Question
A port scanner is an application designed to probe a server or host for open ports. Such an application may be used by administrators to verify the security policies of their networks and by attackers to identify network services running on a host and exploit vulnerabilities. Zenmap is one of the effective tools used in scanning ports. Which of the following statements best defines Zenmap?
Correct
Zenmap was created to be the GUI version of Nmap. One useful capability of Zenmap is its ability to save and compare two saved scans. This means you can get a baseline of a network and then check it again later to see what may have changed. It also saves scans in XML format, which is a text-based format.
Incorrect
Zenmap was created to be the GUI version of Nmap. One useful capability of Zenmap is its ability to save and compare two saved scans. This means you can get a baseline of a network and then check it again later to see what may have changed. It also saves scans in XML format, which is a text-based format.
-
Question 9 of 10
9. Question
Vulnerability scanners are automated tools that allow organizations to check if their network, systems, and applications have security weaknesses that could expose them to attacks. An example of this is the Security Analysis Tool for Auditing Networks (SATAN). Which of the following sentences describes SATAN?
Correct
Security Analysis Tool for Auditing Networks (SATAN) is developed by Dan Farmer and Wietse Venema in 1995. It is an open-source tool wherein its functionality can be extended by adding in modules. It was written primarily in Perl and used a web interface.
Incorrect
Security Analysis Tool for Auditing Networks (SATAN) is developed by Dan Farmer and Wietse Venema in 1995. It is an open-source tool wherein its functionality can be extended by adding in modules. It was written primarily in Perl and used a web interface.
-
Question 10 of 10
10. Question
Interprocess communication is the mechanism provided by the operating system that allows processes to communicate with each other. This communication could involve a process allowing another process to know that some events have occurred or the transferring of data from one process to another. There have been several implementations of request-response protocols over the years; one example of this is the Common Object Request Broker Architecture (CORBA). Which of the following sentences defines CORBA?
Correct
Common Object Request Broker Architecture (CORBA) is a standard developed by the Object Management Group (OMG) to provide interoperability among distributed objects. It is the world’s leading middleware solution enabling the exchange of information, independent of hardware platforms, programming languages, and operating systems.
Incorrect
Common Object Request Broker Architecture (CORBA) is a standard developed by the Object Management Group (OMG) to provide interoperability among distributed objects. It is the world’s leading middleware solution enabling the exchange of information, independent of hardware platforms, programming languages, and operating systems.