This CEH Quiz (201-261) assesses knowledge on securing network communications, handling cryptographic protocols, and preventing common cyber attacks. It is designed for professionals aiming to validate their ethical hacking skills and improve security measures.
TCP Port 124
UDP Port 125
UDP Port 123
TCP Port 126
Rate this question:
Bill can use the command: ip dhcp snooping.
Bill can use the command:no ip snoop.
Bill could use the command: ip arp no flood.
He could use the command: ip arp no snoop.
Rate this question:
32 char
64 byte
48 char
128 byte
Rate this question:
Dictionary attack
Brute forcing attack
Hybrid attack
Syllable attack
Rule-based attack
Rate this question:
Option A
Option B
Option C
Option D
Rate this question:
Sun tables
Apple tables
Rainbow tables
Moon tables
Rate this question:
To ensure theexploits used in the attacks always flip reverse vectors
Faster bandwidth performance and increase in attack speed
Interrupt the remote victim's network traffic and reroute the packets to attackers machine
To hide the source IP address so that anattacker can hack without any legal corollary
Rate this question:
Enable SNMPv3 whichencrypts username/password authentication
Use your company name as the public community string replacing the default 'public'
Enable IP filtering to limit access to SNMP device
The default configuration provided by device vendors is highly secureand you don't need to change anything
Rate this question:
Configure routers to restrict the responses to Footprinting requests
Configure Web Servers to avoid information leakage and disable unwanted protocols
Lock the ports with suitable Firewall configuration
Use an IDS that can be configured to refusesuspicious traffic and pick up Footprinting patterns
Evaluate the information before publishing it on the Website/Intranet
Monitor every employee computer with Spy cameras, keyloggers and spy on them
Perform Footprinting techniques and remove anysensitive information found on DMZ sites
Prevent search engines from caching a Webpage and use anonymous registration services
Disable directory and use split-DNS
Brute force attack in which the Hacker attempted guessing login ID and password from password cracking tools.
The Hacker attempted Session hijacking, in which the Hacker opened an account with the bank, then logged in to receive a session ID, guessed the next ID and took over Jason's session.
The Hacker used a generator module to pass results to the Web server and exploited Web application CGI vulnerability.
The Hacker first attempted logins with suspected user names, then used SQL Injection to gain access to valid bank login IDs.
Rate this question:
Place robots.txt file in the root of your website with listing of directories that you don't want to be crawled
Place authentication on root directories that will prevent crawling from these spiders
Nable SSL on the restricted directories which will block these spiders from crawling
Place "HTTP:NO CRAWL" on the html pages that you don't want the crawlers to index
Sequence number: 82980070 Acknowledgement number: 17768885A.
Sequence number: 17768729 Acknowledgement number: 82980070B.
Sequence number: 87000070 Acknowledgement number: 85320085C.
Sequence number: 82980010 Acknowledgement number: 17768885D.
Hayden is attempting to find live hosts on her company's network byusing an XMAS scan
She is utilizing a SYN scan to find live hosts that are listening on her network
The type of scan, she is using is called a NULL scan
Hayden is using a half-open scan to find live hosts on her network
Rate this question:
Lack of proper security policy, procedures and maintenance
Bugs in server software, OS and web applications
Installing the server with default settings
Unpatched security flaws in the server software, OS and applications
Rate this question:
The zombie computer will respond with an IPID of 24334.
The zombie computer will respond with an IPID of 24333.
The zombie computer will notsend a response.
The zombie computer will respond with an IPID of 24335.
Rate this question:
Jacob is seeing a Smurf attack.
Jacob is seeing a SYN flood.
He is seeing a SYN/ACK attack.
He has found evidence of an ACK flood.
Rate this question:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\System32\CurrentVersion\ Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\System32\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Rate this question:
Hping3 -T 10.8.8.8 -S netbios -c 2 -p 80
Hping3 -Y 10.8.8.8 -S windows -c 2 -p 80
Hping3 -O 10.8.8.8 -S server -c 2 -p 80
Hping3 -a 10.8.8.8 -S springfield -c 2 -p 80
Rate this question:
Never include sensitive information in a script
Use HTTPS SSLv3 to send the data instead of plain HTTPS
Replace the GET with POST method when sending data
Encrypt the data before you send using GET method
Rate this question:
Alternate between typing the login credentials and typing characters somewhere else in the focus window
Type a wrong password first, later type the correct password on the login page defeating the keylogger recording
Type a password beginning with the last letter and then using the mouse to move the cursor for each subsequent letter.
The next key typed replaces selected text portion. E.g. if the password is "secret", one could type "s", then some dummy keys "asdfsd". Then these dummies could be selected with mouse, and next character from the password "e" is typed, which replaces the dummies "asdfsd"
The next key typed replaces selected text portion. E.g. if the password is "secret", one could type "s", then some dummy keys "asdfsd". Then these dummies could be selected with mouse, and next character from the password "e" is typed, which replaces the dummies "asdfsd"
Rate this question:
Only Windows systems will reply to this scan.
A switched network will not respond to packets sent tothe broadcast address.
Only Linux and Unix-like (Non-Windows) systems will reply to this scan.
Only servers will reply to this scan.
Rate this question:
The initial traffic from 192.168.12.35 was being spoofed.
The traffic from 192.168.12.25 is from a Linux computer.
The TTL of 21 means that the client computer ison wireless.
The client computer at 192.168.12.35 is a zombie computer.
