Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Which of the following is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code?
Correct
A computer program which is injected through external source when executed, it replicates itself or made a number of copies of itself by modifying, executing or creating other computer programs and also inserting its own code is defined as a computer virus. If this replication succeeds, the affected areas are called “infected” with a computer virus.
Incorrect
A computer program which is injected through external source when executed, it replicates itself or made a number of copies of itself by modifying, executing or creating other computer programs and also inserting its own code is defined as a computer virus. If this replication succeeds, the affected areas are called “infected” with a computer virus.
-
Question 2 of 10
2. Question
A standalone malware computer program doesn’t require any assistance from the user. It replicates itself to spread to other computers is the definition for which of the following?
Correct
A computer worm is defined as a standalone malware computer program just like a virus which also replicates itself in order to spread to other computers. The question on our mind is how it spread, the answer is simply it spread by using a computer network. A computer worm use the machine on which it developed and further it scans the network to infect other computers on that network, once it infects the other computer, then the same process begins. Contrary to computer virus, It doesn’t require any assistance from the user.
Incorrect
A computer worm is defined as a standalone malware computer program just like a virus which also replicates itself in order to spread to other computers. The question on our mind is how it spread, the answer is simply it spread by using a computer network. A computer worm use the machine on which it developed and further it scans the network to infect other computers on that network, once it infects the other computer, then the same process begins. Contrary to computer virus, It doesn’t require any assistance from the user.
-
Question 3 of 10
3. Question
It is a particular type of virus. Which of the following is any malware which misleads users of its true intent?
Correct
A trojan is a malware which appears to be something benign (Look like it is a benefit for the computer), often something you believe you know. Instead, it eventually infects your system. Because it expects that a user is to be involved, running a program they believe to be something other than the malware it actually is, a Trojan is just a particular type of virus.
Incorrect
A trojan is a malware which appears to be something benign (Look like it is a benefit for the computer), often something you believe you know. Instead, it eventually infects your system. Because it expects that a user is to be involved, running a program they believe to be something other than the malware it actually is, a Trojan is just a particular type of virus.
-
Question 4 of 10
4. Question
Which of the following is a program that encrypts a portion of a victim’s hard drive, where personal files are stored? Moreover, the attacker provides instructions for the victim to send money for decryption of the imported document.
Correct
Ransomware is another type of malware. As we know the purpose or the meaning of Ransome is a crime (especially kidnapping) for money. In the same sense, the goal of ransomware (in the computer language) is to extort money from a victim. Ransomware is a program that encrypts the personal and important files of victims. It may be important business documents, It may be important passwords. After encrypting the files the attacker wants money from the victim by using some instruction.
Incorrect
Ransomware is another type of malware. As we know the purpose or the meaning of Ransome is a crime (especially kidnapping) for money. In the same sense, the goal of ransomware (in the computer language) is to extort money from a victim. Ransomware is a program that encrypts the personal and important files of victims. It may be important business documents, It may be important passwords. After encrypting the files the attacker wants money from the victim by using some instruction.
-
Question 5 of 10
5. Question
Which of the following is an automated malware analysis tool?
Correct
Cuckoo Sandbox is known as an automated malware analysis tool which handles starting up a Virtual Machine, injecting the malware into it. After that, it performs some analysis on files, the Registry, network connections, process actions, and memory. Cuckoo Sandbox is freely available software. It uses Python (the language) for managing the VM and the reporting.
Incorrect
Cuckoo Sandbox is known as an automated malware analysis tool which handles starting up a Virtual Machine, injecting the malware into it. After that, it performs some analysis on files, the Registry, network connections, process actions, and memory. Cuckoo Sandbox is freely available software. It uses Python (the language) for managing the VM and the reporting.
-
Question 6 of 10
6. Question
Antivirus typically uses known properties of malware to identify it. This may be a hash of the malware. How can we generate a different hash for malware to fool antivirus?
Correct
It should be noted that an antivirus typically uses the known properties of malware which is easy to identify it. This may be a hash of the malware. Changing a single byte is enough for the malware to generate a different hash. That single byte change will result in a completely different hash.
Incorrect
It should be noted that an antivirus typically uses the known properties of malware which is easy to identify it. This may be a hash of the malware. Changing a single byte is enough for the malware to generate a different hash. That single byte change will result in a completely different hash.
-
Question 7 of 10
7. Question
Each layer of the Open Systems Interconnection (OSI) model has a different name for the chunk of data associated with it. This is called the protocol data unit (PDU). What do we call PDU in Layer 2?
Correct
The name for the bunch of data associated with each layer of the Open Systems Interconnection (OSI) model has a different name. It is the exact definition of the protocol data unit (PDU). At layer 3, the PDU is called a packet. Layer 3 is also called the IP layer. At layer 2, where we are snatching/grasping the messages from the network as it includes the layer 2 headers with MAC addresses of the equipment, then this PDU is known as a frame.
Incorrect
The name for the bunch of data associated with each layer of the Open Systems Interconnection (OSI) model has a different name. It is the exact definition of the protocol data unit (PDU). At layer 3, the PDU is called a packet. Layer 3 is also called the IP layer. At layer 2, where we are snatching/grasping the messages from the network as it includes the layer 2 headers with MAC addresses of the equipment, then this PDU is known as a frame.
-
Question 8 of 10
8. Question
Each layer of the Open Systems Interconnection (OSI) model has a different name for the chunk of data associated with it. This is called the protocol data unit (PDU). What do we call PDU in Layer 3?
Correct
The name for the bunch of data associated with each layer of the Open Systems Interconnection (OSI) model has a different name. It is the exact definition of the protocol data unit (PDU). At layer 3, the PDU is called a packet. Layer 3 is also called the IP layer.
Incorrect
The name for the bunch of data associated with each layer of the Open Systems Interconnection (OSI) model has a different name. It is the exact definition of the protocol data unit (PDU). At layer 3, the PDU is called a packet. Layer 3 is also called the IP layer.
-
Question 9 of 10
9. Question
Which of the following is the most powerful and widely used command-line packets sniffer or package analyzer tool?
Correct
For capturing or filtering TCP/IP packets that received or transferred over a network on a specific interface, the most powerful and widely used command-line packets sniffer or package analyzer tool tcpdump. It is available in most of the Linux/Unix operating systems.
Incorrect
For capturing or filtering TCP/IP packets that received or transferred over a network on a specific interface, the most powerful and widely used command-line packets sniffer or package analyzer tool tcpdump. It is available in most of the Linux/Unix operating systems.
-
Question 10 of 10
10. Question
Which of the following is a network protocol analyzer and it lets you capture packet data from a live network?
Correct
tShark is a network protocol analyzer which is used to capture packet data from a live network. It can also read packets from already saved capture files, either printing a decoded form of those packets to the standard output or writing the packets to a file.
Incorrect
tShark is a network protocol analyzer which is used to capture packet data from a live network. It can also read packets from already saved capture files, either printing a decoded form of those packets to the standard output or writing the packets to a file.