Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Internet Protocol (IP) provides a standard set of rules for sending and receiving data over the Internet. Several headers are defined for IP, one of which is the fragment offset header. Which of the following sentences defines the fragment offset header?
Correct
The fragment offset field is 13 bits long and indicates where the data in the packet aligns. This lets the receiving system know how to stitch all the fragments together. The value in this field is in double words or 8 octets.
Incorrect
The fragment offset field is 13 bits long and indicates where the data in the packet aligns. This lets the receiving system know how to stitch all the fragments together. The value in this field is in double words or 8 octets.
-
Question 2 of 10
2. Question
Network topology refers to the layout of a network and how different nodes in a network are connected and how they communicate. Which of the following descriptions defines a star topology?
Correct
In a star topology, there is a mediating device between all the devices. A star takes more cable than a bus network, but the benefit is that if a cable fails, only one node will be brought down.
Incorrect
In a star topology, there is a mediating device between all the devices. A star takes more cable than a bus network, but the benefit is that if a cable fails, only one node will be brought down.
-
Question 3 of 10
3. Question
The Open Systems Interconnection (OSI) model is created by the International Organization for Standardization to help refer to boundaries between functions within a network stack. It is consists of seven layers. Which of the following statements defines the data link layer in the OSI model?
Correct
The data link layer is the second layer of the OSI model of computer networking. This layer identifies the network interface on the network so communications can get from one system to another on the local network. The data link layer provides the functional and procedural means to transfer data between network entities and might provide the means to detect and possibly correct errors that may occur in the physical layer.
Incorrect
The data link layer is the second layer of the OSI model of computer networking. This layer identifies the network interface on the network so communications can get from one system to another on the local network. The data link layer provides the functional and procedural means to transfer data between network entities and might provide the means to detect and possibly correct errors that may occur in the physical layer.
-
Question 4 of 10
4. Question
A computer network is a system in which multiple computers are connected to share information and resources. Computer network varies with each other based on their functionality, geography, ownership, and communication media used. Metropolitan Area Network (MAN) is a type of computer network based on the geographical area. Which of the following sentences is not true about MAN?
Correct
A metropolitan area network (MAN) is similar to a local area network (LAN) but spans an entire city or campus. It is a medium-sized network and can be used for connecting the various offices of the same organization, spread over the whole city. MANs can be connected using an optical fiber cable as a communication medium.
Incorrect
A metropolitan area network (MAN) is similar to a local area network (LAN) but spans an entire city or campus. It is a medium-sized network and can be used for connecting the various offices of the same organization, spread over the whole city. MANs can be connected using an optical fiber cable as a communication medium.
-
Question 5 of 10
5. Question
Cloud computing is the process of storing and accessing data and programs over the internet instead of your computer’s hard drive. Cloud computing services come in different forms, one of which is the Infrastructure as a Service (IaaS). Which of the following statements best describes IaaS?
Correct
Infrastructure as a Service (IaaS) is an instant computing infrastructure, provisioned, and managed over the internet. It helps you avoid the expense and complexity of buying and managing your physical servers and other datacenter infrastructure. Each resource is offered as a separate service component, and it scales up and down with demand, letting you pay only for what you use.
Incorrect
Infrastructure as a Service (IaaS) is an instant computing infrastructure, provisioned, and managed over the internet. It helps you avoid the expense and complexity of buying and managing your physical servers and other datacenter infrastructure. Each resource is offered as a separate service component, and it scales up and down with demand, letting you pay only for what you use.
-
Question 6 of 10
6. Question
Internet of Things (IoT) refers to the growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other internet-enabled devices and systems. Which of the following is not an example of IoT?
Correct
Any devices that have embedded software and also have network access are considered to be part of the Internet of Things (IoT). Other examples of IoT include the following: home automation devices, digital video recorders, satellite set-top boxes, and anything that can be reached over the network that doesn’t have a built-in screen or the ability to take direct user interaction. Meanwhile, smartphones or general-purpose computers would not be part of IoT because they have traditional input/output devices like a screen and keyboard.
Incorrect
Any devices that have embedded software and also have network access are considered to be part of the Internet of Things (IoT). Other examples of IoT include the following: home automation devices, digital video recorders, satellite set-top boxes, and anything that can be reached over the network that doesn’t have a built-in screen or the ability to take direct user interaction. Meanwhile, smartphones or general-purpose computers would not be part of IoT because they have traditional input/output devices like a screen and keyboard.
-
Question 7 of 10
7. Question
A vulnerability is a weakness in a system, this may be its software, its configuration, or how the entire information solution is put together. A race condition is an example of vulnerability. Which of the following statements is not true about race condition?
Correct
A race condition is a synchronization problem that occurs when a software program depends on the timing of one or more processes to function correctly. It is a programmatic situation where one process or thread is writing data while another process or thread is reading the data. This type of vulnerability cannot be exploited.
Incorrect
A race condition is a synchronization problem that occurs when a software program depends on the timing of one or more processes to function correctly. It is a programmatic situation where one process or thread is writing data while another process or thread is reading the data. This type of vulnerability cannot be exploited.
-
Question 8 of 10
8. Question
Security is a business enabler; hence, organizations must set parameters around what is important and the means to protect it. It does that by creating policies, guidelines, standards, and procedures. Which of the following statements best defines security policies?
Correct
A security policy is a written document in an organization outlining what a company considers what resources need to be protected, how resources should be utilized properly, and how resources can or should be accessed. Security policies are also about setting expectations of employees and defining what users can and cannot do. Any violation of this policy on the part of the employee can cause sanctions or termination, depending on the extent of the violation and the impact on the business.
Incorrect
A security policy is a written document in an organization outlining what a company considers what resources need to be protected, how resources should be utilized properly, and how resources can or should be accessed. Security policies are also about setting expectations of employees and defining what users can and cannot do. Any violation of this policy on the part of the employee can cause sanctions or termination, depending on the extent of the violation and the impact on the business.
-
Question 9 of 10
9. Question
A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. Which of the following statements is true about stateful filtering firewalls?
Correct
The first stateful firewall was developed in the late 1980s. It is a firewall that keeps track of the state of messages. It combines both packet inspection technology and TCP handshake verification to create a level of protection greater than either of the previous two architectures could provide alone.
Incorrect
The first stateful firewall was developed in the late 1980s. It is a firewall that keeps track of the state of messages. It combines both packet inspection technology and TCP handshake verification to create a level of protection greater than either of the previous two architectures could provide alone.
-
Question 10 of 10
10. Question
Users are often the most vulnerable point on your network, and they are regularly targets of social engineering and malware attacks. Unified Threat Management (UTM) is a useful tool to protect users. Which of the following statements best defines UTM?
Correct
Unified threat management (UTM) is an information security term that refers to a single security solution and usually a single security appliance that provides multiple security functions at a single point on the network.
Incorrect
Unified threat management (UTM) is an information security term that refers to a single security solution and usually a single security appliance that provides multiple security functions at a single point on the network.