Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
In Ethical hacking, What is the purpose to use MegaPing?
Correct
MegaPing is a toolkit which provides essential utilities/tools for IS (Information System) specialists, IT solution providers the system administrators or individuals. MegaPing is a tool which also includes the follwoing Scanners:-
(A) Comprehensive Security Scanner
(B) Port scanner (TCP and UDP ports)
(C) IP scanner
(D) NetBIOS scanner
(E) Share ScannerIncorrect
MegaPing is a toolkit which provides essential utilities/tools for IS (Information System) specialists, IT solution providers the system administrators or individuals. MegaPing is a tool which also includes the follwoing Scanners:-
(A) Comprehensive Security Scanner
(B) Port scanner (TCP and UDP ports)
(C) IP scanner
(D) NetBIOS scanner
(E) Share Scanner -
Question 2 of 10
2. Question
Which of the following is the condition when The scanner has identified is an exploitable vulnerability, and has found something it believes is a vulnerability based on interactions with the target system as compared with data the vulnerability scanner has?
Correct
If the scanner has recognised an exploitable vulnerability, it does not determine that the scanner identified it correctly. It simply means that the scanner has found a vulnerability based on interactions history with the system/computer on a network as compared with memorised data which the vulnerability scanner has already with it. This is called a false positive.
Incorrect
If the scanner has recognised an exploitable vulnerability, it does not determine that the scanner identified it correctly. It simply means that the scanner has found a vulnerability based on interactions history with the system/computer on a network as compared with memorised data which the vulnerability scanner has already with it. This is called a false positive.
-
Question 3 of 10
3. Question
Which of the following is the condition the scanner has not identified a vulnerability and later turns out that there was a vulnerability that the scanner missed?
Correct
If the scanner has not identified a vulnerability, At a later stage, it was found that there was actually a vulnerability which the scanner missed. This is called a false negative. An example of a false negative is a test indicating that a woman is not pregnant whereas she is actually pregnant.
Incorrect
If the scanner has not identified a vulnerability, At a later stage, it was found that there was actually a vulnerability which the scanner missed. This is called a false negative. An example of a false negative is a test indicating that a woman is not pregnant whereas she is actually pregnant.
-
Question 4 of 10
4. Question
Which of the following is the condition The scanner has identified a vulnerability that, after manual investigation, turns out to be a legitimate vulnerability?
Correct
In a case where the scanner has found a vulnerability which at a later stage, after verification, seems to be a true/legitimate vulnerability. This is called a true positive. A true positive is a result where the prediction model correctly predicts positive class. An example of a true positive is a test indicating that a woman is pregnant whereas she is actually pregnant.
Incorrect
In a case where the scanner has found a vulnerability which at a later stage, after verification, seems to be a true/legitimate vulnerability. This is called a true positive. A true positive is a result where the prediction model correctly predicts positive class. An example of a true positive is a test indicating that a woman is pregnant whereas she is actually pregnant.
-
Question 5 of 10
5. Question
Which of the following is the condition The scanner has not identified a vulnerability and there is not a vulnerability to identify?
Correct
In the case where the vulnerability scanner has not recognised a vulnerability and after detailed verification, there is no vulnerability found in the system. This is called a true negative. A true negative is a result where the prediction model correctly predicts negative class. An example of a true negative is a test indicating that a woman is not pregnant whereas she is actually not pregnant.
Incorrect
In the case where the vulnerability scanner has not recognised a vulnerability and after detailed verification, there is no vulnerability found in the system. This is called a true negative. A true negative is a result where the prediction model correctly predicts negative class. An example of a true negative is a test indicating that a woman is not pregnant whereas she is actually not pregnant.
-
Question 6 of 10
6. Question
Security Analysis Tool for Auditing Networks (SATAN) was written primarily in which of the following language?
Correct
Security Analysis Tool for Auditing Networks is abbreviated as SATAN is the very first scanner which is used to identify vulnerability in the systems. This is developed by two great computer security analyst Dan Farmer and Wietse Venema. This program was written in the language called Perl and SATAN is used as a web interface.
Incorrect
Security Analysis Tool for Auditing Networks is abbreviated as SATAN is the very first scanner which is used to identify vulnerability in the systems. This is developed by two great computer security analyst Dan Farmer and Wietse Venema. This program was written in the language called Perl and SATAN is used as a web interface.
-
Question 7 of 10
7. Question
Keeping in view of ethical hacking, which of the following idea to be kept in mind while running a scan in OpenVAS?
Correct
One important idea to keep in mind is that once you run a scan, the focus should be identifying a remediation plan for any vulnerability found. It is important to note that, if running a scan, getting a number of results, after getting the vulnerabilities results ignoring them is a worse state. Ignoring vulnerabilities is the worse thing for a vulnerability scan as both man-hours and energy wasted but we do nothing to the results.
Incorrect
One important idea to keep in mind is that once you run a scan, the focus should be identifying a remediation plan for any vulnerability found. It is important to note that, if running a scan, getting a number of results, after getting the vulnerabilities results ignoring them is a worse state. Ignoring vulnerabilities is the worse thing for a vulnerability scan as both man-hours and energy wasted but we do nothing to the results.
-
Question 8 of 10
8. Question
In OpenVAS, You can see the number of network vulnerability tests (NVTs) that have been enabled in each config. How NVTs are categorized for organizational purposes?
Correct
in OpenVAS, there are total of eight scan configs categorized by default. In OpenVAS, You can see the number of network vulnerability tests (NVTs) that have been enabled in each config. NVTs are categorized into families for organizational purposes.
Incorrect
in OpenVAS, there are total of eight scan configs categorized by default. In OpenVAS, You can see the number of network vulnerability tests (NVTs) that have been enabled in each config. NVTs are categorized into families for organizational purposes.
-
Question 9 of 10
9. Question
In OpenVAS, a light-blue icon in the upper left with a star in it indicates which of the following condition?
Correct
In OpenVAS, a light-blue icon in the upper left with a star in it indicates that the scanning has started. Mouse indicator would hover over the light blue icon and by clicking the New Task button. OpenVAS has the ability to start multiple tasks at a time so that it is time-efficient and effective.
Incorrect
In OpenVAS, a light-blue icon in the upper left with a star in it indicates that the scanning has started. Mouse indicator would hover over the light blue icon and by clicking the New Task button. OpenVAS has the ability to start multiple tasks at a time so that it is time-efficient and effective.
-
Question 10 of 10
10. Question
In the result screen of the OpenVAS, Which of the following severity levels are shown in the severity index?
Correct
In the result screen of the OpenVAS, The severity values would include High, Medium, and Low. On the left side of the severity button is the solution type text box. This additional information is very useful for our analysis and identification of vulnerability and its solution.
Incorrect
In the result screen of the OpenVAS, The severity values would include High, Medium, and Low. On the left side of the severity button is the solution type text box. This additional information is very useful for our analysis and identification of vulnerability and its solution.