Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CEH QUESTIONS : PART 57

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: "FTP on the network!";)

An Intrusion Detection System

A firewall IPTable 

A Router IPTable 

FTP Server rule

SHOW ANSWER

Which of the following open source tools would be the best choice to scan a network for potential targets?

NMAP

NIKTO 

CAIN 

John the Ripper

SHOW ANSWER

Which of the following is the successor of SSL?

TLS 

RSA 

GRE 

IPSec

SHOW ANSWER

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?

 Kismet 

Nessus 

Netstumbler 

 nbsp;Abel 

SHOW ANSWER

Under what conditions does a secondary name server request a zone transfer from a primary name server?

When a primary SOA is higher that a secondary SOA 

When a secondary SOA is higher that a primary SOA 

When a primary name server has had its service restarted 

When a secondary name server has had its service restarted 

When the TTL falls to zero

SHOW ANSWER

Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?

 SHA-1 

MD5 

HAVAL

MD4 

SHOW ANSWER

You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers will never be able to gain access to your network with complex security system in place. Your peer, Peter Smith who works at the same department disagrees with you. He says even the best network security technologies cannot prevent hackers gaining access to the network because of presence of "weakest link" in the security chain. What is Peter Smith talking about?

 Untrained staff or ignorant computer users who inadvertently become the weakest link in your security chain 

"zero-day" exploits are the weakest link in the security chain since the IDS will not be able to detect these attacks 

"Polymorphic viruses" are the weakest link in the security chain since the Anti-Virus scanners will not be able to detect these attacks 

Continuous Spam e-mails cannot be blocked by your security system since spammers use different techniques to bypass the filters in your gateway 

SHOW ANSWER

Which of the following types of firewalls ensures that the packets are part of the established session?

 Stateful inspection firewall

Circuit-level firewall 

Application-level firewall 

Switch-level firewall

SHOW ANSWER

You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine. What wireshark filter will show the connections from the snort machine to kiwi syslog machine?

 tcp.dstport==514 && ip.dst==192.168.0.150 

 tcp.srcport==514 && ip.src==192.168.0.99 

tcp.dstport==514 && ip.dst==192.168.0.0/16 

tcp.srcport==514 && ip.src==192.168.150 

SHOW ANSWER

Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?

 Restore a random file. 

Perform a full restore. 

Read the first 512 bytes of the tape. 

Read the last 512 bytes of the tape

SHOW ANSWER

What would you type on the Windows command line in order to launch the Computer Management Console provided that you are logged in as an admin?

 c:\compmgmt.msc 

 c:\gpedit I

 c:\ncpa.cpl 

c:\services.msc

SHOW ANSWER

What is the role of test automation in security testing?

 It can accelerate benchmark tests and repeat them with a consistent test setup. But it cannot replace manual testing completely. 

It is an option but it tends to be very expensive. 

It should be used exclusively. Manual testing is outdated because of low speed and possible test setup inconsistencies. 

Test automation is not usable in security due to the complexity of the tests.

SHOW ANSWER

Which of the following programming languages is most vulnerable to buffer overflow attacks?

 Perl 

C++ 

Python

Java

SHOW ANSWER

You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?

hping2 host.domain.com 

hping2 --set-ICMP host.domain.com 

hping2 -i host.domain.com 

hping2 -1 host.domain.com

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in