Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CEH QUESTIONS : PART 54

Which Open Web Application Security Project (OWASP) implements a web application full of known vulnerabilities?

WebBugs

WebGoat 

VULN_HTML 

WebScarab

SHOW ANSWER

Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.

SQL injection attack 

Cross-Site Scripting (XSS) 

LDAP Injection attack 

Cross-Site Request Forgery (CSRF)

SHOW ANSWER

You have successfully gained access to a linux server and would like to ensure that the succeeding outgoing traffic from this server will not be caught by a Network Based Intrusion Detection Systems (NIDS). What is the best way to evade the NIDS?

Encryption 

Protocol Isolation 

Alternate Data Streams 

Out of band signalling

SHOW ANSWER

What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?

All are hacking tools developed by the legion of doom 

All are tools that can be used not only by hackers, but also security personnel 

All are DDOS tools 

All are tools that are only effective against Windows E. All are tools that are only effective against Linux

SHOW ANSWER

The purpose of a __________ is to deny network access to local area networks and other information assets by unauthorized wireless devices.

Wireless Intrusion Prevention System 

Wireless Access Point 

Wireless Access Control List 

Wireless Analyzer

SHOW ANSWER

An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?

 He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer. 

He will activate OSPF on the spoofed root bridge. 

He will repeat the same attack against all L2 switches of the network. 

He will repeat this action so that it escalates to a DoS attack.

SHOW ANSWER

Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?

 768 bit key 

1025 bit key 

1536 bit key 

 2048 bit key

SHOW ANSWER

Which among the following is a Windows command that a hacker can use to list all the shares to which the current user context has access?

NET FILE 

NET USE 

NET CONFIG

NET VIEW

SHOW ANSWER

If executives are found liable for not properly protecting their company's assets and information systems, what type of law would apply in this situation?

 Civil

International 

Criminal 

Common

SHOW ANSWER

What is the following command used for? net use \targetipc$ "" /u:""

Grabbing the etc/passwd file 

Grabbing the SAM 

Connecting to a Linux computer through Samba. 

This command is used to connect as a null session 

Enumeration of Cisco routers 

SHOW ANSWER

What hacking attack is challenge/response authentication used to prevent?

 Replay attacks 

Scanning attacks 

Session hijacking attacks 

Password cracking attacks

SHOW ANSWER

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?

SHA-2 

SHA-3 

SHA-1 

SHA-0

SHOW ANSWER

In order to show improvement of security over time, what must be developed?

Reports 

Testing tools 

Metrics 

Taxonomy of vulnerabilities

SHOW ANSWER

Due to a slowdown of normal network operations, IT department decided to monitor internet traffic for all of the employees. From a legal stand point, what would be troublesome to take this kind of measure?

All of the employees would stop normal work activities 

 IT department would be telling employees who the boss is 

Not informing the employees that they are going to be monitored could be an invasion of privacy. 

The network could still experience traffic slow down.

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in