Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CEH QUESTIONS : PART 23

The network administrator at Spears Technology, Inc has configured the default gateway Cisco router's access-list as below: You are hired to conduct security testing on their network. You successfully brute-force the SNMP community string using a SNMP crack tool. The access-list configured at the router prevents you from establishing a successful connection. You want to retrieve the Cisco configuration from the router. How would you proceed?

Use the Cisco's TFTP default password to connect and download the configuration file 

 Run a network sniffer and capture the returned traffic with the configuration file from the router 

Run Generic Routing Encapsulation (GRE) tunneling protocol from your computer to the router masking your IP address 

Send a customized SNMP set request with a spoofed source IP address in the range -192.168.1.0

SHOW ANSWER

In order to prevent particular ports and applications from getting packets into an organization, what does a firewall check?

Network layer headers and the session layer port numbers 

Presentation layer headers and the session layer port numbers 

Application layer port numbers and the transport layer headers 

Transport layer port numbers and application layer headers

SHOW ANSWER

You have successfully gained access to your client's internal network and successfully comprised a Linux server which is part of the internal IP network. You want to know which Microsoft Windows workstations have file sharing enabled. Which port would you see listening on these Windows machines in the network?

 445 

3389 

161 

1433

SHOW ANSWER

The following are types of Bluetooth attack EXCEPT_____?

Bluejacking 

Bluesmaking 

Bluesnarfing 

Bluedriving

SHOW ANSWER

Destination unreachable administratively prohibited messages can inform the hacker to what?

That a circuit level proxy has been installed and is filtering traffic 

That his/her scans are being blocked by a honeypot or jail 

That the packets are being malformed by the scanning software

That a router or other packet-filtering device is blocking traffic 

That the network is functioning normally

SHOW ANSWER

A possibly malicious sequence of packets that were sent to a web server has been captured by an Intrusion Detection System (IDS) and was saved to a PCAP file. As a network administrator, you need to determine whether this packets are indeed malicious. What tool are you going to use?

Intrusion Prevention System (IPS) 

Vulnerability scanner 

Protocol analyzer 

Network sniffer

SHOW ANSWER

Which results will be returned with the following Google search query? site:target.com -site:Marketing.target.com accounting

Results matching all words in the query 

Results matching "accounting" in domain target.com but not on the site Marketing.target.com

Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting 

Results for matches on target.com and Marketing.target.com that include the word "accounting" 

SHOW ANSWER

What is the most common method to exploit the "Bash Bug" or "ShellShock" vulnerability?

Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server 

Manipulate format strings in text fields 

SSH 

SYN Flood

SHOW ANSWER

It is an entity or event with the potential to adversely impact a system through unauthorized access, destruction, disclosure, denial of service or modification of data. Which of the following terms best matches the definition?

Threat 

Attack 

Vulnerability 

Risk 

SHOW ANSWER

Which of the following cryptography attack methods is usually performed without the use of a computer?

 Ciphertext-only attack 

Chosen key attack

Rubber hose attack 

Rainbow table attack

SHOW ANSWER

Which statement best describes a server type under an N-tier architecture?

 A group of servers at a specific layer 

A single server with a specific role 

A group of servers with a unique role 

A single server at a specific layer

SHOW ANSWER

When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?

Vulnerability scanning 

Social engineering 

Application security testing 

Network sniffing 

SHOW ANSWER

Which statement is TRUE regarding network firewalls preventing Web Application attacks?

Network firewalls can prevent attacks because they can detect malicious HTTP traffic. 

Network firewalls cannot prevent attacks because ports 80 and 443 must be opened. 

Network firewalls can prevent attacks if they are properly configured. 

Network firewalls cannot prevent attacks because they are too complex to configure.

SHOW ANSWER

You work as a Security Analyst for a retail organization. In securing the company's network, you set up a firewall and an IDS. However, hackers are able to attack the network. After investigating, you discover that your IDS is not configured properly and therefore is unable to trigger alarms when needed. What type of alert is the IDS giving?

 False Negative 

False Positive 

True Negative 

True Positive

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in