You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" CEH Practice Test 9 "
0 of 60 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
CEH V10
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking view questions. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Answered
Review
Question 1 of 60
1. Question
An IT employee got a call from one of our best customers. The caller wanted to know about the company’s network infrastructure, systems, and team. New opportunities of integration are in sight for both company and customer. What should this employee do?
Correct
Incorrect
Unattempted
Question 2 of 60
2. Question
If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which tool could the tester use to get a response from a host using TCP?
Correct
Incorrect
Unattempted
Question 3 of 60
3. Question
How can telnet be used to fingerprint a web server?
Correct
Incorrect
Unattempted
Question 4 of 60
4. Question
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up. What is the most likely cause?
Correct
Incorrect
Unattempted
Question 5 of 60
5. Question
You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity. What tool would you most likely select?
Correct
Incorrect
Unattempted
Question 6 of 60
6. Question
Attempting an injection attack on a web server based on responses to True/False questions is called which of the following?
Correct
Incorrect
Unattempted
Question 7 of 60
7. Question
An attacker gains access to a Web servers database and displays the contents of the table that holds all of the names, passwords, and other user information. The attacker did this by entering information into the Web sites user login page that the softwares designers did not expect to be entered. This is an example of what kind of software design problem?
Correct
Incorrect
Unattempted
Question 8 of 60
8. Question
When you are collecting information to perform a data analysis, Google commands are very useful to find sensitive information and files. These files may contain information about passwords, system functions, or documentation.
What command will help you to search files using Google as a search engine?
Correct
If you include site: in your query, Google will restrict your search results to the site or domain you specify. If you include filetype:suffix in your query, Google will restrict the results to pages whose names end in suffix. For example, [ web page evaluation checklist filetype:pdf ] will return Adobe Acrobat pdf files that match the terms “web,” “page,” “evaluation,” and “checklist.”
If you include site: in your query, Google will restrict your search results to the site or domain you specify. If you include filetype:suffix in your query, Google will restrict the results to pages whose names end in suffix. For example, [ web page evaluation checklist filetype:pdf ] will return Adobe Acrobat pdf files that match the terms “web,” “page,” “evaluation,” and “checklist.”
If you include site: in your query, Google will restrict your search results to the site or domain you specify. If you include filetype:suffix in your query, Google will restrict the results to pages whose names end in suffix. For example, [ web page evaluation checklist filetype:pdf ] will return Adobe Acrobat pdf files that match the terms “web,” “page,” “evaluation,” and “checklist.”
The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?
Correct
Incorrect
Unattempted
Question 10 of 60
10. Question
Which of the following is optimized for confidential communications, such as bidirectional voice and video?
Correct
Incorrect
Unattempted
Question 11 of 60
11. Question
As an Ethical Hacker you are capturing traffic from your customer network with Wireshark and you need to find and verify just SMTP traffic. What command in Wireshark will help you to find this kind of traffic?
Correct
Incorrect
Unattempted
Question 12 of 60
12. Question
Which of the following is a protocol specifically designed for transporting event messages?
Correct
Incorrect
Unattempted
Question 13 of 60
13. Question
Which of the following is the successor of SSL?
Correct
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both of which are frequently referred to as SSL, are cryptographic protocols that provide communications security over a computer network.
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both of which are frequently referred to as SSL, are cryptographic protocols that provide communications security over a computer network.
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both of which are frequently referred to as SSL, are cryptographic protocols that provide communications security over a computer network.
Advanced encryption standard is an algorithm used for which of the following?
Correct
Incorrect
Unattempted
Question 16 of 60
16. Question
In order to have an anonymous Internet surf, which of the following is best choice?
Correct
Incorrect
Unattempted
Question 17 of 60
17. Question
A penetration test was done at a company. After the test, a report was written and given to the companys IT authorities. A section from the report is shown below:
a.Access List should be written between VLANs.
b.Port security should be enabled for the intranet.
c.A security solution which filters data packets should be set between intranet (LAN) and DMZ.
d.A WAF should be used in front of the web applications.
According to the section from the report, which of the following choice is true?
Correct
Incorrect
Unattempted
Question 18 of 60
18. Question
You have several plain-text firewall logs that you must review to evaluate network traffic. You know that in order to do fast, efficient searches of the logs you must use regular expressions.
Which command-line utility are you most likely to use?
