Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CEH QUESTIONS : PART 52

If you are to determine the attack surface of an organization, which of the following is the BEST thing to do?

Running a network scan to detect network services in the corporate DMZ 

Reviewing the need for a security clearance for each employee 

Using configuration management to determine when and where to apply security patches 

Training employees on the security policy regarding social engineering

SHOW ANSWER

Which is the first step followed by Vulnerability Scanners for scanning a network?

TCP/UDP Port scanning 

Firewall detection 

OS Detection 

Checking if the remote host is alive

SHOW ANSWER

While testing the company's web applications, a tester attempts to insert the following test script into the search area on the company's web site: < script>alert(" Testing Testing Testing ") Afterwards, when the tester presses the search button, a pop-up box appears on the screen with the text: "Testing Testing Testing". Which vulnerability has been detected in the web application?

Buffer overflow 

Cross-site request forgery 

Distributed denial of service

Cross-site scripting 

SHOW ANSWER

Which system consists of a publicly available set of databases that contain domain name registration contact information?

WHOIS 

 IANA 

CAPTCHA 

IETF

SHOW ANSWER

A pen tester is configuring a Windows laptop for a test. In setting up Wireshark, what river and library are required to allow the NIC to work in promiscuous mode?

 Libpcap 

Awinpcap 

Winprom 

Winpcap

SHOW ANSWER

You perform a scan of your company's network and discover that TCP port 123 is open. What services by default run on TCP port 123?

 Telnet 

POP3 

Network Time Protocol 

DNS

SHOW ANSWER

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

tcpdump 

nessus 

etherea 

Jack the ripper

SHOW ANSWER

Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students. He identified this when the IDS alerted for malware activities in the network. What should Bob do to avoid this problem?

Disable unused ports in the switches 

Separate students in a different VLAN 

Use the 802.1x protocol 

Ask students to use the wireless network

SHOW ANSWER

While performing ping scans into a target network you get a frantic call from the organization's security team. They report that they are under a denial of service attack. When you stop your scan, the smurf attack event stops showing up on the organization's IDS monitor. How can you modify your scan to prevent triggering this event in the IDS?

Scan more slowly. 

Do not scan the broadcast IP. 

Spoof the source IP address. 

Only scan the Windows systems

SHOW ANSWER

While doing a technical assessment to determine network vulnerabilities, you used the TCP XMAS scan. What would be the response of all open ports?

The port will send an ACK

The port will send a SYN

The port will ignore the packets 

The port will send an RST

SHOW ANSWER

Which of the following techniques will identify if computer files have been changed?

 Network sniffing 

Permission sets 

Integrity checking hashes 

Firewall alerts

SHOW ANSWER

Which tool would be used to collect wireless packet data?

NetStumbler 

John the Ripper 

Nessus 

Netcat

SHOW ANSWER

You are a security officer of a company. You had an alert from IDS that indicates that one PC on your Intranet is connected to a blacklisted IP address (C2 Server) on the Internet. The IP address was blacklisted just before the alert. You are staring an investigation to roughly analyze the severity of the situation. Which of the following is appropriate to analyze?

Event logs on the PC

Internet Firewall/Proxy log 

IDS log 

Event logs on domain controller

SHOW ANSWER

The network administrator for a company is setting up a website with e-commerce capabilities. Packet sniffing is a concern because credit card information will be sent electronically over the Internet. Customers visiting the site will need to encrypt the data with HTTPS. Which type of certificate is used to encrypt and decrypt the data?

Asymmetric 

Confidential 

Symmetric 

Non-confidential

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in