CEH And Countermeasures V7 Version 4.2

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Mastermind1100
M
Mastermind1100
Community Contributor
Quizzes Created: 4 | Total Attempts: 21,910
Questions: 5 | Attempts: 276

SettingsSettingsSettings
CEH And Countermeasures V7   Version 4.2 - Quiz

Ethical hacking and Countermeasures


Questions and Answers
  • 1. 

    Which of the following countermeasures can specifically protect agianst both the MAC flood and MAC spoofing attacks?

    • A.

      Configure Port Security on the switch

    • B.

      Configure Port Recon on the switch

    • C.

      Configure Switch Mapping

    • D.

      Configure Multiple Recognition on the switch

    Correct Answer
    A. Configure Port Security on the switch
    Explanation
    Configuring Port Security on the switch is an effective countermeasure against both MAC flood and MAC spoofing attacks. Port Security allows the switch to limit the number of MAC addresses that can be learned on a specific port. This prevents MAC flooding attacks where an attacker floods the switch with fake MAC addresses, overwhelming its memory. Additionally, Port Security can also detect and prevent MAC spoofing attacks by only allowing specific MAC addresses to communicate on a port, blocking any unauthorized MAC addresses. This helps to ensure the integrity and security of the network.

    Rate this question:

  • 2. 

    Jimmy, an attacker, knows that he can take advantage of poorly designed input validiation routines to create or alter SQL commands to gain access to private data or execute commands in the database.  What technique does jimmy use to compromise a database?

    • A.

      Jimmy can submit user input that executes an operating system command to compromise a target system

    • B.

      Jimmy can gain control of system to flood the target system with request, preventing legitimate users from gaining access

    • C.

      Jimmy can utilize an incorrect configuration that leads to access with higher-than expected privilege of the database

    • D.

      Jimmy can utilize this particular database threat that is an SQL injection technique to penetrate a target system

    Correct Answer
    D. Jimmy can utilize this particular database threat that is an SQL injection technique to penetrate a target system
    Explanation
    Jimmy can compromise a database by utilizing an SQL injection technique. SQL injection is a type of attack where an attacker manipulates user input to inject malicious SQL code into a query, allowing them to gain unauthorized access to the database or execute arbitrary commands. By exploiting poorly designed input validation routines, Jimmy can create or alter SQL commands to access private data or perform unauthorized actions within the database. This technique is a common and serious threat to the security of a database system.

    Rate this question:

  • 3. 

    This IDS defeating technique works by splitting a datagram (or packet) into multiple fragments and the IDS will not spot the true nature of the fully assembled datagram.  The datagram is not reassembled until is reaches its final destination.  It would be a processor-intensive task for the IDS to reassemble fragments itself, and on a busy system the packet will slip through the IDS onto the network.  What is this technique called?

    • A.

      IP Routing or Packet Dropping

    • B.

      IDS Spoofing or Session Assembly

    • C.

      IP Fragmentation or session splicing

    • D.

      IP Slicing or Packet Reassembly

    Correct Answer
    C. IP Fragmentation or session splicing
    Explanation
    This technique is called IP Fragmentation or session splicing. It involves splitting a datagram into multiple fragments, which makes it difficult for an IDS to detect the true nature of the fully assembled datagram. The IDS would need to reassemble the fragments, which can be a processor-intensive task. On a busy system, the packet can slip through the IDS onto the network before it is fully reassembled.

    Rate this question:

  • 4. 

    If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of business, they just have to find a job opening, prepare someone to pass the interview, have that person hired, and they will be in the organization.  How would you prevent such type of attacks?

    • A.

      It is impossible to block these attacks

    • B.

      Hire the people through third-party job agencies who will vet them for you

    • C.

      Conduct thorough background checks before you engage them

    • D.

      Investigate their social networking profiles

    Correct Answer
    C. Conduct thorough background checks before you engage them
    Explanation
    To prevent attacks where competitors try to infiltrate the organization by getting someone hired, conducting thorough background checks before engaging them is the best approach. By thoroughly investigating the background of potential employees, including their education, employment history, and any criminal records, organizations can ensure that they are hiring trustworthy individuals. This will help identify any red flags or potential risks, making it harder for competitors to infiltrate the organization and carry out their malicious intentions.

    Rate this question:

  • 5. 

    This type of Port Scanning technique spilts TCP header into several packets so that the packet filters are not able to detect what the packets intends to do.

    • A.

      UDP Scanner

    • B.

      IP Fragment Scanning

    • C.

      Inverse TCP Flag scanning

    • D.

      ACK Flag scanning

    Correct Answer
    B. IP Fragment Scanning
    Explanation
    IP Fragment Scanning is a type of port scanning technique where the TCP header is divided into multiple packets. This fragmentation makes it difficult for packet filters to detect the true intention of the packets. By splitting the header, the scanner can bypass security measures that may be in place to detect and block port scanning activities. This technique allows the scanner to gather information about open ports and vulnerable services without being detected easily.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 31, 2011
    Quiz Created by
    Mastermind1100
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.