Correct
grep is a command-line utility for searching plain-text data sets for lines matching a regular expression.
The Open Web Application Security Project (OWASP) is the worldwide not-for-profit charitable organization focused on improving the security of software. What item is the primary concern on OWASPs Top Ten Project Most Critical Web Application Security Risks?
Correct
The top item of the OWASP 2013 OWASPs Top Ten Project Most Critical Web Application Security Risks is injection. Injection flaws, such as SQL, OS, and LDAP injection occur when untrusted data is sent to an interpreter as part of a command or query. The attackers hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.
The top item of the OWASP 2013 OWASPs Top Ten Project Most Critical Web Application Security Risks is injection. Injection flaws, such as SQL, OS, and LDAP injection occur when untrusted data is sent to an interpreter as part of a command or query. The attackers hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.
The top item of the OWASP 2013 OWASPs Top Ten Project Most Critical Web Application Security Risks is injection. Injection flaws, such as SQL, OS, and LDAP injection occur when untrusted data is sent to an interpreter as part of a command or query. The attackers hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.
Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?
Correct
Incorrect
Unattempted
Question 21 of 60
21. Question
Jesse receives an email with an attachment labeled “Court_Notice_21206.zip”. Inside the zip file is a file named “Court_Notice_21206.docx.exe” disguised as a word document. Upon execution, a window appears stating, “This word document is corrupt.” In the background, the file copies itself to Jesse APPDATAlocal directory and begins to beacon to a C2 server to download additional malicious binaries.
What type of malware has Jesse encountered?
Correct
Incorrect
Unattempted
Question 22 of 60
22. Question
In which phase of the ethical hacking process can Google hacking be employed? This is a technique that involves manipulating a search string with specific operators to search for vulnerabilities.
Example: allintitle: root passwd
Correct
Incorrect
Unattempted
Question 23 of 60
23. Question
Which of the following is the greatest threat posed by backups?
Correct
Incorrect
Unattempted
Question 24 of 60
24. Question
For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?
Correct
Incorrect
Unattempted
Question 25 of 60
25. Question
An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?
Correct
Incorrect
Unattempted
Question 26 of 60
26. Question
Which of the following is not a Bluetooth attack?
Correct
Incorrect
Unattempted
Question 27 of 60
27. Question
What statement is true regarding LM hashes?
Correct
Incorrect
Unattempted
Question 28 of 60
28. Question
What is the correct PCAP filter to capture all TCP traffic going to or from host 192.168.0.125 on port 25?
Correct
Incorrect
Unattempted
Question 29 of 60
29. Question
A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.
Based on this information, what should be one of your key recommendations to the bank?
Correct
A DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organizations external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organizations local area network (LAN); an external network node only has direct access to equipment in the DMZ, rather than any other part of the network.
A DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organizations external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organizations local area network (LAN); an external network node only has direct access to equipment in the DMZ, rather than any other part of the network.
A DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organizations external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organizations local area network (LAN); an external network node only has direct access to equipment in the DMZ, rather than any other part of the network.
A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named “nc.” The FTP servers access logs show that the anonymous user account logged in to the server, uploaded the files, and extracted the contents of the tarball and ran the script using a function provided by the FTP servers software. The ps command shows that the nc file is running as process, and the netstat command shows the nc process is listening on a network port.
What kind of vulnerability must be present to make this remote attack possible?
Correct
Incorrect
Unattempted
Question 31 of 60
31. Question
What mechanism in Windows prevents a user from accidentally executing a potentially malicious batch (.bat) or PowerShell (.ps1) script?
Correct
Incorrect
Unattempted
Question 32 of 60
32. Question
Which command lets a tester enumerate alive systems in a class C network via ICMP using native Windows tools?
Correct
Incorrect
Unattempted
Question 33 of 60
33. Question
An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to “www.MyPersonalBank.com”, that the user is directed to a phishing site.
Which file does the attacker need to modify?
Correct
Incorrect
Unattempted
Question 34 of 60
34. Question
An IT employee got a call from one of our best customers. The caller wanted to know about the companys network infrastructure, systems, and team. New opportunities of integration are in sight for both company and customer. What should this employee do?
Correct
Incorrect
Unattempted
Question 35 of 60
35. Question
Ricardo wants to send secret messages to a competitor company. To secure these messages, he uses a technique of hiding a secret message within an ordinary message. The technique provides security through obscurity.
What technique is Ricardo using?