Rate this question:
Idle Scan
Windows Scan
XMAS Scan
SYN Stealth Scan
Rate this question:
Option A
Option B
Option C
Option D
Enable DHCP Snooping Binding Table
Restrict ARP Duplicates
Enable Dynamic ARP Inspection
Enable MAC snooping Table
Rate this question:
There is no way to completely block tracerouting into this area
Block UDP at the firewall
Block TCP at the firewall
Block ICMP at the firewall
Rate this question:
Neil has used a tailgating social engineering attack to gain access to the offices
He has used a piggybacking technique to gain unauthorized access
This type of social engineering attack is called man trapping
Neil is using the technique of reverse social engineering to gain access to the offices of Davidson Avionics
Rate this question:
Denial of Service attacks
Session Hijacking attacks
Web page defacement attacks
IP spoofing attacks
Rate this question:
Install hardware Keylogger on her computer
Install screen capturing Spyware on her computer
Enable Remote Desktop on her computer
Install VNC on her computer
Rate this question:
Stealth scan
Connect scan
Fragmented packet scan
XMAS scan
Rate this question:
He can use a split-DNS service to ensure the email is not forwarded on.
A service such as HTTrack would accomplish this.
Blanecould use MetaGoofil tracking tool.
Blane can use a service such as ReadNotify tracking tool.
Rate this question:
Ping packets cannot bypass firewalls
You must use ping 10.2.3.4 switch
Hping2 uses stealth TCP packets to connect
Hping2 uses TCP instead of ICMP by default
Rate this question:
The hacker is attempting to compromise more machines on the network
The hacker is planting a rootkit
The hacker is running a buffer overflow exploit to lock down the system
The hacker is trying to cover his tracks
Rate this question:
Downloaded a file to his local computer
Submitted a remote command to crash the server
Poisoned the local DNS cache of the server
Grabbed the Operating System banner
Rate this question:
System services
EXEC master access
Xp_cmdshell
RDC
Rate this question:
This type of attempt is called URL obfuscation when someone manually changes aURL to try and gain unauthorized access
By changing the mailbox's name in the URL, Kevin is attempting directory transversal
Kevin is trying to utilize query string manipulation to gain access to her email account
He is attempting a path-string attack to gain access to her mailbox
Rate this question:
A competitor to the company because they can directly benefit from the publicity generated by making such an attack
Disgruntled employee, customers, suppliers, vendors, business partners, contractors, temps, and consultants
The CEO of the company because he has access to all of the computer systems
A government agency since they know the company's computer system strengths and weaknesses
Rate this question:
If the page is susceptible to SQL injection, it will look in theUsers table for usernames of admin
This statement will look for users with the name of admin, blank passwords, and email addresses that end in @testers.com
This Select SQL statement will log James in if there are any users with NULL passwords
James will be able to see if there are any default user accounts in the SQL database
Rate this question:
The firewall is blocking port 23 to that system
He needs to use an automated tool to telnet in
He cannot spoof hisIP and successfully use TCP
He is attacking an operating system that does not reply to telnet even when open
Rate this question:
31400
31402
The zombie will not send a response
31401
Rate this question:
IRC (Internet Relay Chat)
Legitimate "shrink-wrapped" software packaged by a disgruntled employee
NetBIOS (File Sharing)
Downloading files, games and screensavers from Internet sites
Rate this question:
SSL is redundant if you already have IDS's in place
SSL will trigger rules at regular interval and force the administrator to turn them off
SSL will slow down the IDS while it is breaking the encryption to see the packet content
SSL will blind the content of the packet and Intrusion Detection Systems will not be able to detect them
Rate this question:
Yes. June can use an antivirus program since it compares the parity bitof executable files to the database of known check sum counts and it is effective on a polymorphic virus
Yes. June can use an antivirus program since it compares the signatures of executable files to the database of known viral signatures and it is very effective against a polymorphic virus
No. June can't use an antivirus program since it compares the signatures of executable files to the database of known viral signatures and in the case the polymorphic viruses cannot be detected by a signature-based anti-virus program
No. June can't use an antivirus program since it compares the size of executable files to the database of known viral signatures and it is effective on a polymorphic virus
Rate this question:
0 xor 0 = 0
1 xor 0 = 1
1 xor 1 = 1
0 xor 1 = 1
Rate this question:
Firewalls will permit inbound TCP packets to specific ports that hosts sitting behind the firewall are listening for connections. By sending out TCP SYN packets instead of ICMP ECHO packets, traceroute can bypass the most common firewall filters.
Firewalls will permit inbound UDP packets to specific ports that hosts sitting behind the firewall are listening for connections. By sending out TCP SYN packets instead of ICMP ECHO packets, traceroute can bypass the most common firewall filters.
Firewalls will permit inbound UDP packets to specific portsthat hosts sitting behind the firewall are listening for connections. By sending out TCP SYN packets instead of ICMP ECHO packets, traceroute can bypass the most common firewall filters.
Do not use traceroute command to determine the path packets taketo reach the destination instead use the custom hacking tool JOHNTHETRACER and run with the command
\> JOHNTHETRACER www.eccouncil.org -F -evade
Rate this question:
The payload of 485 is what this Snort signature will look for.
Snort will look for 0d0a5b52504c5d3030320d0a in the payload.
Packets that contain the payload of BACKDOOR SIG -SubSseven 22 will be flagged.
From this snort signature, packets with HOME_NET 27374 in the payload will be flagged.
Rate this question:
Convert the Trojan.exe file extension to Trojan.txt disguising as text file
Break the Trojan into multiple smaller files and zip the individual pieces
Change the content of the Trojan using hex editor and modify the checksum
Encrypt the Trojan using multiple hashing algorithms like MD5 and SHA-1
Rate this question:
This code will insert the [email protected] email address into the members table.
This command will delete the entire members table.
It retrieves the password for the first user in the members table.
This command will not produce anything since the syntax is incorrect.
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.