CEH Quick Pop Quiz

20 Questions | Total Attempts: 716

SettingsSettingsSettings
CEH Quizzes & Trivia

Just a small bit from the CEH


Questions and Answers
  • 1. 
    _____ is the pre-attack information gathering and organization of collected data, which is used to document the security profile of an organization.
    • A. 

      Scanning

    • B. 

      Foot printing

    • C. 

      Dumpster diving

    • D. 

      Enumeration

  • 2. 
    Identify the 3 pre-attack phases
    • A. 

      Rooting

    • B. 

      Scanning

    • C. 

      Social engineering

    • D. 

      Enumeration

    • E. 

      Foot printing

  • 3. 
    The information gathering stage has ___ phases
    • A. 

      7

    • B. 

      5

    • C. 

      10

    • D. 

      3

  • 4. 
    Which of the following stages of information gathering fall under "foot printing"?
    • A. 

      Discover open ports

    • B. 

      Uncover services on ports

    • C. 

      Detect operating system

    • D. 

      Unearth initial information

    • E. 

      Locate the network range

  • 5. 
    Which of the following tools might you use during foot printing?
    • A. 

      Nmap

    • B. 

      Sam Spade

    • C. 

      Ethereal

    • D. 

      Netcat

  • 6. 
    Determine the first DNS server in the following WHOIS output:Domain ID:D81180127-LRORDomain Name:ECCOUNCIL.ORGCreated On:14-Dec-2001 10:13:06 UTCLast Updated On:08-Oct-2003 09:32:10 UTCExpiration Date:14-Dec-2004 10:13:06 UTCSponsoring Registrar:R11-LRORStatus:OKRegistrant ID:tuTv2ItRZBMNd4lARegistrant Name:Paul KwitowskiRegistrant Organization:International Council of E-Commerce ConsultantsRegistrant Street1:67 Wall Street, 22nd FloorRegistrant City:New YorkRegistrant State/Province:NYRegistrant Postal Code:10005-3198Registrant Country:USRegistrant Phone:+1.2127098253Registrant FAX:+1.2129432300Registrant Email:[email protected] ID:tus9DYvpp5mrbLNdAdmin Name:Ethan RussellAdmin Organization:International Council of E-Commerce ConsultantsAdmin Street1:67 Wall Street, 22nd FloorAdmin City:New YorkAdmin State/Province:NYAdmin Postal Code:10005-3198Admin Country:USAdmin Phone:+1.2127098253Admin Email:[email protected] ID:tuE1cgAfi1VnFkpuTech Name:Jacob EckelTech Organization:International Council of E-Commerce ConsultantsTech Street1:67 Wall Street, 22nd FloorTech City:New YorkTech State/Province:NYTech Postal Code:10005-3198Tech Country:USTech Phone:+1.2127098253Tech Email:[email protected] Server:AUTH1.NS.NYI.NETName Server:AUTH2.NS.NYI.NET
  • 7. 
    Which of the following could be used to learn the ASN that an organization is using?
    • A. 

      EDGAR

    • B. 

      WHOIS

    • C. 

      ARIN

    • D. 

      NSLOOKUP

  • 8. 
    If you wanted to know the geographic location of the routers, servers etc. which of these would you use?
    • A. 

      Visual Trace

    • B. 

      Visual Route

    • C. 

      GeoTrace

    • D. 

      Tracert

  • 9. 
    Which of the following can help detect intrusions?
    • A. 

      NetDetect

    • B. 

      Nmap

    • C. 

      VisualLookout

    • D. 

      Sam Spade

    • E. 

      Snort

  • 10. 
    Which of the following would you use to determine if an email that you have sent gets opened?
    • A. 

      VisualRoute Mail Tracker

    • B. 

      Mailtracking.com

    • C. 

      Sam Spade

    • D. 

      EMailTrackerPro

  • 11. 
    How might one determine if network hosts are alive?
    • A. 

      War dialers

    • B. 

      DoS Scripts

    • C. 

      Netcat

    • D. 

      Trojan horses

    • E. 

      Ping utilities

  • 12. 
    Which of the following might one use to war dial?
    • A. 

      Dialnet

    • B. 

      Snort

    • C. 

      THC-Scan

    • D. 

      ToneLoc

  • 13. 
    Identify utilities for pinging
    • A. 

      Icmpenum

    • B. 

      Genius

    • C. 

      BlackICE

    • D. 

      Netscan Tools

    • E. 

      Hping

  • 14. 
    An open scan would be also known as a
    • A. 

      UDP scan

    • B. 

      Strobe scan

    • C. 

      Vanilla scan

    • D. 

      Sweep scan

  • 15. 
    Which type of scans sends a packet with no flags set?
    • A. 

      Half-open scan

    • B. 

      Null scan

    • C. 

      Xmas scan

    • D. 

      Open scan

  • 16. 
    Which type of scan has all of the available flags in the TCP header set?
    • A. 

      Xmas

    • B. 

      Closed

    • C. 

      Open

    • D. 

      Full

  • 17. 
    The "ipsecscan" utility is useful for scanning for the existence of VPN implementations by searching for IPSec characteristics on the remote device. IPSec supports which of the following encryption modes?
    • A. 

      Relay

    • B. 

      Peer to peer

    • C. 

      Transfer

    • D. 

      Transport

    • E. 

      Tunnel

  • 18. 
    The best port scanning tool currently available is?
    • A. 

      Netscan Tools Pro

    • B. 

      Superscan

    • C. 

      Nmap

    • D. 

      IpEye

  • 19. 
    What technique is used to determine the OS of a remote host?
    • A. 

      OS ID

    • B. 

      OS fingerprinting

    • C. 

      OS scanning

    • D. 

      OS investigation

  • 20. 
    What type of fingerprinting captures traffic from a target host and analyzes it to determine the remote OS?
    • A. 

      Sniffprinting

    • B. 

      Passive fingerprinting

    • C. 

      Packet fingerprinting

    • D. 

      Open fingerprinting