Ceh V9

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 6820 | Total Attempts: 9,511,256
| Questions: 25
Please wait...
Question 1 / 25
0 %
0/100
Score 0/100
1. Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?

Explanation

Configuring Port Security on the switch allows you to restrict the number of MAC addresses that can be learned on a specific port, preventing MAC Flood attacks. Additionally, Port Security can detect and block MAC Spoofing attempts by only allowing specific MAC addresses to communicate through the port.

Submit
Please wait...
About This Quiz
CEH V9 - Quiz

This CEH V9 quiz focuses on assessing advanced skills in ethical hacking, covering system security, threats, and attack vectors. It is designed for professionals seeking to validate their... see moreknowledge in cybersecurity, enhancing their understanding and readiness against cyber threats. see less

2. What technique does an attacker use to compromise a database by taking advantage of poorly designed input validation routines?

Explanation

An SQL injection attack allows an attacker to manipulate SQL queries to gain unauthorized access to a database.

Submit
3. What technique involves splitting a datagram into multiple fragments to evade IDS detection?

Explanation

IP Fragmentation or Session Splicing involves splitting a datagram into multiple fragments, making it harder for IDS to detect the true nature of the datagram. Packet Encryption, Port Scanning, and Protocol Spoofing are other techniques used for security purposes but do not specifically involve splitting datagrams in the same way.

Submit
4. If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of business, they just have to find a job opening, prepare someone to pass the interview, have that person hired, and they will be in the organization. How would you prevent such type of attacks?

Explanation

The correct answer to prevent such attacks is conducting thorough background checks to ensure the candidate's credibility and prevent any malicious intent in the hiring process.

Submit
5. Which type of Port Scanning technique splits TCP header into several packets so that the packet filters are not able to detect what the packets intend to do?

Explanation

IP Fragment Scanning is a technique where the TCP header is split into multiple IP fragments to evade detection by packet filters. SYN Flood Scanning floods the target with SYN packets, Null Scan sends packets with no flag set, and XMAS Scan sets various flags to detect open ports.

Submit
6. What is the term used to describe the activity of Joel and her team going through tons of garbage, recycled paper, and other rubbish in order to find information about the target they are attempting to penetrate?

Explanation

Dumpster Diving is the term used to describe the activity of searching through waste in order to find valuable information. The other options do not accurately capture the concept of going through garbage for information.

Submit
7. In which situations would you want to use anonymizer? (Select 3 answers).

Explanation

An anonymizer is used primarily to protect privacy and identity, bypass blocking applications, and post anonymously. The incorrect answers do not align with the usual purpose of using an anonymizer.

Submit
8. What type of attack involves an unauthorized individual intercepting communication between two parties?

Explanation

A Man-in-the-Middle (MiTM) attack occurs when a third party intercepts communication between two parties without their knowledge. It can lead to eavesdropping, data theft, and more.

Submit
9. What kind of attack is being illustrated in the scenario provided?

Explanation

In the scenario, Jack uses manipulation and deception to trick Jane into revealing her password by pretending to be someone he is not. This type of attack is known as Social Engineering, where the attacker exploits human psychology to gain access to sensitive information.

Submit
10. How can you defend against ARP Spoofing?
Submit
11. TCP SYN Flood attack uses the three-way handshake mechanism. An attacker at system A sends a SYN packet to victim at system B. System B sends a SYN/ACK packet to victim A. As a normal three-way handshake mechanism system A should send an ACK packet to system B, however, system A does not send an ACK packet to system B. In this case client B is waiting for an ACK packet from client A. This status of client B is called_______________.

Explanation

The correct term for the state of client B waiting for an ACK packet from client A in TCP SYN Flood attack is 'half open'.

Submit
12. What technique was used by the Kiley Innovators employee to send information to the rival marketing company?
Submit
13. You run nmap port Scan on 10.0.0.5 and attempt to gain banner/server information from services running on ports 21, 110 and 123. Here is the output of your scan results:Which of the following nmap command did you run?

Explanation

The correct nmap command for this scenario should include the options -O (perform OS detection), -sV (probe open ports to determine service/version info) and -p21,110,123 (specify ports 21, 110, and 123). The incorrect answers either lack the necessary options for gaining server information or use different scan types that do not match the desired outcome.

Submit
14. How can you prevent Privilege Escalation?

Explanation

Privilege Escalation is a security issue where an attacker gains elevated privileges on a system. The correct measures to prevent Privilege Escalation include using encryption to protect data, restricting interactive logon privileges, running services as unprivileged accounts, and ensuring users and applications run on the least privileges. Installing more memory, granting full admin rights to all users, or disabling security protocols will not effectively prevent Privilege Escalation.

Submit
15. What does ICMP (type 11, code 0) denote?

Explanation

ICMP (type 11, code 0) denotes Time Exceeded, which is used by routers to indicate that a packet has expired its time to live (TTL) value or it encountered a routing loop.

