Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CEH QUESTIONS : PART 5

Which of the following tools is used to analyze the files produced by several packet-capture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?

tcptrace 

tcptraceroute 

 Nessus 

OpenVAS

SHOW ANSWER

Which protocol is used for setting up secured channels between two devices, typically in VPNs?

IPSEC

 PEM

 SET

 PPP 

SHOW ANSWER

What is the approximate cost of replacement and recovery operation per year of a hard drive that has a value of $300 given that the technician who charges $10/hr would need 10 hours to restore OS and Software and needs further 4 hours to restore the database from the last backup to the new hard disk? Calculate the SLE, ARO, and ALE. Assume the EF = 1 (100%

$440 

$100 

$1320

$146

SHOW ANSWER

A recently hired network security associate at a local bank was given the responsibility to perform daily scans of the internal network to look for unauthorized devices. The employee decides to write a script that will scan the network for unauthorized devices every morning at 5:00 am. Which of the following programming languages would most likely be used?

 PHP 

 C# 

Python

 ASP.NET 

SHOW ANSWER

As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing. What document describes the specifics of the testing, the associated violations, and essentially protects both the organization's interest and your liabilities as a tester?

Terms of Engagement 

 Project Scope 

. Non-Disclosure Agreement 

Service Level Agreement

SHOW ANSWER

When comparing the testing methodologies of Open Web Application Security Project (OWASP) and Open Source Security Testing Methodology Manual (OSSTMM) the main difference is

OWASP is for web applications and OSSTMM does not include web applications. 

OSSTMM is gray box testing and OWASP is black box testing. 

OWASP addresses controls and OSSTMM does not. 

 OSSTMM addresses controls and OWASP does not. 

SHOW ANSWER

The establishment of a TCP connection involves a negotiation called 3 way handshake. What type of message sends the client to the server in order to begin this negotiation?

 RST

 ACK 

 SYN-ACK

SYN 

SHOW ANSWER

Which protocol is used for setting up secure channels between two devices, typically in VPNs?

PPP

 IPSEC 

PEM 

SET 

SHOW ANSWER

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?

Residual risk 

Inherent risk 

Deferred risk 

 Impact risk

SHOW ANSWER

Peter, a Network Administrator, has come to you looking for advice on a tool that would help him perform SNMP enquires over the network. Which of these tools would do the SNMP enumeration he is looking for? Select the best answers.

SNMPUtil 

. SNScan 

 SNMPScan

Solarwinds IP Network Browser 

NMap

SHOW ANSWER

Which of the following represents the initial two commands that an IRC client sends to join an IRC network?

USER, NICK 

LOGIN, NICK 

 USER, PASS

LOGIN, USER 

SHOW ANSWER

An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections. When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML code?

 Wireshark 

 Ettercap

Aircrack-ng 

Tcpdump

SHOW ANSWER

Craig received a report of all the computers on the network that showed all the missing patches and weak passwords. What type of software generated this report?

a port scanner

a vulnerability scanner 

 a virus scanner 

a malware scanner

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in