You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" CEH Practice Test 8 "
0 of 59 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
CEH V10
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking view questions. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
Answered
Review
Question 1 of 59
1. Question
A covert channel is a channel that:
Correct
Incorrect
Unattempted
Question 2 of 59
2. Question
A hacker has managed to gain access to a Linux host and stolen the password file from /etc/passwd. How can he use it?
Correct
Incorrect
Unattempted
Question 3 of 59
3. Question
You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?
Correct
Incorrect
Unattempted
Question 4 of 59
4. Question
You are monitoring the network of your organizations. You notice that:
– There are huge outbound connections from your Internal Network to External IPs
– On further investigation, you see that the external IPs are blacklisted
– Some connections are accepted, and some are dropped
You find that it is a CnC communication
Which of the following solution will you suggest?
Correct
Incorrect
Unattempted
Question 5 of 59
5. Question
Which service in a PKI will vouch for the identity of an individual or company?
Correct
Incorrect
Unattempted
Question 6 of 59
6. Question
In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?
Correct
Incorrect
Unattempted
Question 7 of 59
7. Question
Which of the following resources does NMAP need to be used as a basic vulnerability scanner covering several vectors like SMB, HTTP and FTP?
Correct
Incorrect
Unattempted
Question 8 of 59
8. Question
A hacker was able to sniff packets on a companys wireless network. The following information was discovered:
The Key 10110010 01001011 The Cyphertext 01100101 01011010
Using the Exlcusive OR, what was the original message?
Correct
Incorrect
Unattempted
Question 9 of 59
9. Question
An NMAP scan of a server shows port 69 is open. What risk could this pose?
Correct
Incorrect
Unattempted
Question 10 of 59
10. Question
An attacker uses a communication channel within an operating system that is neither designed nor intended to transfer information. What is the name of the communications channel?
Correct
Incorrect
Unattempted
Question 11 of 59
11. Question
Which tool is used to automate SQL injections and exploit a database by forcing a given web application to connect to another database controlled by a hacker?
Correct
Incorrect
Unattempted
Question 12 of 59
12. Question
An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?
Correct
Incorrect
Unattempted
Question 13 of 59
13. Question
While performing data validation of web content, a security technician is required to restrict malicious input. Which of the following processes is an efficient way of restricting malicious input?
Correct
Incorrect
Unattempted
Question 14 of 59
14. Question
What type of analysis is performed when an attacker has partial knowledge of inner-workings of the application?
Correct
Incorrect
Unattempted
Question 15 of 59
15. Question
Which regulation defines security and privacy controls for Federal information systems and organizations?
Correct
Incorrect
Unattempted
Question 16 of 59
16. Question
Bob learned that his username and password for a popular game has been compromised. He contacts the company and resets all the information. The company suggests he use two-factor authentication; which option below offers that?
Correct
Incorrect
Unattempted
Question 17 of 59
17. Question
Due to a slowdown of normal network operations, the IT department decided to monitor internet traffic for all of the employees. From a legal stand point, what would be troublesome to take this kind of measure?
Correct
Incorrect
Unattempted
Question 18 of 59
18. Question
In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.
Which Algorithm is this referring to?
Correct
Incorrect
Unattempted
Question 19 of 59
19. Question
What does a firewall check to prevent particular ports and applications from getting packets into an organization?
Correct
Incorrect
Unattempted
Question 20 of 59
20. Question
If there is an Intrusion Detection System (IDS) in intranet, which port scanning technique cannot be used?
Correct
Incorrect
Unattempted
Question 21 of 59
21. Question
There are several ways to gain insight on how a cryptosystem works with the goal of reverse engineering the process. A term describes when two pieces of data result in the value is?
Correct
Incorrect
Unattempted
Question 22 of 59
22. Question
How can rainbow tables be defeated?
Correct
Incorrect
Unattempted
Question 23 of 59
23. Question
When an alert rule is matched in a network-based IDS like snort, the IDS does which of the following?
Correct
Incorrect
Unattempted
Question 24 of 59
24. Question
Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?
Correct
Incorrect
Unattempted
Question 25 of 59
25. Question
An Internet Service Provider (ISP) has a need to authenticate users connecting via analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network.
Which AAA protocol is the most likely able to handle this requirement?
Correct
Incorrect
Unattempted
Question 26 of 59
26. Question
It has been reported to you that someone has caused an information spillage on their computer. You go to the computer, disconnect it from the network, remove the keyboard and mouse, and power it down. What step in incident handling did you just complete?
Correct
Incorrect
Unattempted
Question 27 of 59
27. Question
An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections. When users accessed any page, the applet ran and exploited many machines.
Which one of the following tools the hacker probably used to inject HTML code?
Correct
Incorrect
Unattempted
Question 28 of 59
28. Question
Which of the following statements is TRUE?
Correct
Incorrect
Unattempted
Question 29 of 59
29. Question
Firewalk has just completed the second phase (the scanning phase) and a technician receives the output shown below. What conclusions can be drawn based on these scan results?
Correct
Incorrect
Unattempted
Question 30 of 59
30. Question
Which protocol and port number might be needed in order to send log messages to a log analysis tool that resides behind a firewall?
Correct
Incorrect
Unattempted
Question 31 of 59
31. Question
A Security Engineer at a medium-sized accounting firm has been tasked with discovering how much information can be obtained from the firms public facing web servers. The engineer decides to start by using netcat to port 80.
The engineer receives this output:
HTTP/1.1 200 OK
Server: Microsoft-IIS/6
Expires: Tue, 17 Jan 2011 01:41:33 GMT
Date: Mon, 16 Jan 2011 01:41:33 GMT
Content-Type: text/html
Accept-Ranges: bytes
Last-Modified: Wed, 28 Dec 2010 15:32:21 GMT
ETag: “b0aac0542e25c31:89d”
Content-Length: 7369
Which of the following is an example of what the engineer performed?
