This CEH Quiz (101-200) assesses skills in cybersecurity, focusing on practical scenarios like footprinting, encryption, and attack detection. It's designed for professionals aiming to validate their ethical hacking expertise.
A hacker prevents a legitimate user (or group of users) from accessing a service
A hacker uses every character, word, or letter he or she can think of to defeat authentication
A hacker tries to decipher a password by using a system, which subsequently crashes the network
A hacker attemptsto imitate a legitimate user by confusing a computer or even another person
Rate this question:
0xFFFFFFFFFFFF
0xDDDDDDDDDDDD
0xAAAAAAAAAAAA
0xBBBBBBBBBBBB
Rate this question:
Service Degradation
OS Fingerprinting
Manual Target System
Identification Scanning
Rate this question:
Zombie Zapper (ZoZ)
Remote Access Trojan (RAT)
Bot IRC Tunnel (BIT)
Root Digger (RD)
Rate this question:
Visit Google's search engine and view the cached copy
Crawl the entire website and store them into your computer
Visit Archive.org web site to retrieve the Internet archive of the company's website
Visit the company's partners and customers website for this information
Rate this question:
Cross Site Scripting
Password attacks
A Buffer Overflow
A hybrid attack
Rate this question:
Core Impact
Metaspolit
Immunity Canvas
Nessus
Rate this question:
Yancey would be considered a Suicide Hacker
Since he does not care about going to jail, he would be considered a Black Hat
Because Yancey works for the company currently; he would be a White Hat
Yancey is a Hacktivist Hacker since he is standing up to a company that is downsizing
Rate this question:
Option A
Option B
Option C
Option D
Rate this question:
You should have used 3DES which is built into Windows
If you would have implemented Pretty Good Privacy (PGP) which is built into Windows, the sensitive information on the laptops would not have leaked out
You should have utilized the built-in feature of Distributed File System (DFS) to protect the sensitive information on the laptops
You could have implemented Encrypted File System (EFS) to encrypt the sensitive files on the laptops
Rate this question:
Bandwidth exhaust Attack
Denial of Service Attack
Cluster Service Attack
Distributed Denial of Service Attack
Rate this question:
Session Sniffing Attack
Cross-site scripting Attack
SQL Injection Attack
Token sniffing Attack
Rate this question:
Step 1: Enumerate users
Step 2: Crack the password
Step 3: Escalate privileges
Step 4: Execute applications
Step 5: Hide files
Step 6: Cover your tracks
Rate this question:
Stoplog stoplog ?
EnterPol /nolog
EventViewer o service
Auditpol.exe /disable
Rate this question:
C:\windows\system32\config\SAM
C:\winnt\system32\machine\SAM
C:\windows\etc\drivers\SAM
C:\windows\config\etc\SAM
Rate this question:
Image Hide
Snow
Gif-it-up
NiceText
Rate this question:
Token Injection Replay attacks
Shoulder surfing attack
Rainbow and Hash generation attack
Dumpster diving attack
Rate this question:
110
389
464
445
Rate this question:
Encrypt the Sales.xls using PGP and e-mail it to your personal gmail account
Package the Sales.xls using Trojan wrappers and telnet them back your home computer
You can conceal the Sales.xls database in another file like photo.jpg or other files and send it out in an innocent looking email or file transfer using Steganography techniques
Change the extension of Sales.xls to sales.txt and upload them as attachment to your hotmail account
Rate this question:
Hping2
Nessus
Nmap
Make
Rate this question:
http://www.myserver.c0m/search.asp? lname=smith%27%3bupdate%20usertable%20set%20passwd%3d%27hAx0r%27%3b--%00
Http://www.myserver.c0m/script.php?mydata=%3cscript%20src=%22
Http%3a%2f%2fwww.yourserver.c0m%2fbadscript.js%22%3e%3c%2fscript%3e
Http://www.victim.com/example accountnumber=67891&creditamount=999999999
Rate this question:
An alert is generated when a TCP packet is generated from any IP on the 192.168.1.0 subnet and destined to any IP on port 111
An alert is generated when any packet other than a TCP packet is seen on the network and destined for the 192.168.1.0 subnet
An alert is generated when a TCP packet is originated from port 111 of any IP address to the 192.168.1.0 subnet
An alertis generated when a TCP packet originating from any IP address is seen on the network and destined for any IP address on the 192.168.1.0 subnet on port 111
Rate this question:
To learn about the IP range used by the target network
To identify thenumber of employees working for the company
To test the limits of the corporate security policy enforced in the company
To learn about the operating systems, services and applications used on the network
Rate this question:
Cross-site-scripting attack
SQL Injection
URL Traversal attack
Buffer Overflow attack
Rate this question:
9
17
20
32
35
Rate this question:
SMBCrack
SmurfCrack
PSCrack
RainbowTables
Rate this question:
Stream Cipher
Block Cipher
Bit Cipher
Hash Cipher
Rate this question:
False
True
Rate this question:
Chenrocks:/home/siew # hping -S -R -P -A -F -U 192.168.2.56 -p 22 -c 5 -t 118
Chenrocks:/home/siew # hping -F -Q -J -A -C -W 192.168.2.56 -p 22 -c 5 -t 118
Chenrocks:/home/siew # hping -D -V -R -S -Z -Y 192.168.2.56 -p 22 -c 5 -t 118
Chenrocks:/home/siew # hping -G -T -H -S -L -W 192.168.2.56 -p 22 -c 5 -t 118
Rate this question:
Charlie can use the command: ping -l 56550 172.16.0.45 -t.
