Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CEH QUESTIONS : PART 49

WPA2 uses AES for wireless data encryption at which of the following encryption levels?

64 bit and CCMP 

128 bit and CRC 

128 bit and CCMP 

128 bit and TKIP

SHOW ANSWER

While examining audit logs, you discover that people are able to telnet into the SMTP server on port 25. You would like to block this, though you do not see any evidence of an attack or other wrong doing. However, you are concerned about affecting the normal functionality of the email server. From the following options choose how best you can achieve this objective?

Block port 25 at the firewall. 

Shut off the SMTP service on the server. 

Force all connections to use a username and password. 

Switch from Windows Exchange to UNIX Sendmail. 

None of the above.

SHOW ANSWER

A virus that attempts to install itself inside the file it is infecting is called?

 Tunneling virus 

Cavity virus 

Polymorphic virus 

Stealth virus

SHOW ANSWER

Which NMAP command combination would let a tester scan every TCP port from a class C network that is blocking ICMP with fingerprinting and service detection?

NMAP -PN -A -O -sS 192.168.2.0/24 

NMAP -P0 -A -O -p1-65535 192.168.0/24 

NMAP -P0 -A -sT -p0-65535 192.168.0/16 

NMAP -PN -O -sS -p 1-1024 192.168.0/8

SHOW ANSWER

Port scanning can be used as part of a technical assessment to determine network vulnerabilities. The TCP XMAS scan is used to identify listening ports on the targeted system. If a scanned port is open, what happens?

The port will ignore the packets. 

The port will send an RST. 

The port will send an ACK. 

The port will send a SYN

SHOW ANSWER

Which type of security feature stops vehicles from crashing through the doors of a building?

 Turnstile 

Bollards 

Mantrap 

Receptionist

SHOW ANSWER

Which of the following programs is usually targeted at Microsoft Office products?

 Polymorphic virus 

Multipart virus

Macro virus 

Stealth virus

SHOW ANSWER

An engineer is learning to write exploits in C++ and is using the exploit tool Backtrack. The engineer wants to compile the newest C++ exploit and name it calc.exe. Which command would the engineer use to accomplish this?

 g++ hackersExploit.cpp -o calc.exe 

g++ hackersExploit.py -o calc.exe 

g++ -i hackersExploit.pl -o calc.exe 

g++ --compile -i hackersExploit.cpp -o calc.exe

SHOW ANSWER

An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network's external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

Protocol analyzer

Intrusion Prevention System (IPS) 

Network sniffer 

Vulnerability scanner

SHOW ANSWER

A server has been infected by a certain type of Trojan. The hacker intended to utilize it to send and host junk mails. What type of Trojan did the hacker use?

 Turtle Trojans 

Ransomware Trojans 

Botnet Trojan 

Banking Trojans

SHOW ANSWER

What results will the following command yield: 'NMAP -sS -O -p 123-153 192.168.100.3'?

A stealth scan, opening port 123 and 153 

A stealth scan, checking open ports 123 to 153 

A stealth scan, checking all open ports excluding ports 123 to 153 

A stealth scan, determine operating system, and scanning ports 123 to 153

SHOW ANSWER

What does a type 3 code 13 represent? (Choose two.)

Echo request 

Destination unreachable 

Network unreachable

Administratively prohibited 

Port unreachable 

Time exceeded

SHOW ANSWER

Which access control mechanism allows for multiple systems to use a central authentication server (CAS) that permits users to authenticate once and gain access to multiple systems?

Role Based Access Control (RBAC) 

Discretionary Access Control (DAC) 

Windows authentication 

Single sign-on 

SHOW ANSWER

A hacker is attempting to see which ports have been left open on a network. Which NMAP switch would the hacker use?

 -sO 

-sP 

 -sS

-sU

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in