Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CEH QUESTIONS : PART 9

One of your team members has asked you to analyze the following SOA record. What is the version? Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.) (Choose four.)

 200303028

 3600 

 604800 

 2400 

60 

4800

SHOW ANSWER

LM hash is a compromised password hashing function. Which of the following parameters describe LM Hash:? I - The maximum password length is 14 characters. II - There are no distinctions between uppercase and lowercase. III - It's a simple algorithm, so 10,000,000 hashes can be generated per second

 I, II, and III 

II 

 I and II 

SHOW ANSWER

Which Nmap option would you use if you were not concerned about being detected and wanted to perform a very fast scan?

-T0 

 -T5 

-O

 -A

SHOW ANSWER

Which of the following program infects the system boot sector and the executable files at the same time?

Stealth virus 

Polymorphic virus

Macro virus 

Multipartite Virus

SHOW ANSWER

If you are to determine the attack surface of an organization, which of the following is the BEST thing to do?

 Running a network scan to detect network services in the corporate DMZ 

Reviewing the need for a security clearance for each employee 

Using configuration management to determine when and where to apply security patches

Training employees on the security policy regarding social engineering 

SHOW ANSWER

Which is the first step followed by Vulnerability Scanners for scanning a network?

 TCP/UDP Port scanning 

Firewall detection 

OS Detection 

Checking if the remote host is alive

SHOW ANSWER

While testing the company's web applications, a tester attempts to insert the following test script into the search area on the company's web site: < script>alert(" Testing Testing Testing ") Afterwards, when the tester presses the search button, a pop-up box appears on the screen with the text: "Testing Testing Testing". Which vulnerability has been detected in the web application?

 Buffer overflow

 Cross-site request forgery 

 Distributed denial of service 

Cross-site scripting 

SHOW ANSWER

Which system consists of a publicly available set of databases that contain domain name registration contact information?

WHOIS 

 IANA 

 CAPTCHA

IETF 

SHOW ANSWER

A pen tester is configuring a Windows laptop for a test. In setting up Wireshark, what river and library are required to allow the NIC to work in promiscuous mode?

Libpcap

Awinpcap

Winprom 

Winpcap

SHOW ANSWER

You perform a scan of your company's network and discover that TCP port 123 is open. What services by default run on TCP port 123?

Telnet 

 POP3

Network Time Protocol 

 DNS 

SHOW ANSWER

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

 tcpdump

nessus 

 etherea 

Jack the ripper

SHOW ANSWER

Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students. He identified this when the IDS alerted for malware activities in the network. What should Bob do to avoid this problem?

Disable unused ports in the switches 

Separate students in a different VLAN 

Use the 802.1x protocol 

Ask students to use the wireless network

SHOW ANSWER

While performing ping scans into a target network you get a frantic call from the organization's security team. They report that they are under a denial of service attack. When you stop your scan, the smurf attack event stops showing up on the organization's IDS monitor. How can you modify your scan to prevent triggering this event in the IDS?

 Scan more slowly. 

 Do not scan the broadcast IP. 

 Spoof the source IP address. 

Only scan the Windows systems.

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in