Charlie can try using the command: ping 56550 172.16.0.45.
By using the command ping 172.16.0.45 Charlie would be able to lockup the router
He could use the command: ping -4 56550 172.16.0.45.
Rate this question:
They are using UDP that is always authorized at the firewall
They are using HTTP tunneling software that allows them to communicate with protocols in a way it was not intended
They have been able to compromise the firewall, modify the rules, and give themselves proper access
They are using an older version of Internet Explorer that allow them to bypass the proxy server
Rate this question:
Vulnerability Scanning
Penetration Testing
Security Policy Implementation
Designing Network Security
Rate this question:
Look at the website design, if it looks professional then it is a Real Anti-Virus website
Connect to the site using SSL, if you are successful then the website is genuine
Search using the URL and Anti-Virus product name into Google and lookout for suspicious warnings against this site
Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware
Download and install Anti-Virus software from this suspicious looking site, yourWindows 7 will prompt you and stop the installation if the downloaded file is a malware
Rate this question:
Information Audit Policy (IAP)
Information SecurityPolicy (ISP)
Penetration Testing Policy (PTP)
Company Compliance Policy (CCP)
Rate this question:
True
False
Rate this question:
Attacker generates TCP SYN packets with random destination addresses towards a victim host
Attacker floods TCP SYN packets with random source addresses towards a victim host
Attacker generatesTCP ACK packets with random source addresses towards a victim host
Attacker generates TCP RST packets with random source addresses towards a victim host
Rate this question:
Untrained staff or ignorant computer users who inadvertently become the weakest link in your security chain
"zero-day"exploits are the weakest link in the security chain since the IDS will not be able to detect these attacks
"Polymorphic viruses" are the weakest link in the security chain since the Anti-Virus scanners will not be able to detect these attacks
Continuous Spam e-mails cannot be blocked by your security system since spammers use different techniques to bypass the filters in your gateway
Rate this question:
A server program using a port that is not well known
Making use of a protocol in a way it was not intended to be used
It is the multiplexing taking place on a communication link
It is one of the weak channels used by WEP that makes it insecure
Rate this question:
Disable SPAN port on the switch
Enable SNMP Trap on the switch
Configure IP security on the switch
Enable Port Security on the switch
Rate this question:
Tcpdump -w ./log
Tcpdump -r log
Tcpdump -vde logtcpdump -vde ? log
Tcpdump -l /var/log/
Rate this question:
ISA proxy
IAS proxy
TOR proxy
Cheops proxy
Rate this question:
Do not reply to email messages or popup ads asking for personal or financial information
Do not trust telephone numbers in e-mails or popup ads
Review credit card and bank account statements regularly
Antivirus, anti-spyware, and firewall software can very easily detect these type of attacks
Do not send credit card numbers, and personal orfinancial information via e-mail
Rate this question:
Simple DDoS attack
DoS attacks which involves flooding a network or system
DoS attacks which involves crashing a network or system
DoS attacks which is done accidentally or deliberately
Rate this question:
Never leave a default password
Never use a password that can be found in a dictionary
Never use a password related to your hobbies, pets, relatives, or date of birth.
Use a word that has more than 21 characters from a dictionary as the password
Never use a password related to the hostname, domain name, or anything else that can be found with whois
Rate this question:
True
False
Rate this question:
DES 64 bit
AES-CCMP 128 bit
MD5 48 bit
SHA 160 bit
Rate this question:
Polymorphic Virus
Metamorphic Virus
Dravidic Virus
Stealth Virus
Rate this question:
Semi Column
Double Quote
Single Quote
Exclamation Mark
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.