Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Ethical hacking is consists of five phases: reconnaissance and footprinting, scanning and enumeration, gaining access, maintaining access, and covering tracks. Which of the following sentences best describes the reconnaissance and footprinting phase?
Correct
The reconnaissance and footprinting phase involves determining the size and scope of your test. Reconnaissance is where you gather information about your target, while footprinting is the method of trying to identify network blocks, hosts, locations, and people. The information gathered here will be used later as you progress through additional stages.
Incorrect
The reconnaissance and footprinting phase involves determining the size and scope of your test. Reconnaissance is where you gather information about your target, while footprinting is the method of trying to identify network blocks, hosts, locations, and people. The information gathered here will be used later as you progress through additional stages.
-
Question 2 of 10
2. Question
Network topology refers to the layout of a network, and how different nodes in a network are connected, and how they communicate. Which of the following descriptions defines a ring topology?
Correct
In a ring topology, all the nodes appear to be connected to a contiguous network segment. Typically, all messages travel through a ring in the same direction, and a failure in any cable or device breaks the loop and will take down the entire segment.
Incorrect
In a ring topology, all the nodes appear to be connected to a contiguous network segment. Typically, all messages travel through a ring in the same direction, and a failure in any cable or device breaks the loop and will take down the entire segment.
-
Question 3 of 10
3. Question
Transmission Control Protocol (TCP) is a transport layer protocol in the OSI layer and is used to create a connection between remote computers by transporting and ensuring the delivery of messages over supporting networks and the internet. Several headers are defined for TCP, one of which is the window header. Which of the following sentences defines the window header?
Correct
The window header is a 16-bit field that tells the recipient how many bytes the sender is willing to accept. This allows for speeding up and slowing down the communication. A smaller window size means more acknowledgments are necessary, while a larger window size means the channel is reliable, so there isn’t as much need to keep checking in.
Incorrect
The window header is a 16-bit field that tells the recipient how many bytes the sender is willing to accept. This allows for speeding up and slowing down the communication. A smaller window size means more acknowledgments are necessary, while a larger window size means the channel is reliable, so there isn’t as much need to keep checking in.
-
Question 4 of 10
4. Question
A computer network is a system in which multiple computers are connected to share information and resources. Computer network varies with each other based on their functionality, geography, ownership, and communication media used. Virtual Local Area Network (VLAN) is a type of computer network based on the geographical area. Which of the following sentences is true about a VLAN?
Correct
Virtual Local Area Network (VLAN) allows a network of computers and users to communicate in a simulated environment as if they exist in a single LAN and are sharing a single broadcast and multicast domain. VLANs are implemented to achieve scalability, security, and ease of network management and can quickly adapt to changes in network requirements and relocation of workstations and server nodes.
Incorrect
Virtual Local Area Network (VLAN) allows a network of computers and users to communicate in a simulated environment as if they exist in a single LAN and are sharing a single broadcast and multicast domain. VLANs are implemented to achieve scalability, security, and ease of network management and can quickly adapt to changes in network requirements and relocation of workstations and server nodes.
-
Question 5 of 10
5. Question
A threat is something that has the possibility to incur a breach of confidentiality, integrity, or availability. Several concepts help better understand where risks lie, one of which is the threat vector. Which of the following statements defines a threat vector?
Correct
A threat vector is a pathway by which a threat agent gains access through one or more of six main routes into a computer system by exploiting a route vulnerability.
Incorrect
A threat vector is a pathway by which a threat agent gains access through one or more of six main routes into a computer system by exploiting a route vulnerability.
-
Question 6 of 10
6. Question
Security is a business enabler; hence, organizations must set parameters around what is important and the means to protect it. It does that by creating policies, guidelines, standards, and procedures. Which of the following statements best defines security standards?
Correct
Security standards are the direction about how policies should be implemented. There are sets of standards that provide guidance for organizations and are managed by standard bodies. First, the National Institute of Standards and Technology (NIST) has a set of standards, documented in several special publications. Second, the International Organization for Standardization (ISO) maintains ISO 27001 and ISO 27002. Other standard documents may be relevant to you, depending on where you are in the world.
Incorrect
Security standards are the direction about how policies should be implemented. There are sets of standards that provide guidance for organizations and are managed by standard bodies. First, the National Institute of Standards and Technology (NIST) has a set of standards, documented in several special publications. Second, the International Organization for Standardization (ISO) maintains ISO 27001 and ISO 27002. Other standard documents may be relevant to you, depending on where you are in the world.
-
Question 7 of 10
7. Question
System logs are helpful to diagnose problems in the system and network. They can also help in an investigation of a potential issue. Organizations use a variety of log management solutions, one of which is the security information and event management (SIEM) software. Which of the following statement best defines the SIEM software?
Correct
The security information and event management (SIEM) software is used to correlate and analyze security alerts. The advantage of using SIEM is being able to pull a lot of data together so you can get a broader picture of what is happening across the network. This will help you to see trends and larger attacks.
Incorrect
The security information and event management (SIEM) software is used to correlate and analyze security alerts. The advantage of using SIEM is being able to pull a lot of data together so you can get a broader picture of what is happening across the network. This will help you to see trends and larger attacks.
-
Question 8 of 10
8. Question
Unix-like systems and Windows systems offer the ability to enable and configure auditing. The definition and function of auditing differ across the two systems. If you’re using a Linux system, what program can you use to manage audit policies?
Correct
Using the program auditctl, audit policies can be managed on a Linux system. The auditing subsystem in the Linux kernel can be used to watch files and directories for activity. It can also be used to monitor application execution and to monitor system calls. Any system call used by any program on the system can be monitored and logged.
Incorrect
Using the program auditctl, audit policies can be managed on a Linux system. The auditing subsystem in the Linux kernel can be used to watch files and directories for activity. It can also be used to monitor application execution and to monitor system calls. Any system call used by any program on the system can be monitored and logged.
-
Question 9 of 10
9. Question
Open-source intelligence is derived from data and information that is available to the general public. There are several useful tools in gathering open-source intelligence, one of which is theHarvester tool. Which of the following sentences best describes theHarvester tool?
Correct
TheHarvester tool is a script that will search through the different sources to locate contact information based on a domain name provided to the program. It is designed to understand the customer footprint on the internet. It is also useful for anyone that wants to know what an attacker can see about their organization.
Incorrect
TheHarvester tool is a script that will search through the different sources to locate contact information based on a domain name provided to the program. It is designed to understand the customer footprint on the internet. It is also useful for anyone that wants to know what an attacker can see about their organization.
-
Question 10 of 10
10. Question
Shodan is a search engine specifically designed for Internet of Things (IoT) devices. It keeps track of a large number of devices along with vendors, device types, and capabilities. What search term can you use to identify distributed network protocol (DNP) 3 devices?
Correct
Shodan (www.shodan.io) is an excellent resource when it comes to identifying devices that are considered part of the IoT. Using searches of the Shodan database, you can identify devices that may exist on the target network. For example, the search term port:20000 source address can identify distributed network protocol (DNP) 3 devices.
Incorrect
Shodan (www.shodan.io) is an excellent resource when it comes to identifying devices that are considered part of the IoT. Using searches of the Shodan database, you can identify devices that may exist on the target network. For example, the search term port:20000 source address can identify distributed network protocol (DNP) 3 devices.