Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CEH QUESTIONS : PART 62

An attacker is using nmap to do a ping sweep and a port scanning in a subnet of 254 addresses. In which order should he perform these steps?

     The sequence does not matter. Both steps have to be performed against all hosts.

First the port scan to identify interesting services and then the ping sweep to find hosts responding to icmp echo requests.

First the ping sweep to identify live hosts and then the port scan on the live hosts. This way he saves time.

The port scan alone is adequate. This way he saves time.

SHOW ANSWER

A penetration test was done at a company. After the test, a report was written and given to the companys IT authorities. A section from the report is shown below:

a.Access List should be written between VLANs.

b.Port security should be enabled for the intranet.

c.A security solution which filters data packets should be set between intranet (LAN) and DMZ.

d.A WAF should be used in front of the web applications.

According to the section from the report, which of the following choice is true?

MAC Spoof attacks cannot be performed.

Possibility of SQL Injection attack is eliminated.

 A stateful firewall can be used between intranet (LAN) and DMZ.

There is access control policy between VLANs.

SHOW ANSWER

What does a firewall check to prevent particular ports and applications from getting packets into an organization?application layer port numbers and transport layer headers.

Presentation layer headers and session layer port numbers

Network layer headers and the session layer port numbers.

Transport layer port numbers and application layer headers

SHOW ANSWER

Seth is starting a penetration test from inside the network. He hasn’t been given any information about the network. What type of test is he conducting?

 

Internal, Whitebox

Internal, Blackbox

External,Blackbox

External, Whitebox

SHOW ANSWER

If there is an Intrusion Detection System (IDS) in intranet, which port scanning technique cannot be used?

Spoof Scan 

 TCP Connect scan 

TCP SYN

Idle Scan

SHOW ANSWER

AWhat is the correct process for the TCP three-way handshake connection establishment and connection termination?

 

 Connection Establishment: FIN, ACK-FIN, ACK Connection Termination: SYN, SYN-ACK, ACK

Connection Establishment: SYN, SYN-ACK, ACK Connection Termination: ACK, ACK-SYN, SYN

Connection Establishment: ACK, ACK-SYN, SYN Connection Termination: FIN, ACK-FIN, ACK

 Connection Establishment: SYN, SYN-ACK, ACK Connection Termination: FIN, ACK-FIN, ACK

SHOW ANSWER

Gavin owns a white hat firm and is performing a website security audit for one his clients he begins by running scan’ which looks for common misconfigurations and out dated software versions. Which of the following tools is he most likely using?

Nmap

Armitage

Nikto

Metasploit

SHOW ANSWER

Darius and Mathew were performing internal vulnerability scan within the corporate network and reported the result to his manager
manager found that bit was not performed correctly because there was some mismatches on comparing both of them . he was expecting the same results , as both the scans were perform at the same tie, using the same tools and same IP ranges. The results simply showed more finding, Dairus scan compared to Mathews scan
what was the most probably root cause?

 

   Mathews scan was blocked by firewall 

one of the scan blocked by IPS

one of the scan blocked by IDS

Administrator of the scanned system updated most of the vulnerabilities\

SHOW ANSWER

Mattew , black hart has managed to open meterpreter session to one of the kiosk machines in evil corp’s lobby . he checks his current SID s-1-5-21-12233552397-1872883824-86125221104-501. What need s to happen before Matthew has full administrator access?

He already has admin privilages as shown by the “501” at the end of SID

He must perform privilege escalation

He need to disableantivirus protection

He needs to gain physical access

SHOW ANSWER

Which IPSEC mode should you use to assure security and confidentiality of data within the same LAN?

ESP transport mode

ESP confidential

AH promiscuous mode

AH Tunnel Mode

SHOW ANSWER

Which of the following algorithm is used for Kerberos encryption

DES

ECC

DSA

RSA

SHOW ANSWER

Analyst is investigating proxy logs and found out that one of the internal user visited website storing suspicious java scripts. After opening one of them he noticed that it’s very hard to understand the code and all code differs from typical java script. What is the name of this technique to hide the code and extend analysis time?

Code encoding

Obfuscation

Steganography

Encryption

SHOW ANSWER

During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network. What is this type of DNS configuration commonly called?

Split DNS

DNSSEC

DynDNS

DNS Scheme

SHOW ANSWER

Which of the below encryption algorithm is the fastest

 

ECC

SHA1

SHA 2

AES

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in