Quiz-summary
0 of 11 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 11 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- Answered
- Review
-
Question 1 of 11
1. Question
Which is a computer program designed to assess computers, networks or applications for known weaknesses?
Correct
A vulnerability scanner is a computer program specially designed to assess computers system, hosts, networks or applications for known weaknesses. In simple words, these are used to find the weaknesses or vulnerability of a given system. Furthermore, this program can make mistakes on both ends of the spectrum, meaning it can miss vulnerabilities as well as report ones that really don’t exist.
Incorrect
A vulnerability scanner is a computer program specially designed to assess computers system, hosts, networks or applications for known weaknesses. In simple words, these are used to find the weaknesses or vulnerability of a given system. Furthermore, this program can make mistakes on both ends of the spectrum, meaning it can miss vulnerabilities as well as report ones that really don’t exist.
-
Question 2 of 11
2. Question
Which of the following technique used to determining systems that are alive?
Correct
Ping Sweep is defined as a technique used to recognize if the hosts or computer systems are alive in the networks using their IP addresses. A ping sweep is described as when sending ping messages to every computer system or hosts on the network, thus the “sweep” part.
Incorrect
Ping Sweep is defined as a technique used to recognize if the hosts or computer systems are alive in the networks using their IP addresses. A ping sweep is described as when sending ping messages to every computer system or hosts on the network, thus the “sweep” part.
-
Question 3 of 11
3. Question
Keeping in view TCP, How many ways TCP uses handshake to initiate connections?
Correct
TCP uses a three-way handshake for connections initiation. To complete the handshake, TCP requires to use of flag settings meaning there is a set of bits that are enabled or disabled to set or unset the flags.
Incorrect
TCP uses a three-way handshake for connections initiation. To complete the handshake, TCP requires to use of flag settings meaning there is a set of bits that are enabled or disabled to set or unset the flags.
-
Question 4 of 11
4. Question
There are many types of TCP scanning, in the SYN scan; Nmap will send a SYN message to the target. Which of the following is the response if the port is open?
Correct
Nmap will transmit an SYN message to the target or victim computer. If it found that the port is open, it responds with a SYN/ACK message and nmap will send to that with a RST message, indicating it doesn’t want further to communicate with the connection. On the other hand, If it found that the port is closed, the target computer system or victim computer will send with its own RST message.
Incorrect
Nmap will transmit an SYN message to the target or victim computer. If it found that the port is open, it responds with a SYN/ACK message and nmap will send to that with a RST message, indicating it doesn’t want further to communicate with the connection. On the other hand, If it found that the port is closed, the target computer system or victim computer will send with its own RST message.
-
Question 5 of 11
5. Question
There are many types of TCP scanning, in the SYN scan; Nmap will send a SYN message to the target. Which of the following is the response if the port is closed?
Correct
Nmap will transmit an SYN message to the target or victim computer. If it found that the port is open, it responds with a SYN/ACK message and nmap will send to that with a RST message, indicating it doesn’t want further to communicate with the connection. On the other hand, If it found that the port is closed, the target computer system or victim computer will send with its own RST message.
Incorrect
Nmap will transmit an SYN message to the target or victim computer. If it found that the port is open, it responds with a SYN/ACK message and nmap will send to that with a RST message, indicating it doesn’t want further to communicate with the connection. On the other hand, If it found that the port is closed, the target computer system or victim computer will send with its own RST message.
-
Question 6 of 11
6. Question
Which of the following is true, There are many types of TCP scanning, in the SYN scan; Nmap will send a SYN message to the target and if nmap doesn’t get any response?
Correct
If nmap doesn’t get any response from the internet or computer hosts, it’s not clear whether it’s because a network device dropped the transmitted message or if the system just didn’t respond to a message which it found an illegal message.
Incorrect
If nmap doesn’t get any response from the internet or computer hosts, it’s not clear whether it’s because a network device dropped the transmitted message or if the system just didn’t respond to a message which it found an illegal message.
-
Question 7 of 11
7. Question
Which of the following has remained GUI version of nmap for years?
Correct
There were many attempts made by developers to create GUIs to overlay on top of nmap, and then one year of struggling, under Google’s Summer of Code project, finally a GUI called Zenmap was developed and it has served the GUI version of nmap for years. It is, as already described, an overlay for nmap.
Incorrect
There were many attempts made by developers to create GUIs to overlay on top of nmap, and then one year of struggling, under Google’s Summer of Code project, finally a GUI called Zenmap was developed and it has served the GUI version of nmap for years. It is, as already described, an overlay for nmap.
-
Question 8 of 11
8. Question
Which of the following is the benefit of Zenmap scan over nmap scan?
Correct
Zenmap is a tool use for comparison of two saved scans. By this, we get a baseline of a network and then check or compare it again later to observe what changes have been made.
Incorrect
Zenmap is a tool use for comparison of two saved scans. By this, we get a baseline of a network and then check or compare it again later to observe what changes have been made.
-
Question 9 of 11
9. Question
Which of the following format Zenmap save scan by default?
Correct
By default, Zenmap will save all scans which it carried out in XML format. Since XML is a text-based format, you could get the differences between two XML files yourself, but it’s easier to have a tool that will consume XML and then compare it node by node and computer by computer to get more than just the text differences. Zenmap is a tool that will do all the stated things.
Incorrect
By default, Zenmap will save all scans which it carried out in XML format. Since XML is a text-based format, you could get the differences between two XML files yourself, but it’s easier to have a tool that will consume XML and then compare it node by node and computer by computer to get more than just the text differences. Zenmap is a tool that will do all the stated things.
-
Question 10 of 11
10. Question
Which of the following scan is to be used, if we want to scan the internet all over the world?
Correct
Masscan is defined as an Internet-scale port scanner and can scan the all computer on the Internet in just under 6 minutes, by sending more than 10 million packets per second, from a single machine or computer. Its input/output is similar to nmap or work simply to nmap, the most famous port scanner.
Incorrect
Masscan is defined as an Internet-scale port scanner and can scan the all computer on the Internet in just under 6 minutes, by sending more than 10 million packets per second, from a single machine or computer. Its input/output is similar to nmap or work simply to nmap, the most famous port scanner.
-
Question 11 of 11
11. Question
When visiting a website, which of the following is typed in the address bar of the browser?
Correct
When visiting a website, Simply enter in the address bar of the browser (internet explorer or chrome) something called a Uniform Resource Locator (URL) and this URL primarily consists of two parts. The first part of the URL is the Uniform Resource Identifier (URI).
Incorrect
When visiting a website, Simply enter in the address bar of the browser (internet explorer or chrome) something called a Uniform Resource Locator (URL) and this URL primarily consists of two parts. The first part of the URL is the Uniform Resource Identifier (URI).