This CEH Quiz (201-261) assesses knowledge on securing network communications, handling cryptographic protocols, and preventing common cyber attacks. It is designed for professionals aiming to validate their ethical hacking skills and improve security measures.
Sun tables
Apple tables
Rainbow tables
Moon tables
Rate this question:
CI Gathering
Scanning
Dumpster Diving
Garbage Scooping
Rate this question:
To ensure theexploits used in the attacks always flip reverse vectors
Faster bandwidth performance and increase in attack speed
Interrupt the remote victim's network traffic and reroute the packets to attackers machine
To hide the source IP address so that anattacker can hack without any legal corollary
Rate this question:
MAC spoofing
Macof
ARP spoofing
DNS spoofing
Rate this question:
MD5
PGP
RSA
SSH
Rate this question:
Convert the Trojan.exe file extension to Trojan.txt disguising as text file
Break the Trojan into multiple smaller files and zip the individual pieces
Change the content of the Trojan using hex editor and modify the checksum
Encrypt the Trojan using multiple hashing algorithms like MD5 and SHA-1
Rate this question:
TCP Port 124
UDP Port 125
UDP Port 123
TCP Port 126
Rate this question:
Enable SNMPv3 whichencrypts username/password authentication
Use your company name as the public community string replacing the default 'public'
Enable IP filtering to limit access to SNMP device
The default configuration provided by device vendors is highly secureand you don't need to change anything
Rate this question:
Neil has used a tailgating social engineering attack to gain access to the offices
He has used a piggybacking technique to gain unauthorized access
This type of social engineering attack is called man trapping
Neil is using the technique of reverse social engineering to gain access to the offices of Davidson Avionics
Rate this question:
Option A
Option B
Option C
Option D
Rate this question:
Place robots.txt file in the root of your website with listing of directories that you don't want to be crawled
Place authentication on root directories that will prevent crawling from these spiders
Nable SSL on the restricted directories which will block these spiders from crawling
Place "HTTP:NO CRAWL" on the html pages that you don't want the crawlers to index
If the page is susceptible to SQL injection, it will look in theUsers table for usernames of admin
This statement will look for users with the name of admin, blank passwords, and email addresses that end in @testers.com
This Select SQL statement will log James in if there are any users with NULL passwords
James will be able to see if there are any default user accounts in the SQL database
Rate this question:
The initial traffic from 192.168.12.35 was being spoofed.
The traffic from 192.168.12.25 is from a Linux computer.
The TTL of 21 means that the client computer ison wireless.
The client computer at 192.168.12.35 is a zombie computer.
Rate this question:
Denial of Service attacks
Session Hijacking attacks
Web page defacement attacks
IP spoofing attacks
Rate this question:
System services
EXEC master access
Xp_cmdshell
RDC
Rate this question:
Firewalls will permit inbound TCP packets to specific ports that hosts sitting behind the firewall are listening for connections. By sending out TCP SYN packets instead of ICMP ECHO packets, traceroute can bypass the most common firewall filters.
Firewalls will permit inbound UDP packets to specific ports that hosts sitting behind the firewall are listening for connections. By sending out TCP SYN packets instead of ICMP ECHO packets, traceroute can bypass the most common firewall filters.
Firewalls will permit inbound UDP packets to specific portsthat hosts sitting behind the firewall are listening for connections. By sending out TCP SYN packets instead of ICMP ECHO packets, traceroute can bypass the most common firewall filters.
Do not use traceroute command to determine the path packets taketo reach the destination instead use the custom hacking tool JOHNTHETRACER and run with the command
\> JOHNTHETRACER www.eccouncil.org -F -evade
Rate this question:
True
False
Rate this question:
This code will insert the [email protected] email address into the members table.
This command will delete the entire members table.
It retrieves the password for the first user in the members table.
This command will not produce anything since the syntax is incorrect.
Rate this question:
Dictionary attack
Brute forcing attack
Hybrid attack
Syllable attack
Rule-based attack
Rate this question:
Lack of proper security policy, procedures and maintenance
Bugs in server software, OS and web applications
Installing the server with default settings
Unpatched security flaws in the server software, OS and applications
Rate this question:
The hacker is attempting to compromise more machines on the network
The hacker is planting a rootkit
The hacker is running a buffer overflow exploit to lock down the system
The hacker is trying to cover his tracks
Rate this question:
Downloaded a file to his local computer
Submitted a remote command to crash the server
Poisoned the local DNS cache of the server
Grabbed the Operating System banner
Rate this question:
0 xor 0 = 0
1 xor 0 = 1
1 xor 1 = 1
0 xor 1 = 1
Rate this question:
Brute force attack in which the Hacker attempted guessing login ID and password from password cracking tools.
The Hacker attempted Session hijacking, in which the Hacker opened an account with the bank, then logged in to receive a session ID, guessed the next ID and took over Jason's session.
The Hacker used a generator module to pass results to the Web server and exploited Web application CGI vulnerability.
The Hacker first attempted logins with suspected user names, then used SQL Injection to gain access to valid bank login IDs.
