Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CEH QUESTIONS : PART 46

An attacker has been successfully modifying the purchase price of items purchased on the company's web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the Intrusion Detection System (IDS) logs and found no attacks that could have caused this. What is the mostly likely way the attacker has been able to modify the purchase price?

By using SQL injection 

By changing hidden form values

By using cross site scripting 

By utilizing a buffer overflow attack

SHOW ANSWER

Which of the following is an extremely common IDS evasion technique in the web world?

unicode characters

spyware 

port knocking 

subnetting

SHOW ANSWER

The configuration allows a wired or wireless network interface controller to pass all traffic it receives to the central processing unit (CPU), rather than passing only the frames that the controller is intended to receive. Which of the following is being described?

promiscuous mode 

port forwarding 

multi-cast mode 

WEM 

SHOW ANSWER

Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations. Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA. In this context, what can you say?

 Bob can be right since DMZ does not make sense when combined with stateless firewalls 

Bob is partially right. He does not need to separate networks if he can create rules by destination IPs, one by one 

Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations 

Bob is partially right. DMZ does not make sense when a stateless firewall is available

SHOW ANSWER

Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"?

 Overloading Port Address Translation 

Dynamic Port Address Translation 

Dynamic Network Address Translation 

Static Network Address Translation

SHOW ANSWER

Which of the following is a passive wireless packet analyzer that works on Linux-based systems?

Burp Suite 

 OpenVAS 

 tshark 

Kismet 

SHOW ANSWER

Which of the following is the greatest threat posed by backups?

 A backup is the source of Malware or illicit information. 

A backup is unavailable during disaster recovery. 

A backup is incomplete because no verification was performed. 

An un-encrypted backup can be misplaced or stolen. 

SHOW ANSWER

Which Type of scan sends a packets with no flags set?

Open Scan 

Null Scan 

Xmas Scan

Half-Open Scan

SHOW ANSWER

Ricardo wants to send secret messages to a competitor company. To secure these messages, he uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Ricardo using?

Steganography 

Public-key cryptography

RSA algorithm 

Encryption

SHOW ANSWER

Employees in a company are no longer able to access Internet web sites on their computers. The network administrator is able to successfully ping IP address of web servers on the Internet and is able to open web sites by using an IP address in place of the URL. The administrator runs the nslookup command for www.eccouncil.org and receives an error message stating there is no response from the server. What should the administrator do next?

Configure the firewall to allow traffic on TCP ports 53 and UDP port 53. 

Configure the firewall to allow traffic on TCP ports 80 and UDP port 443.

Configure the firewall to allow traffic on TCP port 53. 

Configure the firewall to allow traffic on TCP port 8080.

SHOW ANSWER

Which of the following BEST describes the mechanism of a Boot Sector Virus?

Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR 

Moves the MBR to another location on the RAM and copies itself to the original location of the MBR 

Overwrites the original MBR and only executes the new virus code 

Modifies directory table entries so that directory entries point to the virus code instead of the actual program

SHOW ANSWER

ou are looking for SQL injection vulnerability by sending a special character to web applications. Which of the following is the most useful for quick validation?

Double quotation 

Backslash 

Semicolon 

Single quotation

SHOW ANSWER

Why should the security analyst disable/remove unnecessary ISAPI filters?

 To defend against social engineering attacks

To defend against webserver attacks 

To defend against jailbreaking 

To defend against wireless attacks

SHOW ANSWER

When a security analyst prepares for the formal security assessment - what of the following should be done in order to determine inconsistencies in the secure assets database and verify that system is compliant to the minimum security baseline?

Data items and vulnerability scanning

Interviewing employees and network engineers 

Reviewing the firewalls configuration 

Source code review

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in