Correct
Incorrect
Unattempted
Question 32 of 59
32. Question
Code injection is a form of attack in which a malicious user:
Correct
Incorrect
Unattempted
Question 33 of 59
33. Question
A person approaches a network administrator and wants advice on how to send encrypted email from home. The end user does not want to have to pay for any license fees or manage server services. Which of the following is the most secure encryption protocol that the network administrator should recommend?
Correct
Incorrect
Unattempted
Question 34 of 59
34. Question
Which of the following is an example of an asymmetric encryption implementation?
Correct
Incorrect
Unattempted
Question 35 of 59
35. Question
A company firewall engineer has configured a new DMZ to allow public systems to be located away from the internal network. The engineer has three security zones set:
The engineer wants to configure remote desktop access from a fixed IP on the remote network to a remote desktop server in the DMZ. Which rule would best fit this requirement?
Correct
Incorrect
Unattempted
Question 36 of 59
36. Question
An engineer is learning to write exploits in C++ and is using the exploit tool Backtrack. The engineer wants to compile the newest C++ exploit and name it calc.exe. Which command would the engineer use to accomplish this?
Correct
Incorrect
Unattempted
Question 37 of 59
37. Question
What is not a PCI compliance recommendation?
Correct
Incorrect
Unattempted
Question 38 of 59
38. Question
What is the main difference between a “Normal” SQL Injection and a “Blind” SQL Injection vulnerability?
Correct
Incorrect
Unattempted
Question 39 of 59
39. Question
WPA2 uses AES for wireless data encryption at which of the following encryption levels?
Correct
Incorrect
Unattempted
Question 40 of 59
40. Question
A security consultant is trying to bid on a large contract that involves penetration testing and reporting. The company accepting bids wants proof of work so the consultant prints out several audits that have been performed. Which of the following is likely to occur as a result?
Correct
Incorrect
Unattempted
Question 41 of 59
41. Question
Cross-site request forgery involves:
Correct
Incorrect
Unattempted
Question 42 of 59
42. Question
In Risk Management, how is the term “likelihood” related to the concept of “threat”?
Correct
Incorrect
Unattempted
Question 43 of 59
43. Question
What is the least important information when you analyze a public IP address in a security alert?
Correct
Incorrect
Unattempted
Question 44 of 59
44. Question
When tuning security alerts, what is the best approach?
Correct
Incorrect
Unattempted
Question 45 of 59
45. Question
What does the option * indicate?
Correct
Incorrect
Unattempted
Question 46 of 59
46. Question
A pentester is using Metasploit to exploit an FTP server and pivot to a LAN. How will the pentester pivot using Metasploit?
Correct
Incorrect
Unattempted
Question 47 of 59
47. Question
The network administrator for a company is setting up a website with e-commerce capabilities. Packet sniffing is a concern because credit card information will be sent electronically over the Internet. Customers visiting the site will need to encrypt the data with HTTPS. Which type of certificate is used to encrypt and decrypt the data?
Correct
Incorrect
Unattempted
Question 48 of 59
48. Question
LM hash is a compromised password hashing function. Which of the following parameters describe LM Hash:?
I – The maximum password length is 14 characters.
II – There are no distinctions between uppercase and lowercase.
III – Its a simple algorithm, so 10,000,000 hashes can be generated per second.
Correct
Incorrect
Unattempted
Question 49 of 59
49. Question
Which of the following identifies the three modes in which Snort can be configured to run?
Correct
Incorrect
Unattempted
Question 50 of 59
50. Question
You perform a scan of your company’s network and discover that TCP port 123 is open. What services by default run on TCP port 123?
Correct
Incorrect
Unattempted
Question 51 of 59
51. Question
What is correct about digital signatures?
Correct
Incorrect
Unattempted
Question 52 of 59
52. Question
In the software security development life cycle process, threat modeling occurs in which phase?
Correct
Incorrect
Unattempted
Question 53 of 59
53. Question
An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victim’s profile to a text file and then submit the data to the attacker’s database.
What is this type of attack (that can use either HTTP GET or HTTP POST) called?
Correct
Incorrect
Unattempted
Question 54 of 59
54. Question
Which tier in the N-tier application architecture is responsible for moving and processing data between the tiers?
Correct
Incorrect
Unattempted
Question 55 of 59
55. Question
Which is the first step followed by Vulnerability Scanners for scanning a network?
Correct
Incorrect
Unattempted
Question 56 of 59
56. Question
Bob, your senior colleague, has sent you a mail regarding aa deal with one of the clients. You are requested to accept the offer and you oblige.
After 2 days, Bob denies that he had ever sent a mail.
What do you want to “know” to prove yourself that it was Bob who had send a mail?
Correct
Incorrect
Unattempted
Question 57 of 59
57. Question
What is the role of test automation in security testing?
Correct
Incorrect
Unattempted
Question 58 of 59
58. Question
A company has hired a security administrator to maintain and administer Linux and Windows-based systems. Written in the nightly report file is the following: Firewall log files are at the expected value of 4 MB. The current time is 12am. Exactly two hours later the size has decreased considerably. Another hour goes by and the log files have shrunk in size again. Which of the following actions should the security administrator take?
Correct
Incorrect
Unattempted
Question 59 of 59
59. Question
Shellshock allowed an unauthorized user to gain access to a server. It affected many Internet-facing services, which OS did it not directly affect?
Correct
Incorrect
Unattempted
X
Use Page numbers below to navigate to other practice tests