Correct
Incorrect
Unattempted
Question 36 of 60
36. Question
Bob received this text message on his mobile phone: ““Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: [email protected]””. Which statement below is true?
Correct
Incorrect
Unattempted
Question 37 of 60
37. Question
env x=(){ :;};echo exploit bash -c cat /etc/passwd
What is the Shellshock bash vulnerability attempting to do on an vulnerable Linux host?
Correct
To extract private information, attackers are using a couple of techniques. The simplest extraction attacks are in the form: () {:;}; /bin/cat /etc/passwd That reads the password file /etc/passwd, and adds it to the response from the web server. So an attacker injecting this code through the Shellshock vulnerability would see the password file dumped out onto their screen as part of the web page returned.
To extract private information, attackers are using a couple of techniques. The simplest extraction attacks are in the form: () {:;}; /bin/cat /etc/passwd That reads the password file /etc/passwd, and adds it to the response from the web server. So an attacker injecting this code through the Shellshock vulnerability would see the password file dumped out onto their screen as part of the web page returned.
To extract private information, attackers are using a couple of techniques. The simplest extraction attacks are in the form: () {:;}; /bin/cat /etc/passwd That reads the password file /etc/passwd, and adds it to the response from the web server. So an attacker injecting this code through the Shellshock vulnerability would see the password file dumped out onto their screen as part of the web page returned.
An attacker has captured a target file that is encrypted with public key cryptography. Which of the attacks below is likely to be used to crack the target file?
Correct
Incorrect
Unattempted
Question 39 of 60
39. Question
Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, smallsized packets to the target computer, making it very difficult for an IDS to detect the attack signatures.
Which tool can be used to perform session splicing attacks?
Correct
Incorrect
Unattempted
Question 40 of 60
40. Question
The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses which of the following?
Correct
Incorrect
Unattempted
Question 41 of 60
41. Question
Which of the following security operations is used for determining the attack surface of an organization?
Correct
Incorrect
Unattempted
Question 42 of 60
42. Question
What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?
Correct
Incorrect
Unattempted
Question 43 of 60
43. Question
Which of the following is a common Service Oriented Architecture (SOA) vulnerability?
Correct
Incorrect
Unattempted
Question 44 of 60
44. Question
The intrusion detection system at a software development company suddenly generates multiple alerts regarding attacks against the companys external webserver, VPN concentrator, and DNS servers. What should the security team do to determine which alerts to check first?
Correct
Incorrect
Unattempted
Question 45 of 60
45. Question
When you are testing a web application, it is very useful to employ a proxy tool to save every request and response. You can manually test every request and analyze the response to find vulnerabilities. You can test parameter and headers manually to get more precise results than if using web vulnerability scanners.
What proxy tool will help you find web vulnerabilities?
Correct
Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an applications attack surface, through to finding and exploiting security vulnerabilities.
Incorrect
Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an applications attack surface, through to finding and exploiting security vulnerabilities.
Unattempted
Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an applications attack surface, through to finding and exploiting security vulnerabilities.
Question 46 of 60
46. Question
When purchasing a biometric system, one of the considerations that should be reviewed is the processing speed. Which of the following best describes what it is meant by processing?
Correct
Incorrect
Unattempted
Question 47 of 60
47. Question
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?
Correct
Incorrect
Unattempted
Question 48 of 60
48. Question
You are performing information gathering for an important penetration test. You have found pdf, doc, and images in your objective. You decide to extract metadata from these files and analyze it.
What tool will help you with the task?
Correct
Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belonging to a target company.
Metagoofil will perform a search in Google to identify and download the documents to local disk and then will extract the metadata with different libraries like Hachoir, PdfMiner? and others. With the results it will generate a report with usernames, software versions and servers or machine names that will help Penetration testers in the information gathering phase.
Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belonging to a target company.
Metagoofil will perform a search in Google to identify and download the documents to local disk and then will extract the metadata with different libraries like Hachoir, PdfMiner? and others. With the results it will generate a report with usernames, software versions and servers or machine names that will help Penetration testers in the information gathering phase.
Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belonging to a target company.
Metagoofil will perform a search in Google to identify and download the documents to local disk and then will extract the metadata with different libraries like Hachoir, PdfMiner? and others. With the results it will generate a report with usernames, software versions and servers or machine names that will help Penetration testers in the information gathering phase.
How does the Address Resolution Protocol (ARP) work?