Rate this question:
Yes. June can use an antivirus program since it compares the parity bitof executable files to the database of known check sum counts and it is effective on a polymorphic virus
Yes. June can use an antivirus program since it compares the signatures of executable files to the database of known viral signatures and it is very effective against a polymorphic virus
No. June can't use an antivirus program since it compares the signatures of executable files to the database of known viral signatures and in the case the polymorphic viruses cannot be detected by a signature-based anti-virus program
No. June can't use an antivirus program since it compares the size of executable files to the database of known viral signatures and it is effective on a polymorphic virus
Rate this question:
Stealth Scan
Full Scan
XMAS Scan
FIN Scan
Rate this question:
He can use a split-DNS service to ensure the email is not forwarded on.
A service such as HTTrack would accomplish this.
Blanecould use MetaGoofil tracking tool.
Blane can use a service such as ReadNotify tracking tool.
Rate this question:
0182BD0BD4444BF836077A718CCDF409
44EFCE164AB921CQAAD3B435B51404EE
BA810DBA98995F1817306D272A9441BB
CEC52EB9C8E3455DC2265B23734E0DAC
B757BF5C0D87772FAAD3B435B51404EE
E52CAC67419A9A224A3B108F3FA6CB6D
Rate this question:
ARP spoof the default gateway
Conduct MiTM against the switch
Launch smurf attack against the switch
Flood the switch with ICMP packets
Rate this question:
Jacob is seeing a Smurf attack.
Jacob is seeing a SYN flood.
He is seeing a SYN/ACK attack.
He has found evidence of an ACK flood.
Rate this question:
Never include sensitive information in a script
Use HTTPS SSLv3 to send the data instead of plain HTTPS
Replace the GET with POST method when sending data
Encrypt the data before you send using GET method
Rate this question:
Ping packets cannot bypass firewalls
You must use ping 10.2.3.4 switch
Hping2 uses stealth TCP packets to connect
Hping2 uses TCP instead of ICMP by default
Rate this question:
Bill can use the command: ip dhcp snooping.
Bill can use the command:no ip snoop.
Bill could use the command: ip arp no flood.
He could use the command: ip arp no snoop.
Rate this question:
Stealth scan
Connect scan
Fragmented packet scan
XMAS scan
Rate this question:
SSL is redundant if you already have IDS's in place
SSL will trigger rules at regular interval and force the administrator to turn them off
SSL will slow down the IDS while it is breaking the encryption to see the packet content
SSL will blind the content of the packet and Intrusion Detection Systems will not be able to detect them
Rate this question:
Attackers physically visit every victim's computer to infect them with malicious software
Home computers that have security vulnerabilities are prime targets for botnets
Spammers scan the Internet looking for computers that are unprotected and use these "open- doors" to install malicious software
Attackers use phishing or spam emails that contain links or attachments
Attackers use websites to host the bots utilizing Web Browser vulnerabilities
Rate this question:
Idle Scan
Windows Scan
XMAS Scan
SYN Stealth Scan
Rate this question:
Option A
Option B
Option C
Option D
Install hardware Keylogger on her computer
Install screen capturing Spyware on her computer
Enable Remote Desktop on her computer
Install VNC on her computer
Rate this question:
Hayden is attempting to find live hosts on her company's network byusing an XMAS scan
She is utilizing a SYN scan to find live hosts that are listening on her network
The type of scan, she is using is called a NULL scan
Hayden is using a half-open scan to find live hosts on her network
Rate this question:
A picture that has been renamed with a .txt extension
An encrypted file
An encoded file
A buffer overflow
Rate this question:
Sequence number: 82980070 Acknowledgement number: 17768885A.
Sequence number: 17768729 Acknowledgement number: 82980070B.
Sequence number: 87000070 Acknowledgement number: 85320085C.
Sequence number: 82980010 Acknowledgement number: 17768885D.
There is no way to completely block tracerouting into this area
Block UDP at the firewall
Block TCP at the firewall
Block ICMP at the firewall
Rate this question:
This type of attempt is called URL obfuscation when someone manually changes aURL to try and gain unauthorized access
By changing the mailbox's name in the URL, Kevin is attempting directory transversal
Kevin is trying to utilize query string manipulation to gain access to her email account
He is attempting a path-string attack to gain access to her mailbox
Rate this question:
The payload of 485 is what this Snort signature will look for.
Snort will look for 0d0a5b52504c5d3030320d0a in the payload.
Packets that contain the payload of BACKDOOR SIG -SubSseven 22 will be flagged.
From this snort signature, packets with HOME_NET 27374 in the payload will be flagged.
Rate this question:
Alternate Data Streams
Merge Streams
Steganography
NetBIOS vulnerability
Rate this question:
Signverif.exe
Sigverif.exe
Msverif.exe
Verifier.exe
Rate this question:
The zombie computer will respond with an IPID of 24334.
The zombie computer will respond with an IPID of 24333.
The zombie computer will notsend a response.
The zombie computer will respond with an IPID of 24335.
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.