Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CEH QUESTIONS : PART 11

Which of the following problems can be solved by using Wireshark?

Tracking version changes of source code 

Checking creation dates on all webpages on a server 

 Resetting the administrator password on multiple systems 

Troubleshooting communication resets between two systems

SHOW ANSWER

What kind of risk will remain even if all theoretically possible safety measures would be applied?

 Residual risk 

 Inherent risk

 Impact risk 

Deferred risk

SHOW ANSWER

When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK. How would an attacker exploit this design by launching TCP SYN attack?

 Attacker generates TCP SYN packets with random destination addresses towards a victim host

Attacker floods TCP SYN packets with random source addresses towards a victim host

Attacker generates TCP ACK packets with random source addresses towards a victim host

Attacker generates TCP RST packets with random source addresses towards a victim host

SHOW ANSWER

An NMAP scan of a server shows port 69 is open. What risk could this pose?

Unauthenticated access 

Weak SSL version 

 Cleartext login 

Web portal data leak

SHOW ANSWER

Which of the following is the least-likely physical characteristic to be used in biometric control that supports a large company?

 Height and Weight

Voice 

Fingerprints 

Iris patterns

SHOW ANSWER

Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?

Internet Key Exchange (IKE)

Oakley 

IPsec Policy Agent 

IPsec driver 

SHOW ANSWER

Your company was hired by a small healthcare provider to perform a technical assessment on the network. What is the best approach for discovering vulnerabilities on a Windows-based computer?

Use a scan tool like Nessus 

Use the built-in Windows Update tool

Check MITRE.org for the latest list of CVE findings 

Create a disk image of a clean Windows installation

SHOW ANSWER

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

 ESP transport mode 

AH permiscuous 

ESP confidential 

AH Tunnel mode

SHOW ANSWER

Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?

Nikto 

Snort 

 John the Ripper 

 Dsniff

SHOW ANSWER

In the context of password security, a simple dictionary attack involves loading a dictionary file (a text file full of dictionary words) into a cracking application such as L0phtCrack or John the Ripper, and running it against user accounts located by the application. The larger the word and word fragment selection, the more effective the dictionary attack is. The brute force method is the most inclusive, although slow. It usually tries every possible letter and number combination in its automated exploration. If you would use both brute force and dictionary methods combined together to have variation of words, what would you call such an attack?

Full Blown 

Thorough 

Hybrid 

BruteDics

SHOW ANSWER

A company is using Windows Server 2003 for its Active Directory (AD). What is the most efficient way to crack the passwords for the AD users?

Perform a dictionary attack. 

Perform a brute force attack. 

Perform an attack with a rainbow table

Perform a hybrid attack. 

SHOW ANSWER

Initiating an attack against targeted businesses and organizations, threat actors compromise a carefully selected website by inserting an exploit resulting in malware infection. The attackers run exploits on well-known and trusted sites likely to be visited by their targeted victims. Aside from carefully choosing sites to compromise, these attacks are known to incorporate zero-day exploits that target unpatched vulnerabilities. Thus, the targeted entities are left with little or no defense against these exploits. What type of attack is outlined in the scenario?

Watering Hole Attack 

Heartbleed Attack 

Shellshock Attack 

Spear Phising Attack

SHOW ANSWER

Nedved is an IT Security Manager of a bank in his country. One day. he found out that there is a security breach to his company's email server based on analysis of a suspicious connection from the email server to an unknown IP Address. What is the first thing that Nedved needs to do before contacting the incident response team?

 Leave it as it Is and contact the incident response te3m right away 

Block the connection to the suspicious IP Address from the firewall 

Disconnect the email server from the network 

Migrate the connection to the backup email server

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in