Correct
When an incoming packet destined for a host machine on a particular local area network arrives at a gateway, the gateway asks the ARP program to find a physical host or MAC address that matches the IP address. The ARP program looks in the ARP cache and, if it finds the address, provides it so that the packet can be converted to the right packet length and format and sent to the machine. If no entry is found for the IP address, ARP broadcasts a request packet in a special format to all the machines on the LAN to see if one machine knows that it has that IP address associated with it. A machine that recognizes the IP address as its own returns a reply so indicating. ARP updates the ARP cache for future reference and then sends the packet to the MAC address that replied.
When an incoming packet destined for a host machine on a particular local area network arrives at a gateway, the gateway asks the ARP program to find a physical host or MAC address that matches the IP address. The ARP program looks in the ARP cache and, if it finds the address, provides it so that the packet can be converted to the right packet length and format and sent to the machine. If no entry is found for the IP address, ARP broadcasts a request packet in a special format to all the machines on the LAN to see if one machine knows that it has that IP address associated with it. A machine that recognizes the IP address as its own returns a reply so indicating. ARP updates the ARP cache for future reference and then sends the packet to the MAC address that replied.
When an incoming packet destined for a host machine on a particular local area network arrives at a gateway, the gateway asks the ARP program to find a physical host or MAC address that matches the IP address. The ARP program looks in the ARP cache and, if it finds the address, provides it so that the packet can be converted to the right packet length and format and sent to the machine. If no entry is found for the IP address, ARP broadcasts a request packet in a special format to all the machines on the LAN to see if one machine knows that it has that IP address associated with it. A machine that recognizes the IP address as its own returns a reply so indicating. ARP updates the ARP cache for future reference and then sends the packet to the MAC address that replied.
Emil uses nmap to scan two hosts using this command.
nmap -sS -T4 -O 192.168.99.1 192.168.99.7
He receives this output:
Nmap scan report for 192.168.99.1 Host is up (0.00082s latency). Not shown: 994 filtered ports PORT STATE SERVICE 21/tcp open ftp 23/tcp open telnet 53/tcp open domain 80/tcp open http 161/tcp closed snmp MAC Address: B0:75:D5:33:57:74 (ZTE) Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Linux 2.6.9 – 2.6.33 Network Distance: 1 hop
Nmap scan report for 192.168.99.7 Host is up (0.000047s latency). All 1000 scanned ports on 192.168.99.7 are closed Too many fingerprints match this host to give specific OS details Network Distance: 0 hops
What is his conclusion?
Correct
Incorrect
Unattempted
Question 51 of 60
51. Question
The establishment of a TCP connection involves a negotiation called 3 way handshake. What type of message sends the client to the server in order to begin this negotiation?
Correct
Incorrect
Unattempted
Question 52 of 60
52. Question
Rebecca commonly sees an error on her Windows system that states that a Data Execution Prevention (DEP) error has taken place. Which of the following is most likely taking place?
Correct
Incorrect
Unattempted
Question 53 of 60
53. Question
Which of the following parameters enables NMAPs operating system detection feature?
Correct
Incorrect
Unattempted
Question 54 of 60
54. Question
The configuration allows a wired or wireless network interface controller to pass all traffic it receives to the central processing unit (CPU), rather than passing only the frames that the controller is intended to receive.
Which of the following is being described?
Correct
Incorrect
Unattempted
Question 55 of 60
55. Question
What is the correct process for the TCP three-way handshake connection establishment and connection termination?
Correct
Incorrect
Unattempted
Question 56 of 60
56. Question
Which of the following describes the characteristics of a Boot Sector Virus?
Correct
Incorrect
Unattempted
Question 57 of 60
57. Question
Which of the following tools can be used for passive OS fingerprinting?
Correct
Incorrect
Unattempted
Question 58 of 60
58. Question
Smart cards use which protocol to transfer the certificate in a secure manner?
Correct
Incorrect
Unattempted
Question 59 of 60
59. Question
Which of the following is a primary service of the U.S. Computer Security Incident Response Team (CSIRT)?
Correct
Incorrect
Unattempted
Question 60 of 60
60. Question
A big company, who wanted to test their security infrastructure, wants to hire elite pen testers like you. During the interview, they asked you to show sample reports from previous penetration tests. What should you do?
Correct
Incorrect
Unattempted
X
Use Page numbers below to navigate to other practice tests