You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" CEH Practice Test 7 "
0 of 59 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
CEH V10
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking view questions. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
Answered
Review
Question 1 of 59
1. Question
Scenario:
1. Victim opens the attacker’s web site.
2. Attacker sets up a web site which contains interesting and attractive content like ‘Do you want to make $1000 in a day?’.
3. Victim clicks to the interesting and attractive content url.
4. Attacker creates a transparent ‘iframe’ in front of the url which victim attempt to click, so victim thinks that he/she clicks to the ‘Do you want to make $1000 in a day?’ url but actually he/she clicks to the content or url that exists in the transparent ‘iframe’ which is setup by the attacker.
What is the name of the attack which is mentioned in the scenario?
Correct
Incorrect
Unattempted
Question 2 of 59
2. Question
A pentester gains access to a Windows application server and needs to determine the settings of the built-in Windows firewall. Which command would be used?
Correct
Incorrect
Unattempted
Question 3 of 59
3. Question
Port scanning can be used as part of a technical assessment to determine network vulnerabilities. The TCP XMAS scan is used to identify listening ports on the targeted system.
If a scanned port is open, what happens?
Correct
Incorrect
Unattempted
Question 4 of 59
4. Question
Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations.
Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA.
In this context, what can you say?
Correct
Incorrect
Unattempted
Question 5 of 59
5. Question
The following is part of a log file taken from the machine on the network with the IP address of 192.168.0.110:
What type of activity has been logged?
Correct
Incorrect
Unattempted
Question 6 of 59
6. Question
You have gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change any user’s password or activate disabled Windows accounts?
Correct
Incorrect
Unattempted
Question 7 of 59
7. Question
Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?
Correct
Incorrect
Unattempted
Question 8 of 59
8. Question
During a penetration test, the tester conducts an ACK scan using NMAP against the external interface of the DMZ firewall. NMAP reports that port 80 is unfiltered. Based on this response, which type of packet inspection is the firewall conducting?
Correct
Incorrect
Unattempted
Question 9 of 59
9. Question
Look at the following output. What did the hacker accomplish?
Correct
Incorrect
Unattempted
Question 10 of 59
10. Question
Why should the security analyst disable/remove unnecessary ISAPI filters?
Correct
Incorrect
Unattempted
Question 11 of 59
11. Question
Which results will be returned with the following Google search query?
site:target.com -site:Marketing.target.com accounting
Correct
Incorrect
Unattempted
Question 12 of 59
12. Question
Which of the following is a client-server tool utilized to evade firewall inspection?
Correct
Incorrect
Unattempted
Question 13 of 59
13. Question
Which of the following provides a security professional with most information about the system’s security posture?
Correct
Incorrect
Unattempted
Question 14 of 59
14. Question
You are an Ethical Hacker who is auditing the ABC company. When you verify the NOC one of the machines has 2 connections, one wired and the other wireless.
When you verify the configuration of this Windows system you find two static routes.
route add 10.0.0.0 mask 255.0.0.0 10.0.0.1
route add 0.0.0.0 mask 255.0.0.0 199.168.0.1
What is the main purpose of those static routes?
Correct
Incorrect
Unattempted
Question 15 of 59
15. Question
Which of the following is considered an exploit framework and has the ability to perform automated attacks on services, ports, applications an unpatched security flaws in a computer system?
Correct
Incorrect
Unattempted
Question 16 of 59
16. Question
Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?
Correct
Incorrect
Unattempted
Question 17 of 59
17. Question
Which technical characteristic do Ethereal/Wireshark, TCPDump, and Snort have in common?
Correct
Incorrect
Unattempted
Question 18 of 59
18. Question
An organization hires a tester to do a wireless penetration test. Previous reports indicate that the last test did not contain management or control packets in the submitted traces. Which of the following is the most likely reason for lack of management or control packets?
Correct
Incorrect
Unattempted
Question 19 of 59
19. Question
Which of the following program infects the system boot sector and the executable files at the same time?
Correct
Incorrect
Unattempted
Question 20 of 59
20. Question
The “white box testing” methodology enforces what kind of restriction?
Correct
Incorrect
Unattempted
Question 21 of 59
21. Question
During a penetration test, a tester finds a target that is running MS SQL 2000 with default credentials. The tester assumes that the service is running with Local System account. How can this weakness be exploited to access the system?
Correct
Incorrect
Unattempted
Question 22 of 59
22. Question
What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a hotel room?
Correct
Incorrect
Unattempted
Question 23 of 59
23. Question
Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.
Correct
Incorrect
Unattempted
Question 24 of 59
24. Question
Which of the following is a low-tech way of gaining unauthorized access to systems?
Correct
Incorrect
Unattempted
Question 25 of 59
25. Question
Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?
Correct
Incorrect
Unattempted
Question 26 of 59
26. Question
The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?
Correct
Incorrect
Unattempted
Question 27 of 59
27. Question
In both pharming and phishing attacks an attacker can create websites that look similar to legitimate sites with the intent of collecting personal identifiable information from its victims. What is the difference between pharming and phishing attacks?
Correct
Incorrect
Unattempted
Question 28 of 59
28. Question
During a penetration test, a tester finds that the web application being analyzed is vulnerable to Cross Site Scripting (XSS). Which of the following conditions must be met to exploit this vulnerability?
Correct
Incorrect
Unattempted
Question 29 of 59
29. Question
Which of the following is considered an acceptable option when managing a risk?
Correct
Incorrect
Unattempted
Question 30 of 59
30. Question
A large mobile telephony and data network operator has a data that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems.
What is the best security policy concerning this setup?
A large mobile telephony and data network operator has a data that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems.
What is the best security policy concerning this setup?
