Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CEH QUESTIONS : PART 4

A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed. Which security policy must the security analyst check to see if dial-out modems are allowed?

Firewall-management policy 

 Acceptable-use policy 

 Remote-access policy 

Permissive policy 

SHOW ANSWER

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: "FTP on the network!";)

An Intrusion Detection System

A firewall IPTable

 A Router IPTable 

FTP Server rule

SHOW ANSWER

Which of the following open source tools would be the best choice to scan a network for potential targets?

NMAP

NIKTO 

CAIN 

John the Ripper

SHOW ANSWER

Which of the following is the successor of SSL?

 TLS

RSA

 GRE

 IPSec

SHOW ANSWER

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?

Kismet 

 Nessus

 Netstumbler 

 Abel 

SHOW ANSWER

Under what conditions does a secondary name server request a zone transfer from a primary name server?

When a primary SOA is higher that a secondary SOA 

When a secondary SOA is higher that a primary SOA 

 When a primary name server has had its service restarted 

 When a secondary name server has had its service restarted

When the TTL falls to zero

SHOW ANSWER

Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?

SHA-1 

MD5 

 HAVAL 

MD4

SHOW ANSWER

You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers will never be able to gain access to your network with complex security system in place. Your peer, Peter Smith who works at the same department disagrees with you. He says even the best network security technologies cannot prevent hackers gaining access to the network because of presence of "weakest link" in the security chain. What is Peter Smith talking about?

Untrained staff or ignorant computer users who inadvertently become the weakest link in your security chain 

"zero-day" exploits are the weakest link in the security chain since the IDS will not be able to detect these attacks

 "Polymorphic viruses" are the weakest link in the security chain since the Anti-Virus scanners will not be able to detect these attacks

Continuous Spam e-mails cannot be blocked by your security system since spammers use different techniques to bypass the filters in your gateway

SHOW ANSWER

Which of the following types of firewalls ensures that the packets are part of the established session?

 Stateful inspection firewall 

Circuit-level firewall 

Application-level firewall 

Switch-level firewall

SHOW ANSWER

You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine. What wireshark filter will show the connections from the snort machine to kiwi syslog machine?

 tcp.dstport==514 && ip.dst==192.168.0.150

 tcp.srcport==514 && ip.src==192.168.0.99 

 tcp.dstport==514 && ip.dst==192.168.0.0/16 

tcp.srcport==514 && ip.src==192.168.150

SHOW ANSWER

Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?

 Restore a random file. 

Perform a full restore. 

 Read the first 512 bytes of the tape.

Read the last 512 bytes of the tape

SHOW ANSWER

What would you type on the Windows command line in order to launch the Computer Management Console provided that you are logged in as an admin?

c:\compmgmt.msc 

 c:\gpedit 

 c:\ncpa.cpl 

 c:\services.msc

SHOW ANSWER

What is the role of test automation in security testing?

It can accelerate benchmark tests and repeat them with a consistent test setup. But it cannot replace manual testing completely.

 It is an option but it tends to be very expensive

It should be used exclusively. Manual testing is outdated because of low speed and possible test setup inconsistencies. 

Test automation is not usable in security due to the complexity of the tests.

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in