Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CEH QUESTIONS : PART 26

If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?

 Birthday 

Brute force 

Man-in-the-middle

Smurf

SHOW ANSWER

Which of the following is designed to identify malicious attempts to penetrate systems?

 Intrusion Detection System 

Firewall 

Proxy 

Router

SHOW ANSWER

Which of the following is assured by the use of a hash?

 Integrity 

Confidentiality 

Authentication 

Availability

SHOW ANSWER

What is the minimum number of network connections in a multi homed firewall?

3

5

4

2

SHOW ANSWER

How does the Address Resolution Protocol (ARP) work?

It sends a request packet to all the network elements, asking for the MAC address from a specific IP. 

It sends a reply packet to all the network elements, asking for the MAC address from a specific IP. 

It sends a reply packet for a specific IP, asking for the MAC address. 

It sends a request packet to all the network elements, asking for the domain name from a specific IP.

SHOW ANSWER

Which security strategy requires using several, varying methods to protect IT systems against attacks?

Defense in depth 

Three-way handshake

Covert channels

Exponential backoff algorithm

SHOW ANSWER

Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?

Port scanning 

Banner grabbing 

Injecting arbitrary data 

Analyzing service response

SHOW ANSWER

How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?

There is no way to tell because a hash cannot be reversed 

The right most portion of the hash is always the same

The hash always starts with AB923D 

The left most portion of the hash is always the same 

A portion of the hash will be all 0's

SHOW ANSWER

Which of the following guidelines or standards is associated with the credit card industry?

A. Control Objectives for Information and Related Technology (COBIT) 

Sarbanes-Oxley Act (SOX) 

Health Insurance Portability and Accountability Act (HIPAA) 

Payment Card Industry Data Security Standards (PCI DSS)

SHOW ANSWER

What is the main difference between a "Normal" SQL Injection and a "Blind" SQL Injection vulnerability?

The request to the web server is not visible to the administrator of the vulnerable application.

The attack is called "Blind" because, although the application properly filters user input, it is still 

 The successful attack does not show an error message to the administrator of the affected application. 

The vulnerable application does not display errors with information about the injection results to the attacker. 

SHOW ANSWER

Fingerprinting an Operating System helps a cracker because:

 It defines exactly what software you have installed 

It opens a security-delayed window based on the port being scanned 

It doesn't depend on the patches that have been applied to fix existing security holes

It informs the cracker of which vulnerabilities he may be able to exploit on your system

SHOW ANSWER

You are attempting to man-in-the-middle a session. Which protocol will allow you to guess a sequence number?

 TCP 

UPD 

ICMP 

UPX

SHOW ANSWER

First thing you do every office day is to check your email inbox. One morning, you received an email from your best friend and the subject line is quite strange. What should you do?

 Delete the email and pretend nothing happened. 

Forward the message to your supervisor and ask for her opinion on how to handle the situation. 

Forward the message to your company's security response team and permanently delete the messagefrom your computer. 

Reply to the sender and ask them for more information about the message contents. 

SHOW ANSWER

During a blackbox pen test you attempt to pass IRC traffic over port 80/TCP from a compromised web enabled host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded. What type of firewall is inspecting outbound traffic?

Application 

Circuit 

Stateful

Packet Filtering

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in