Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
The Open Systems Interconnection (OSI) model is created by the International Organization for Standardization to help refer to boundaries between functions within a network stack. It is consists of seven layers. Which of the following statements defines the transport layer in the OSI model?
Correct
The transport layer is the fourth layer in the open system interconnection (OSI) model. It takes care of segmenting messages for transmission and provides logical communication between application processes running on different hosts within a layered architecture of protocols and other network components.
Incorrect
The transport layer is the fourth layer in the open system interconnection (OSI) model. It takes care of segmenting messages for transmission and provides logical communication between application processes running on different hosts within a layered architecture of protocols and other network components.
-
Question 2 of 10
2. Question
Internet Protocol (IP) provides a standard set of rules for sending and receiving data over the Internet. Several headers are defined for IP, one of which is the checksum header. Which of the following sentences defines the checksum header?
Correct
The checksum header is a 16-bit value that is used to determine whether the header is intact. It is defined as a 1’s complement sum of the 16-bit words in the header.
Incorrect
The checksum header is a 16-bit value that is used to determine whether the header is intact. It is defined as a 1’s complement sum of the 16-bit words in the header.
-
Question 3 of 10
3. Question
The configuration of a network is the key to determine its performance. It is the way a network is arranged, including the physical or logical description of how links and nodes are set up to relate to each other. There are numerous ways a network can be arranged, one of which is the mesh topology. Which of the following descriptions defines a mesh topology?
Correct
In a mesh topology, systems are wired directly to one another. This topology setup allows for most transmissions to be distributed even if one of the connections goes down. It is a topology commonly used for wireless networks.
Incorrect
In a mesh topology, systems are wired directly to one another. This topology setup allows for most transmissions to be distributed even if one of the connections goes down. It is a topology commonly used for wireless networks.
-
Question 4 of 10
4. Question
An Internet Protocol (IP) address is an identifier for a computer or device on a TCP/IP network. There are two versions of IP that currently coexist in the global internet: Internet Protocol version 4 and Internet Protocol version 6. Which of the following statements is true about IPv4?
Correct
Internet Protocol version 4 (IPv4) is the most widely used version of the Internet Protocol. It uses 4 octets and 32-bit addresses for ethernet communication in five classes: A, B, and C have a different bit length for addressing the network host. Class D addresses are reserved for multicasting, while class E addresses are reserved for future use.
Incorrect
Internet Protocol version 4 (IPv4) is the most widely used version of the Internet Protocol. It uses 4 octets and 32-bit addresses for ethernet communication in five classes: A, B, and C have a different bit length for addressing the network host. Class D addresses are reserved for multicasting, while class E addresses are reserved for future use.
-
Question 5 of 10
5. Question
Cloud computing is the process of storing and accessing data and programs over the internet instead of your computer’s hard drive. Cloud computing services come in different forms, one of which is the Platform as a Service (PaaS). Which of the following statements best describes PaaS?
Correct
Platform as a Service (PaaS) delivers a framework for developers that they can build upon and use to create customized applications. All servers, storage, and networking can be managed by the enterprise or a third-party provider while the developers can maintain the management of the applications.
Incorrect
Platform as a Service (PaaS) delivers a framework for developers that they can build upon and use to create customized applications. All servers, storage, and networking can be managed by the enterprise or a third-party provider while the developers can maintain the management of the applications.
-
Question 6 of 10
6. Question
A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. Which of the following statements is true about application layer firewalls?
Correct
Application layer firewalls are devices that can make decisions based on what is happening in the application layer protocol and then have the ability to drop the message. Examples of this firewall include Session Border Controllers (SBC) and Web Application Firewall (WAF).
Incorrect
Application layer firewalls are devices that can make decisions based on what is happening in the application layer protocol and then have the ability to drop the message. Examples of this firewall include Session Border Controllers (SBC) and Web Application Firewall (WAF).
-
Question 7 of 10
7. Question
An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. There are two different types of IDS: host-based IDS and network IDS. Which of the following sentences is true about host-based IDS?
Correct
A host-based intrusion detection system (IDS) watches activity on a local system, such as changes to a critical system. It also monitors the log files generated by your applications, creating a historical record of activities, and functions allowing you to quickly search them for anomalies and signs that an intrusion may have occurred.
Incorrect
A host-based intrusion detection system (IDS) watches activity on a local system, such as changes to a critical system. It also monitors the log files generated by your applications, creating a historical record of activities, and functions allowing you to quickly search them for anomalies and signs that an intrusion may have occurred.
-
Question 8 of 10
8. Question
Syslog protocol is a logging protocol that began as the logging mechanism for the Simple Mail Transfer Protocol (SMTP) server Sendmail. It not only has an easy-to-understand syntax in the creation and reading of messages; it also can be used for remote logging, as well as local logging. If you’re using a Windows system, which folder are the log messages sent?
Correct
On Windows systems, log messages are sent to the event subsystem. Instead of the text-based messages that syslog uses, the event subsystem uses a binary storage system. An advantage of the way the event subsystem stores data is that it can be queried as though it were a database.
Incorrect
On Windows systems, log messages are sent to the event subsystem. Instead of the text-based messages that syslog uses, the event subsystem uses a binary storage system. An advantage of the way the event subsystem stores data is that it can be queried as though it were a database.
-
Question 9 of 10
9. Question
Security professionals use Open Source Intelligence (OSINT) to identify potential weaknesses in friendly networks so that they can be remediated before they are exploited by threat actors. One of the useful tools in gathering OSINT is the InSpy tool. Which of the following sentences best describes the InSpy tool?
Correct
InSpy is a Python-based LinkedIn enumeration tool with two functionalities: TechSpy and EmpSpy. TechSpy crawls LinkedIn job listings for technologies used by the target company while EmpSpy attempts to identify technologies by matching job descriptions to keywords from a newline-delimited file.
Incorrect
InSpy is a Python-based LinkedIn enumeration tool with two functionalities: TechSpy and EmpSpy. TechSpy crawls LinkedIn job listings for technologies used by the target company while EmpSpy attempts to identify technologies by matching job descriptions to keywords from a newline-delimited file.
-
Question 10 of 10
10. Question
Several organizations govern the internet when it comes to domains and addresses. One of these organizations is the Internet Assigned Numbers Authority (IANA). Which of the following statements defines IANA?
Correct
Internet Assigned Numbers Authority (IANA) is an operating unit of the Internet Corporation for Assigned Names and Numbers (ICANN). It maintains the top-level domain, IP address, and protocol number databases. It also keeps authoritative records, but it has no jurisdiction over internet activity and does not resolve address conflicts.
Incorrect
Internet Assigned Numbers Authority (IANA) is an operating unit of the Internet Corporation for Assigned Names and Numbers (ICANN). It maintains the top-level domain, IP address, and protocol number databases. It also keeps authoritative records, but it has no jurisdiction over internet activity and does not resolve address conflicts.