Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CEH QUESTIONS : PART 17

Which of the following is a strong post designed to stop a car?

Gate 

Fence 

Bollard 

Reinforced rebar

SHOW ANSWER

Which of the following describes a component of Public Key Infrastructure (PKI) where a copy of a private key is stored to provide third-party access and to facilitate recovery operations?

Key registry 

Recovery agent 

Directory 

Key escrow

SHOW ANSWER

A hacker named Jack is trying to compromise a bank's computer system. He needs to know the operating system of that computer to launch further attacks. What process would help him?

Banner Grabbing 

IDLE/IPID Scanning 

SSDP Scanning 

UDP Scanning

SHOW ANSWER

Which of the following network attacks takes advantage of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?

Teardrop 

SYN flood 

Smurf attack 

Ping of death

SHOW ANSWER

What are the three types of compliance that the Open Source Security Testing Methodology Manual (OSSTMM) recognizes?

Legal, performance, audit 

Audit, standards based, regulatory 

Contractual, regulatory, industry 

Legislative, contractual, standards based

SHOW ANSWER

In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?

Chosen-plaintext attack 

Ciphertext-only attack 

Adaptive chosen-plaintext attack 

Known-plaintext attack

SHOW ANSWER

Which of the following DoS tools is used to attack target web applications by starvation of available sessions on the web server? The tool keeps sessions at halt using never-ending POST transmissions and sending an arbitrarily large content-length header value

My Doom 

Astacheldraht 

R-U-Dead-Yet?(RUDY) 

LOIC

SHOW ANSWER

You are trying to break into a highly classified top-secret mainframe computer with highest security system in place at Merclyn Barley Bank located in Los Angeles. You know that conventional hacking doesn't work in this case, because organizations such as banks are generally tight and secure when it comes to protecting their systems. In other words, you are trying to penetrate an otherwise impenetrable system. How would you proceed?

Look for "zero-day" exploits at various underground hacker websites in Russia and China and buy the necessary exploits from these hackers and target the bank's network 

Try to hang around the local pubs or restaurants near the bank, get talking to a poorly-paid or disgruntled employee, and offer them money if they'll abuse their access privileges by providing you with sensitive information 

Launch DDOS attacks against Merclyn Barley Bank's routers and firewall systems using 100, 000 or more "zombies" and "bots" 

Try to conduct Man-in-the-Middle (MiTM) attack and divert the network traffic going to the Merclyn Barley Bank's Webserver to that of your machine using DNS Cache Poisoning techniques

SHOW ANSWER

What is the algorithm used by LM for Windows2000 SAM?

MD4 

DES 

SHA 

SSL

SHOW ANSWER

A Certificate Authority (CA) generates a key pair that will be used for encryption and decryption of email. The integrity of the encrypted email is dependent on the security of which of the following?

Public key 

Private key 

Modulus length 

Email server certificate

SHOW ANSWER

Which command lets a tester enumerate alive systems in a class C network via ICMP using native Windows tools?

ping 192.168.2. 

ping 192.168.2.255 

for %V in (1 1 255) do PING 192.168.2.%V 

for /L %V in (1 1 254) do PING -n 1 192.168.2.%V | FIND /I "Reply"

SHOW ANSWER

How do employers protect assets with security policies pertaining to employee surveillance activities?

Employers promote monitoring activities of employees as long as the employees demonstrate trustworthiness. 

Employers use informal verbal communication channels to explain employee monitoring activities to employees. 

Employers use network surveillance to monitor employee email traffic, network access, and to record employee keystrokes. 

Employers provide employees written statements that clearly discuss the boundaries of monitoring activities and consequences.

SHOW ANSWER

Which type of Nmap scan is the most reliable, but also the most visible, and likely to be picked up by and IDS?

SYN scan 

ACK scan 

RST scan 

Connect scan 

FIN scan

SHOW ANSWER

> NMAP -sn 192.168.11.200-215 The NMAP command above performs which of the following?

A ping scan 

 A trace sweep 

An operating system detect

A port scan

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in