This CEH Quiz (101-200) assesses skills in cybersecurity, focusing on practical scenarios like footprinting, encryption, and attack detection. It's designed for professionals aiming to validate their ethical hacking expertise.
You should have used 3DES which is built into Windows
If you would have implemented Pretty Good Privacy (PGP) which is built into Windows, the sensitive information on the laptops would not have leaked out
You should have utilized the built-in feature of Distributed File System (DFS) to protect the sensitive information on the laptops
You could have implemented Encrypted File System (EFS) to encrypt the sensitive files on the laptops
Rate this question:
A flash file extension to Firefox that gets automatically installed when a victim visits rogue software disabling websites
A Fake AV program that claims to rid a computer of malware, but instead installsspyware or other malware onto the computer. This kind of software is known as rogue security software.
Rogue security software is basedon social engineering technique in which the attackers lures victim to visit spear phishing websites
This software disables firewalls and establishes reverse connecting tunnel between the victim's machine and that of the attacker
Check for Live systems
Check for Open Ports
Banner Grabbing
Prepare Proxies
Social Engineering attacks
Scan for Vulnerabilities
Draw Network Diagrams
Rate this question:
Lee is seeing activity indicative of a Smurf attack.
Most likely, the ICMP packets are being sent in this manner to attempt IP spoofing.
Lee is seeing a Ping of death attack.
This is not unusual traffic, ICMP packets can be of any size.
Rate this question:
Service Degradation
OS Fingerprinting
Manual Target System
Identification Scanning
Rate this question:
Zombie Zapper (ZoZ)
Remote Access Trojan (RAT)
Bot IRC Tunnel (BIT)
Root Digger (RD)
Rate this question:
0xFFFFFFFFFFFF
0xDDDDDDDDDDDD
0xAAAAAAAAAAAA
0xBBBBBBBBBBBB
Rate this question:
To learn about the IP range used by the target network
To identify thenumber of employees working for the company
To test the limits of the corporate security policy enforced in the company
To learn about the operating systems, services and applications used on the network
Rate this question:
SYN flag
ACK flag
FIN flag
XMAS flag
Rate this question:
9
17
20
32
35
Rate this question:
Core Impact
Metaspolit
Immunity Canvas
Nessus
Rate this question:
Image Hide
Snow
Gif-it-up
NiceText
Rate this question:
16 million years
5 minutes
23 days
200 years
Rate this question:
Cross Site Scripting
Password attacks
A Buffer Overflow
A hybrid attack
Rate this question:
Use fragmented IP packets
Spoof your IP address when launching attacks and sniff responses from the server
Overload the IDS with Junk traffic to mask your scan
Use source routing (if possible)
Connect to proxy servers or compromised Trojaned machines to launch attacks
Rate this question:
Simple DDoS attack
DoS attacks which involves flooding a network or system
DoS attacks which involves crashing a network or system
DoS attacks which is done accidentally or deliberately
Rate this question:
SMBCrack
SmurfCrack
PSCrack
RainbowTables
Rate this question:
Token Injection Replay attacks
Shoulder surfing attack
Rainbow and Hash generation attack
Dumpster diving attack
Rate this question:
False
True
Rate this question:
Chenrocks:/home/siew # hping -S -R -P -A -F -U 192.168.2.56 -p 22 -c 5 -t 118
Chenrocks:/home/siew # hping -F -Q -J -A -C -W 192.168.2.56 -p 22 -c 5 -t 118
Chenrocks:/home/siew # hping -D -V -R -S -Z -Y 192.168.2.56 -p 22 -c 5 -t 118
Chenrocks:/home/siew # hping -G -T -H -S -L -W 192.168.2.56 -p 22 -c 5 -t 118
Rate this question:
Related:intranet allinurl:intranet:"human resources"
Cache:"human resources" inurl:intranet(SharePoint)
Intitle:intranet inurl:intranet+intext:"human resources"
Site:"human resources"+intext:intranet intitle:intranet
Rate this question:
Semi Column
Double Quote
Single Quote
Exclamation Mark
Rate this question:
Bill spoofed the MAC address of Dell laptop
Bill connected to a Rogue access point
Toshiba and Dell laptops share the same hardware address