Submit
16. You are the security administrator of Jaco Banking Systems located in Boston. You are setting up e-banking website (https://www.ejacobank.com) authentication system. Instead of issuing banking customer with a single password, you give them a printed list of 100 unique passwords. Each time the customer needs to log into the e-banking system website, the customer enters the next password on the list. If someone sees them type the password using shoulder surfing, MiTM or keyloggers, then no damage is done because the password will not be accepted a second time. Once the list of 100 passwords is almost finished, the system automatically sends out a new password list by encrypted e-mail to the customer. You are confident that this security implementation will protect the customer from password abuse. Two months later, a group of hackers called 'HackJihad' found a way to access the one-time password list issued to customers of Jaco Banking Systems. The hackers set up a fake website (https://www.e-jacobank.com) and used phishing attacks to direct ignorant customers to it. The fake website asked users for their e-banking username and password, and the next unused entry from their one-time password sheet. The hackers collected 200 customer's username/passwords this way. They transferred money from the customer's bank account to various offshore accounts. Your decision of password policy implementation has cost the bank with USD 925,000 to hackers. You immediately shut down the e-banking website while figuring out the next best security solution. What effective security solution will you recommend in this case?
Submit
17. How does a polymorphic shellcode work?

Explanation

Polymorphic shellcode works by encrypting the shellcode using XOR operation, utilizing loader code for decryption, and running the decrypted shellcode. The incorrect answers do not accurately describe how polymorphic shellcode operates.

Submit
18. What is the signature of a SYN Flood attack?

Explanation

A SYN Flood attack involves overwhelming a target with SYN packets to exhaust resources and disrupt services by not completing the three-way handshake. The other options do not accurately describe the signature of a SYN Flood attack.

Submit
19. Which of the following type of scanning utilizes an automated process to proactively identify vulnerabilities of the computing systems present on a network?

Explanation

Vulnerability scanning is a proactive approach to identifying weaknesses in computing systems by using automated tools to scan for known vulnerabilities. Port scanning, packet sniffing, and banner grabbing are different techniques that focus on gathering information about network services and configurations, rather than specifically targeting vulnerabilities.

Submit
20. The following script shows a simple SQL injection. The script builds an SQL query by concatenating hard-coded strings together with a string entered by the user: SELECT*FROM OrdersTable WHERE ShipCity = 'Chicago' How will you delete the OrdersTable from the database using SQL Injection?

Explanation

In this scenario, the correct SQL injection string to delete the OrdersTable from the database is 'Chicago';'. The incorrect options like DROP TABLE OrdersTable, TRUNCATE TABLE OrdersTable, and DELETE FROM OrdersTable can also have destructive consequences on the database, but they are not the specific string needed to achieve the deletion in this particular situation.

Submit
21. What are the limitations of Vulnerability scanners? (Select 2 answers)

Explanation

Vulnerability scanners have limitations in their ability to detect all vulnerabilities and may not always be up-to-date with the latest threats, making them less effective at preventing attacks before they occur.

Submit
22. Stephanie works as a senior security analyst for a manufacturing company in Detroit. Her colleague Jason informed her that he found confidential corporate information leaked on a website. Stephanie wants to see past versions and pages of the website, where can she go?
Submit
23. Dan is conducting penetration testing and has found a vulnerability in a Web Application which gave him the sessionID token via a cross site scripting vulnerability. Dan wants to replay this token. However, the session ID manager (on the server) checks the originating IP address as well. Dan decides to spoof his IP address in order to replay the sessionID. Why do you think Dan might not be able to get an interactive session?
Submit
24. Jason is questioned about how his company's marketing material ended up in the hands of competitors. He claims to have no knowledge of it. However, his supervisor finds emails sent to the competitors with attached jpg files that contained the marketing material. What technique has Jason most likely used?

Explanation

Jason most likely used the Image Steganography Technique to hide the marketing material within the jpg files. This technique allows information to be concealed within images without altering the visual appearance of the image. Social Engineering, Phishing Attack, and Data Encryption are not likely methods used in this scenario.

Submit
25. What type of virus is shown here?

Explanation

The correct answer is Sparse Infector Virus because it is a type of virus that infects files by inserting their code into them, but only does so occasionally and sparingly to avoid detection.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 4, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 04, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 04, 2025
    Quiz Created by
    Thames
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following countermeasure can specifically protect against...
What technique does an attacker use to compromise a database by taking...
What technique involves splitting a datagram into multiple fragments...
If a competitor wants to cause damage to your organization, steal...
Which type of Port Scanning technique splits TCP header into several...
What is the term used to describe the activity of Joel and her team...
In which situations would you want to use anonymizer? (Select 3...
What type of attack involves an unauthorized individual intercepting...
What kind of attack is being illustrated in the scenario provided?
How can you defend against ARP Spoofing?
TCP SYN Flood attack uses the three-way handshake mechanism. An...
What technique was used by the Kiley Innovators employee to send...
You run nmap port Scan on 10.0.0.5 and attempt to gain banner/server...
How can you prevent Privilege Escalation?
What does ICMP (type 11, code 0) denote?
You are the security administrator of Jaco Banking Systems located in...
How does a polymorphic shellcode work?
What is the signature of a SYN Flood attack?
Which of the following type of scanning utilizes an automated process...
The following script shows a simple SQL injection. The script builds...
What are the limitations of Vulnerability scanners? (Select 2 answers)
Stephanie works as a senior security analyst for a manufacturing...
Dan is conducting penetration testing and has found a vulnerability in...
Jason is questioned about how his company's marketing material ended...
What type of virus is shown here?
Alert!

Advertisement