Correct
Incorrect
Unattempted
Question 31 of 59
31. Question
Which of the following programming languages is most susceptible to buffer overflow attacks, due to its lack of a built-in-bounds checking mechanism?
Code:
#include int main(){ char buffer[8];
strcpy(buffer,
““11111111111111111111111111111””);
}
Output:
Segmentation fault
Correct
Incorrect
Unattempted
Question 32 of 59
32. Question
What is attempting an injection attack on a web server based on responses to True/False questions called?
Correct
Incorrect
Unattempted
Question 33 of 59
33. Question
Which access control mechanism allows for multiple systems to use a central authentication server (CAS) that permits users to authenticate once and gain access to multiple systems?
Correct
Incorrect
Unattempted
Question 34 of 59
34. Question
Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?
Correct
Incorrect
Unattempted
Question 35 of 59
35. Question
Based on the below log, which of the following sentences are true?
Mar 1, 2016, 7:33:28 AM 10.240.250.23 – 54373 10.249.253.15 – 22 tcp_ip
Correct
Incorrect
Unattempted
Question 36 of 59
36. Question
What is the difference between the AES and RSA algorithms?
Correct
Incorrect
Unattempted
Question 37 of 59
37. Question
Security Policy is a definition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like Computer Security Policy, Information Protection Policy, Information Security Policy, network Security Policy, Physical Security Policy, Remote Access Policy, and User Account Policy.
What is the main theme of the sub-policies for Information Technologies?
Correct
Incorrect
Unattempted
Question 38 of 59
38. Question
Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and that are related to various aspects in information security such as data confidentially, data integrity, authentication, and non-repudiation. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Basic example to understand how cryptography works is given below:
Which of the following choices true about cryptography?
Correct
Incorrect
Unattempted
Question 39 of 59
39. Question
Websites and web portals that provide web services commonly use the Simple Object Access Protocol (SOAP). Which of the following is an incorrect definition or characteristics of the protocol?
Correct
Incorrect
Unattempted
Question 40 of 59
40. Question
You are looking for SQL injection vulnerability by sending a special character to web applications. Which of the following is the most useful for quick validation?
Correct
Incorrect
Unattempted
Question 41 of 59
41. Question
In cryptanalysis and computer security, ‘pass the hash’ is a hacking technique that allows an attacker to authenticate to a remote server/service by using the underlying NTLM and/or LanMan hash of a user’s password, instead of requiring the associated plaintext password as is normally the case.
Metasploit Framework has a module for this technique: psexec. The psexec module is often used by penetration testers to obtain access to a given system whose credentials are known. It was written by sysinternals and has been integrated within the framework. The penetration testers successfully gain access to a system through some exploit, use meterpreter to grab the passwords or other methods like fgdump, pwdump, or cachedump and then utilize rainbowtables to crack those hash values.
Which of the following is a true hash type and sort order that is used in the psexec module’s ‘smbpass’ option?
Correct
Incorrect
Unattempted
Question 42 of 59
42. Question
Which of the following will perform an Xmas scan using NMAP?
Correct
Incorrect
Unattempted
Question 43 of 59
43. Question
How can a rootkit bypass Windows 7 operating systems kernel mode, code signing policy?
Correct
Incorrect
Unattempted
Question 44 of 59
44. Question
Bob finished a C programming course and created a small C application to monitor the network traffic and produce alerts when any origin sends “many” IP packets, based on the average number of packets sent by all origins and using some thresholds. In concept, the solution developed by Bob is actually:
Correct
Incorrect
Unattempted
Question 45 of 59
45. Question
You have successfully compromised a machine on the network and found a server that is alive on the same network. You tried to ping it but you didn’t get any response back.
What is happening?
Correct
Incorrect
Unattempted
Question 46 of 59
46. Question
A security engineer has been asked to deploy a secure remote access solution that will allow employees to connect to the companys internal network. Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?
Correct
Incorrect
Unattempted
Question 47 of 59
47. Question
During the process of encryption and decryption, what keys are shared?
Correct
Incorrect
Unattempted
Question 48 of 59
48. Question
A virus that attempts to install itself inside the file it is infecting is called?
Correct
Incorrect
Unattempted
Question 49 of 59
49. Question
What type of vulnerability/attack is it when the malicious person forces the user’s browser to send an authenticated request to a server?
Correct
Incorrect
Unattempted
Question 50 of 59
50. Question
You are the Network Admin, and you get a compliant that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible. But they are not accessible when you try using the URL.
What may be the problem?
Correct
Incorrect
Unattempted
Question 51 of 59
51. Question
A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which of the following has occurred?
Correct
Incorrect
Unattempted
Question 52 of 59
52. Question
What technique is used to perform a Connection Stream Parameter Pollution (CSPP) attack?
Correct
Incorrect
Unattempted
Question 53 of 59
53. Question
The collection of potentially actionable, overt, and publicly available information is known as:
Correct
Incorrect
Unattempted
Question 54 of 59
54. Question
A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?
Correct
Incorrect
Unattempted
Question 55 of 59
55. Question
Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?
Correct
Incorrect
Unattempted
Question 56 of 59
56. Question
What is the outcome of the command “nc -l -p 2222 | nc 10.1.0.43 1234”?
Correct
Incorrect
Unattempted
Question 57 of 59
57. Question
An attacker is using nmap to do a ping sweep and a port scanning in a subnet of 254 addresses.
In which order should he perform these steps?
Correct
Incorrect
Unattempted
Question 58 of 59
58. Question
What network security concept requires multiple layers of security controls to be placed throughout an IT infrastructure, which improves the security posture of an organization to defend against malicious attacks or potential vulnerabilities?
Correct
Incorrect
Unattempted
Question 59 of 59
59. Question
You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for. Which of the below scanning technique will you use?
Correct
Incorrect
Unattempted
X
Use Page numbers below to navigate to other practice tests