Bill brute forced the Mac address ACLs
Rate this question:
0xAAD3B435B51404EE
0xAAD3B435B51404AA
0xAAD3B435B51404BB
0xAAD3B435B51404CC
Rate this question:
Root bytes
Null bytes
Char bytes
Unicode bytes
Rate this question:
The network protocol is configured to use SMB Signing
The physical network wire is on fibre optic cable
The network protocol is configured to use IPSEC
L0phtCrack SMB sniffing only works through Switches andnot Hubs
Rate this question:
Harold should have used Dumpsec instead of Pwdump6
Harold's dictionary file was not large enough
Harold should use LC4 instead of John the Ripper
LanManger hashes are broken up into two 7 character fields
Rate this question:
4th packet
3rd packet
6th packet
5th packet
Rate this question:
When the e-mail was received and read
Send destructive e-mails
GPS location and map of the recipient
Time spent on reading the e-mails
Whether or not the recipient visited any links sent to them
Track PDF and other types of attachments
Set messages to expire after specified time
Remote control the User's E-mail client application and hijack the traffic
Rate this question:
YouKill DOOM
Damen Rock
Poison Ivy
Matten Kit
Rate this question:
Macro Virus
Cavity Virus
Boot Sector Virus
Metamorphic Virus
Sparse Infector Virus
Rate this question:
Hping2
Nessus
Nmap
Make
Rate this question:
This response means the port he is scanning is open.
The RST/ACK response means the port Fred is scanning is disabled.
This means the port he is scanning is half open.
This means that the port he is scanning on the host is closed.
Rate this question:
Stream Cipher
Block Cipher
Bit Cipher
Hash Cipher
Rate this question:
Use HTTP Tunneling
Use Proxy Chaining
Use TOR Network
Use Reverse Chaining
Rate this question:
Stoplog stoplog ?
EnterPol /nolog
EventViewer o service
Auditpol.exe /disable
Rate this question:
Disable SPAN port on the switch
Enable SNMP Trap on the switch
Configure IP security on the switch
Enable Port Security on the switch
Rate this question:
C:\windows\system32\config\SAM
C:\winnt\system32\machine\SAM
C:\windows\etc\drivers\SAM
C:\windows\config\etc\SAM
Rate this question:
Use disable-eXchange
Use mod_negotiation
Use Stop_Files
Use Lib_exchanges
Rate this question:
Bob can explain that using a weak key management technique is a form of programming error
Bob can explain that using passwords to derive cryptographic keys is a form of a programming error
Bob can explain that a buffer overflow is an example of programming error and it is a common mistake associated with poor programming technique
Bob can explain that a random number generator can be used to derive cryptographic keys but it uses a weak seed value and this is a form of a programming error
Rate this question:
Never leave a default password
Never use a password that can be found in a dictionary
Never use a password related to your hobbies, pets, relatives, or date of birth.
Use a word that has more than 21 characters from a dictionary as the password
Never use a password related to the hostname, domain name, or anything else that can be found with whois
Rate this question:
Factorization
Prime Detection
Hashing
Brute-forcing
Rate this question:
True
False
Rate this question:
443
139
179
445
Rate this question:
Windows machines will not generate an answer (ICMP ECHO Reply) to an ICMP ECHO request aimed at the broadcast address or at the network address.
Linux machines will not generate an answer (ICMP ECHO Reply) to an ICMP ECHO request aimed at the broadcast address or at the network address.
You should send a ping request with this command ping ? 192.168.5.0-255
You cannot ping a broadcast address. The above scenario is wrong.
Rate this question:
Charlie can use the command: ping -l 56550 172.16.0.45 -t.
Charlie can try using the command: ping 56550 172.16.0.45.
By using the command ping 172.16.0.45 Charlie would be able to lockup the router
He could use the command: ping -4 56550 172.16.0.45.
Rate this question:
DES 64 bit
AES-CCMP 128 bit
MD5 48 bit
SHA 160 bit
Rate this question:
RST flag scanning
FIN flag scanning
SYN flag scanning
ACK flag scanning
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.