Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CEH QUESTIONS : PART 40

Which of the following statements is TRUE?

 Sniffers operate on Layer 2 of the OSI model 

Sniffers operate on Layer 3 of the OSI model 

 Sniffers operate on both Layer 2 & Layer 3 of the OSI model. 

Sniffers operate on the Layer 1 of the OSI model

SHOW ANSWER

While performing data validation of web content, a security technician is required to restrict malicious input. Which of the following processes is an efficient way of restricting malicious input?

Validate web content input for query strings. 

Validate web content input with scanning tools. 

Validate web content input for type, length, and range.

Validate web content input for extraneous queries.

SHOW ANSWER

A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?

Perform a vulnerability scan of the system. 

Determine the impact of enabling the audit feature. 

Perform a cost/benefit analysis of the audit feature. 

Allocate funds for staffing of audit log review.

SHOW ANSWER

Firewalls are the software or hardware systems that are able to control and monitor the traffic coming in and out the target network based on pre-defined set of rules. Which of the following types of firewalls can protect against SQL injection attacks?

Data-driven firewall 

Stateful firewall 

Packet firewall 

Web application firewall 

SHOW ANSWER

Which of these options is the most secure procedure for storing backup tapes?

 In a climate controlled facility offsite 

On a different floor in the same building 

Inside the data center for faster retrieval in a fireproof safe 

In a cool dry environment

SHOW ANSWER

Which of the following items of a computer system will an anti-virus program scan for viruses?

Boot Sector 

Deleted Files 

Windows Process List 

Password Protected Files 

SHOW ANSWER

When conducting a penetration test, it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network. Which of the following cannot be performed by the passive network sniffing?

Identifying operating systems, services, protocols and devices 

Modifying and replaying captured network traffic 

Collecting unencrypted information about usernames and passwords 

Capturing a network traffic for further analysis

SHOW ANSWER

Passive reconnaissance involves collecting information through which of the following?

 Social engineering 

Network traffic sniffing 

Man in the middle attacks

Publicly accessible sources

SHOW ANSWER

In cryptanalysis and computer security, 'pass the hash' is a hacking technique that allows an attacker to authenticate to a remote server/service by using the underlying NTLM and/or LanMan hash of a user's password, instead of requiring the associated plaintext password as is normally the case. Metasploit Framework has a module for this technique: psexec. The psexec module is often used by penetration testers to obtain access to a given system that you already know the credentials for. It was written by sysinternals and has been integrated within the framework. Often as penetration testers, successfully gain access to a system through some exploit, use meterpreter to grab the passwords or other methods like fgdump, pwdump, or cachedump and then utilize rainbowtables to crack those hash values. Which of the following is true hash type and sort order that is using in the psexec module's 'smbpass'?

NT:LM 

LM:NT 

LM:NTLM 

NTLM:LM

SHOW ANSWER

Which of the following descriptions is true about a static NAT?

 A static NAT uses a many-to-many mapping. 

A static NAT uses a one-to-many mapping. 

A static NAT uses a many-to-one mapping. 

A static NAT uses a one-to-one mapping.

SHOW ANSWER

Security Policy is a definition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like Computer Security Policy, Information Protection Policy, Information Security Policy, network Security Policy, Physical Security Policy, Remote Access Policy, and User Account Policy. What is the main theme of the sub-policies for Information Technologies?

 Availability, Non-repudiation, Confidentiality 

 Authenticity, Integrity, Non-repudiation 

Confidentiality, Integrity, Availability 

Authenticity, Confidentiality, Integrity

SHOW ANSWER

What are two things that are possible when scanning UDP ports? (Choose two.)

A reset will be returned 

An ICMP message will be returned 

The four-way handshake will not be completed 

An RFC 1294 message will be returned 

Nothing

SHOW ANSWER

Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?

 har.txt 

SAM file 

wwwroot 

Repair file

SHOW ANSWER

The precaution of prohibiting employees from bringing personal computing devices into a facility is what type of security control?

Physical 

Procedural 

Technical 

Compliance

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in