Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CEH QUESTIONS : PART 59

Supposed you are the Chief Network Engineer of a certain Telco. Your company is planning for a big business expansion and it requires that your network authenticate users connecting using analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network. Which AAA protocol would you implement?

 TACACS+ 

DIAMETER 

Kerberos 

RADIUS

SHOW ANSWER

Which of the following lists are valid data-gathering activities associated with a risk assessment?

Threat identification, vulnerability identification, control analysis 

Threat identification, response identification, mitigation identification 

Attack profile, defense profile, loss profile 

System profile, vulnerability identification, security determination

SHOW ANSWER

Which of the following command line switch would you use for OS detection in Nmap?

-D 

-O 

-P 

-X 

SHOW ANSWER

A security consultant is trying to bid on a large contract that involves penetration testing and reporting. The company accepting bids wants proof of work so the consultant prints out several audits that have been performed. Which of the following is likely to occur as a result?

The consultant will ask for money on the bid because of great work. 

The consultant may expose vulnerabilities of other companies. 

The company accepting bids will want the same type of format of testing. 

The company accepting bids will hire the consultant because of the great work performed.

SHOW ANSWER

What type of vulnerability/attack is it when the malicious person forces the user's browser to send an authenticated request to a server?

 Cross-site request forgery 

Cross-site scripting 

Session hijacking 

Server side request forgery

SHOW ANSWER

Which of the following is a hashing algorithm?

MD5 

PGP 

DES 

ROT13

SHOW ANSWER

A security engineer has been asked to deploy a secure remote access solution that will allow employees to connect to the company's internal network. Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?

 SSL 

Mutual authentication 

IPSec 

Static IP addresses

SHOW ANSWER

On a Linux device, which of the following commands will start the Nessus client in the background so that the Nessus server can be configured?

nessus + 

 nessus *s 

 nessus & 

nessus -d

SHOW ANSWER

If an attacker uses the command SELECT*FROM user WHERE name = 'x' AND userid IS NULL; --'; which type of SQL injection attack is the attacker performing?

End of Line Comment 

UNION SQL Injection 

Illegal/Logically Incorrect Query 

Tautology

SHOW ANSWER

A hacker, who posed as a heating and air conditioning specialist, was able to install a sniffer program in a switched environment network. Which attack could the hacker use to sniff all of the packets in the network?

 Fraggle 

MAC Flood 

Smurf 

Tear Drop

SHOW ANSWER

Least privilege is a security concept that requires that a user is

 limited to those functions required to do the job. 

given root or administrative privileges. 

trusted to keep all data and access to that data under their sole control. 

given privileges equal to everyone else in the department.

SHOW ANSWER

Which DNS resource record can indicate how long any "DNS poisoning" could last?

 MX 

SOA 

NS 

TIMEOUT

SHOW ANSWER

During the process of encryption and decryption, what keys are shared? During the process of encryption and decryption, what keys are shared?

 Private keys 

User passwords 

Public keys 

Public and private keys

SHOW ANSWER

Using Windows CMD, how would an attacker list all the shares to which the current user context has access?

 NET USE 

NET CONFIG 

NET FILE 

NET VIEW

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in