Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CEH QUESTIONS : PART 56

Which protocol is used for setting up secured channels between two devices, typically in VPNs?

 IPSEC 

PEM 

SET

PPP

SHOW ANSWER

What is the approximate cost of replacement and recovery operation per year of a hard drive that has a value of $300 given that the technician who charges $10/hr would need 10 hours to restore OS and Software and needs further 4 hours to restore the database from the last backup to the new hard disk? Calculate the SLE, ARO, and ALE. Assume the EF = 1 (100%).

$440

$100 

 $1320 

$146

SHOW ANSWER

A recently hired network security associate at a local bank was given the responsibility to perform daily scans of the internal network to look for unauthorized devices. The employee decides to write a script that will scan the network for unauthorized devices every morning at 5:00 am. Which of the following programming languages would most likely be used?

PHP 

C# 

Python 

 ASP.NET 

SHOW ANSWER

As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing. What document describes the specifics of the testing, the associated violations, and essentially protects both the organization's interest and your liabilities as a tester?

 Terms of Engagement 

Project Scope 

Non-Disclosure Agreement 

Service Level Agreement

SHOW ANSWER

When comparing the testing methodologies of Open Web Application Security Project (OWASP) and Open Source Security Testing Methodology Manual (OSSTMM) the main difference is

OWASP is for web applications and OSSTMM does not include web applications. 

OSSTMM is gray box testing and OWASP is black box testing. 

OWASP addresses controls and OSSTMM does not. 

OSSTMM addresses controls and OWASP does not

SHOW ANSWER

Sophia travels a lot and worries that her laptop containing confidential documents might be stolen. What is the best protection that will work for her?

Password protected files 

Hidden folders 

BIOS password 

Full disk encryption.

SHOW ANSWER

The establishment of a TCP connection involves a negotiation called 3 way handshake. What type of message sends the client to the server in order to begin this negotiation?

 RST 

ACK 

SYN-ACK 

SYN 

SHOW ANSWER

Which protocol is used for setting up secure channels between two devices, typically in VPNs?

 PPP 

IPSEC 

PEM 

SET

SHOW ANSWER

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?

Residual risk 

Inherent risk 

Deferred risk 

Impact risk

SHOW ANSWER

Peter, a Network Administrator, has come to you looking for advice on a tool that would help him perform SNMP enquires over the network. Which of these tools would do the SNMP enumeration he is looking for? Select the best answers.

SNMPUtil 

SNScan 

SNMPScan 

Solarwinds IP Network Browser 

NMap 

SHOW ANSWER

Which of the following represents the initial two commands that an IRC client sends to join an IRC network?

USER, NICK 

LOGIN, NICK 

USER, PASS

LOGIN, USER

SHOW ANSWER

An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections. When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML code?

Wireshark 

Ettercap 

Aircrack-ng 

Tcpdump

SHOW ANSWER

Craig received a report of all the computers on the network that showed all the missing patches and weak passwords. What type of software generated this report?

 a port scanner 

a vulnerability scanner 

a virus scanner 

a malware scanner

SHOW ANSWER

Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?

Omnidirectional antenna

 Dipole antenna

Yagi antenna 

Parabolic grid antenna

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in