Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Dynamic analysis is a type of malware analysis that involves running the malware and observing its behavior. Cuckoo sandbox is a useful tool in conducting dynamic analysis. Which of the following statements is true about the cuckoo sandbox?
Correct
Cuckoo sandbox is an automated malware analysis tool. It handles starting up a VM, injecting the malware into it, and then performing some analysis on files, the registry, network connections, process actions, and memory. Cuckoo sandbox is freely available software that uses Python for managing the VM and the reporting.
Incorrect
Cuckoo sandbox is an automated malware analysis tool. It handles starting up a VM, injecting the malware into it, and then performing some analysis on files, the registry, network connections, process actions, and memory. Cuckoo sandbox is freely available software that uses Python for managing the VM and the reporting.
-
Question 2 of 10
2. Question
Packet capturing is the process of acquiring network traffic that is addressed to systems other than your own. One valuable tool used in packet capturing is Wireshark. Which of the following sentences best defines Wireshark?
Correct
Wireshark is a command-line GUI-based packet capture program. It provides a way to view the packets easily, moving around the complete capture. It also gives us the ability to easily scroll through the list of all frames captured.
Incorrect
Wireshark is a command-line GUI-based packet capture program. It provides a way to view the packets easily, moving around the complete capture. It also gives us the ability to easily scroll through the list of all frames captured.
-
Question 3 of 10
3. Question
A once common social engineering attack was the 419 scam. It is also referred to as the Nigerian Prince scam and is named after section 419 of the Nigerian criminal code. Which of the following statements best describes the 419 scam?
Correct
The 419 scam asks for an advanced fee with the promise of enormous riches on the back end. Once the attacker gets the advanced fee from the victim, they move on, and the victim never receives any of this money.
Incorrect
The 419 scam asks for an advanced fee with the promise of enormous riches on the back end. Once the attacker gets the advanced fee from the victim, they move on, and the victim never receives any of this money.
-
Question 4 of 10
4. Question
Social engineering is the process of convincing or manipulating someone into doing something they wouldn’t normally do for someone they don’t know. There are four social engineering vectors, one of which is vishing. Which of the following sentences is true about vishing?
Correct
Vishing or voice phishing is the method of using phone calls or leaving voice messages purporting to be from reputable companies to induce individuals to reveal personal information, such as bank details and credit card numbers.
Incorrect
Vishing or voice phishing is the method of using phone calls or leaving voice messages purporting to be from reputable companies to induce individuals to reveal personal information, such as bank details and credit card numbers.
-
Question 5 of 10
5. Question
Biometrics is the use of physical characteristics that is unique to you as a form of authentication. This is a form of physical access control that may simply be impossible to get by. One type of biometrics is retinal scanning. Which of the following sentences best defines retinal scanning?
Correct
Retinal scanning is the method of authenticating the identity of the person based on your eye. The retina is at the very back of your eye and contains the light-sensitive cells that create impulses for your optic nerve. The retina contains a pattern from blood vessels, which can be used to identify a person.
Incorrect
Retinal scanning is the method of authenticating the identity of the person based on your eye. The retina is at the very back of your eye and contains the light-sensitive cells that create impulses for your optic nerve. The retina contains a pattern from blood vessels, which can be used to identify a person.
-
Question 6 of 10
6. Question
There are a variety of techniques that can be used to conduct a website attack, one of which is site cloning. Which of the following statements is true about the site cloning attack?
Correct
Site cloning refers to the copying or modification of an existing website design or script to create a new website. It allows designers to create websites without the need to write scripts from scratch. You can use the WinHTTrack and Wget tool to conduct this technique.
Incorrect
Site cloning refers to the copying or modification of an existing website design or script to create a new website. It allows designers to create websites without the need to write scripts from scratch. You can use the WinHTTrack and Wget tool to conduct this technique.
-
Question 7 of 10
7. Question
A wireless attack is a method of gathering information that is being sent across a network and uses this information to commit some crimes in other networks. One type of wireless attack is the deauthentication attack. Which of the following statements best describes the deauthentication attack?
Correct
A deauthentication attack sends messages that force stations to reauthenticate against the access point. It logs out any station, making the station reestablish the association. There are a couple of reasons you might want to run a deauthentication attack; one is to get a hidden ESSID. Another reason is to capture handshakes during association.
Incorrect
A deauthentication attack sends messages that force stations to reauthenticate against the access point. It logs out any station, making the station reestablish the association. There are a couple of reasons you might want to run a deauthentication attack; one is to get a hidden ESSID. Another reason is to capture handshakes during association.
-
Question 8 of 10
8. Question
Bluetooth attacks are one way to gain access to mobile devices. It's easy to conduct since you don't need to have physical access; you just need to be proximal to the victim. Some of these attacks are bluejacking, bluesnarfing, and bluebugging. Which of the following sentences defines bluejacking?
Correct
Bluejacking involves an attacker sending data to a Bluetooth-enabled device without having to get through the pairing process, or perhaps the pairing happened without the receiver knowing about it. You could use a bluejacking attack to send an unsolicited message to a victim. This might be a spoof attack, where you send a message that appears to be from someone else to get the recipient to do something.
Incorrect
Bluejacking involves an attacker sending data to a Bluetooth-enabled device without having to get through the pairing process, or perhaps the pairing happened without the receiver knowing about it. You could use a bluejacking attack to send an unsolicited message to a victim. This might be a spoof attack, where you send a message that appears to be from someone else to get the recipient to do something.
-
Question 9 of 10
9. Question
A cross-site scripting (XSS) attack is one that uses the webserver to attack the client-side. This injects a code fragment from a scripting language into an input field to have that code executed within the browser of a user visiting a site. There are three ways to run a cross-site scripting attack: persistent cross-site scripting, reflected cross-site scripting, and document object model (DOM). Which of the following statements best describes the persistent cross-site scripting?
Correct
Persistent cross-site scripting occurs when a malicious script is injected directly into a vulnerable web application. It is stored on the server and displayed for any user visiting a page.
Incorrect
Persistent cross-site scripting occurs when a malicious script is injected directly into a vulnerable web application. It is stored on the server and displayed for any user visiting a page.
-
Question 10 of 10
10. Question
The purpose of a denial of service attack is to take an application out of service so legitimate users can’t use it. As users often interact with businesses through web applications, they are often the target of denial of service attacks. There are several types of denial of service attacks, one of which is the local area network denial (LAND) attack. Which of the following statements defines a LAND attack?
Correct
The local area network denial (LAND) attack sets the source and destination information of a TCP segment to be the same. This sends the segment into a loop in the operating system, as it is processed as an outbound, then an inbound, and so forth. This loop would lock up the system.
Incorrect
The local area network denial (LAND) attack sets the source and destination information of a TCP segment to be the same. This sends the segment into a loop in the operating system, as it is processed as an outbound, then an inbound, and so forth. This loop would lock up the system.