CEH And Countermeasures V7 Version 4.2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Mastermind1100
M
Mastermind1100
Community Contributor
Quizzes Created: 4 | Total Attempts: 22,001
| Attempts: 289 | Questions: 5
Please wait...
Question 1 / 5
0 %
0/100
Score 0/100
1. Which of the following countermeasures can specifically protect agianst both the MAC flood and MAC spoofing attacks?

Explanation

Configuring Port Security on the switch is an effective countermeasure against both MAC flood and MAC spoofing attacks. Port Security allows the switch to limit the number of MAC addresses that can be learned on a specific port. This prevents MAC flooding attacks where an attacker floods the switch with fake MAC addresses, overwhelming its memory. Additionally, Port Security can also detect and prevent MAC spoofing attacks by only allowing specific MAC addresses to communicate on a port, blocking any unauthorized MAC addresses. This helps to ensure the integrity and security of the network.

Submit
Please wait...
About This Quiz
CEH And Countermeasures V7   Version 4.2 - Quiz

CEH and Countermeasures v7 Version 4.2 assesses knowledge on protecting against MAC floods, spoofing, SQL injections, and more. It evaluates skills in identifying and mitigating network threats, crucial for cybersecurity professionals.

Personalize your quiz and earn a certificate with your name on it!
2. Jimmy, an attacker, knows that he can take advantage of poorly designed input validiation routines to create or alter SQL commands to gain access to private data or execute commands in the database.  What technique does jimmy use to compromise a database?

Explanation

Jimmy can compromise a database by utilizing an SQL injection technique. SQL injection is a type of attack where an attacker manipulates user input to inject malicious SQL code into a query, allowing them to gain unauthorized access to the database or execute arbitrary commands. By exploiting poorly designed input validation routines, Jimmy can create or alter SQL commands to access private data or perform unauthorized actions within the database. This technique is a common and serious threat to the security of a database system.

Submit
3. This type of Port Scanning technique spilts TCP header into several packets so that the packet filters are not able to detect what the packets intends to do.

Explanation

IP Fragment Scanning is a type of port scanning technique where the TCP header is divided into multiple packets. This fragmentation makes it difficult for packet filters to detect the true intention of the packets. By splitting the header, the scanner can bypass security measures that may be in place to detect and block port scanning activities. This technique allows the scanner to gather information about open ports and vulnerable services without being detected easily.

Submit
4. This IDS defeating technique works by splitting a datagram (or packet) into multiple fragments and the IDS will not spot the true nature of the fully assembled datagram.  The datagram is not reassembled until is reaches its final destination.  It would be a processor-intensive task for the IDS to reassemble fragments itself, and on a busy system the packet will slip through the IDS onto the network.  What is this technique called?

Explanation

This technique is called IP Fragmentation or session splicing. It involves splitting a datagram into multiple fragments, which makes it difficult for an IDS to detect the true nature of the fully assembled datagram. The IDS would need to reassemble the fragments, which can be a processor-intensive task. On a busy system, the packet can slip through the IDS onto the network before it is fully reassembled.

Submit
5. If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of business, they just have to find a job opening, prepare someone to pass the interview, have that person hired, and they will be in the organization.  How would you prevent such type of attacks?

Explanation

To prevent attacks where competitors try to infiltrate the organization by getting someone hired, conducting thorough background checks before engaging them is the best approach. By thoroughly investigating the background of potential employees, including their education, employment history, and any criminal records, organizations can ensure that they are hiring trustworthy individuals. This will help identify any red flags or potential risks, making it harder for competitors to infiltrate the organization and carry out their malicious intentions.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 31, 2011
    Quiz Created by
    Mastermind1100
Cancel
  • All
    All (5)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following countermeasures can specifically protect...
Jimmy, an attacker, knows that he can take advantage of poorly...
This type of Port Scanning technique spilts TCP header into several...
This IDS defeating technique works by splitting a datagram (or packet)...
If a competitor wants to cause damage to your organization, steal...
Alert!

Advertisement