100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

CEH V12 Exam Prep (Latest 2024/ 2025 Update) Qs & As | Grade A| 100% Correct (Verified Answers)

Beoordeling
-
Verkocht
-
Pagina's
186
Cijfer
A+
Geüpload op
17-09-2024
Geschreven in
2024/2025

CEH V12 Exam Prep (Latest 2024/ 2025 Update) Qs & As | Grade A| 100% Correct (Verified Answers) Q: Which of the following is the type of violation when an unauthorized individual enters a building following an employee through the employee entrance? A) Reverse Social Engineering B) Tailgating C) Pretexting D) Announced Answer: Tailgating Q: Maria conducted a successful attack and gained access to a linux server. She wants to avoid that NIDS will not catch the succeeding outgoing traffic from this server in the future. Which of the following is the best way to avoid detection of NIDS? A) Protocol Isolation B) Out of band signaling C) Encryption D) Alternate Data Streams Answer: Encryption Q: The company "Usual company" asked a cybersecurity specialist to check their perimeter email gateway security. To do this, the specialist creates a specially formatted email message: From: To: Subject: Test message Date: 5/8/2021 11:22 He sends this message over the Internet, and a "Usual company " employee receives it. This means that the gateway of this company doesn't prevent _____. A) Email phishing B) Email harvesting C) Email spoofing D) Email masquerading Answer: Email Spoofing Q: How works the mechanism of a Boot Sector Virus? A) Moves the MBR to another location on the Random-access memory and copies itself to the original location of the MBR B) Overwrites the original MBR and only executes the new virus code C) Modifies directory table entries to point to the virus code instead of the actual MBR D) Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR Answer: Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR Q: Which of the options presented below is not a Bluetooth attack? A) Bluesnarfing B) Bluesmacking C) Bluejacking D) Bluedriving Answer: Bluedriving Q: Determine the type of SQL injection: SELECT * FROM user WHERE name='x' AND userid IS NULL; --'; A) UNION SQL Injection B) End of Line Comment C) Illegal/Logically Incorrect Query D) Tautology Answer: End of Line Comment Q: Viktor, a white hat hacker, received an order to perform a penetration test from the company "Test us". He starts collecting information and finds the email of an employee of this company in free access. Viktor decides to send a letter to this email, "". He asks the employee to immediately open the "link with the report" and check it. An employee of the company "Test us" opens this link and infects his computer. Thanks to these manipulations, Viktor gained access to the corporate network and successfully conducted a pentest. What type of attack did Viktor use? A) Eavesdropping B) Piggybacking C) Tailgating D) Social engineering Answer: Social Engineering Q: Michael works as a system administrator. He receives a message that several sites are no longer available. Michael tried to go to the sites by URL, but it didn't work. Then he tried to ping the sites and enter IP addresses in the browser and it worked. What problem could Michael identify? A) Traffic is blocked on UDP port 69 B) Traffic is blocked on UDP port 88 C) Traffic is blocked on UDP port 56 D) Traffic is blocked on UDP port 53 Answer: Traffic is blocked on UDP port 53 Q: Benjamin performs a cloud attack during the translation of the SOAP message in the TLS layer. He duplicates the body of the message and sends it to the server as a legitimate user. As a result of these actions, Benjamin managed to access the server resources to unauthorized access. A) Cloud Hopper B) Side-channel C) Cloudborne D) Wrapping Answer: Wrapping Q: Ivan, an evil hacker, conducts an SQLi attack that is based on True/False questions. What type of SQLi does Ivan use? A) DMS-specific SQLi B) Compound SQLi C) Blind SQLi D) Classic SQLi Answer: Blind SQLi

Meer zien Lees minder
Instelling
CEH V12
Vak
CEH V12











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CEH V12
Vak
CEH V12

Documentinformatie

Geüpload op
17 september 2024
Aantal pagina's
186
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

CEHIV12IExamIPrepI(LatestI2024/I2025I
Update)IQsI&IAsI|IGradeIA|I100%ICorrect
I(VerifiedIAnswers)

Q:IWhichIofItheIfollowingIisItheItypeIofIviolationIwhenIanIunauthorizedIindividualIentersIaI
buildingIfollowingIanIemployeeIthroughItheIemployeeIentrance?

A)IReverseISocialIEngineeringI
B)ITailgatingI
C)IPretextingI
D)IAnnounced


Answer:
Tailgating




Q:IMariaIconductedIaIsuccessfulIattackIandIgainedIaccessItoIaIlinuxIserver.ISheIwantsItoIav
oidIthatINIDSIwillInotIcatchItheIsucceedingIoutgoingItrafficIfromIthisIserverIinItheIfuture.IWh
ichIofItheIfollowingIisItheIbestIwayItoIavoidIdetectionIofINIDS?

A)IProtocolIIsolationI
B)IOutIofIbandIsignalingI
C)IEncryptionI
D)IAlternateIDataIStreams


Answer:
Encryption




Q:ITheIcompanyI"UsualIcompany"IaskedIaIcybersecurityIspecialistItoIcheckItheirIperimeterI
emailIgatewayIsecurity.IToIdoIthis,ItheIspecialistIcreatesIaIspeciallyIformattedIemailImessage:
From:
To:
Subject:ITestImessage

,Date:I5/8/2021I11:22
HeIsendsIthisImessageIoverItheIInternet,IandIaI"UsualIcompanyI"IemployeeIreceivesIit.IThisI
meansIthatItheIgatewayIofIthisIcompanyIdoesn'tIpreventI_____.

A)IEmailIphishingI
B)IEmailIharvestingI
C)IEmailIspoofingI
D)IEmailImasquerading


Answer:
EmailISpoofing




Q:IHowIworksItheImechanismIofIaIBootISectorIVirus?
A)IMovesItheIMBRItoIanotherIlocationIonItheIRandom-
accessImemoryIandIcopiesIitselfItoItheIoriginalIlocationIofItheIMBR
B)IOverwritesItheIoriginalIMBRIandIonlyIexecutesItheInewIvirusIcodeI
C)IModifiesIdirectoryItableIentriesItoIpointItoItheIvirusIcodeIinsteadIofItheIactualIMBR
D)IMovesItheIMBRItoIanotherIlocationIonItheIhardIdiskIandIcopiesIitselfItoItheIoriginalIlocati
onIofItheIMBR


Answer:
MovesItheIMBRItoIanotherIlocationIonItheIhardIdiskIandIcopiesIitselfItoItheIoriginalIlocationI
ofItheIMBR




Q:IWhichIofItheIoptionsIpresentedIbelowIisInotIaIBluetoothIattack?
A)IBluesnarfingI
B)IBluesmackingI
C)IBluejackingI
D)IBluedriving


Answer:
Bluedriving

,Q:IDetermineItheItypeIofISQLIinjection:I
SELECTI*IFROMIuserIWHEREIname='x'IANDIuseridIISINULL;I--';I

A)IUNIONISQLIInjectionI
B)IEndIofILineICommentI
C)IIllegal/LogicallyIIncorrectIQueryI
D)ITautology


Answer:
EndIofILineIComment




Q:IViktor,IaIwhiteIhatIhacker,IreceivedIanIorderItoIperformIaIpenetrationItestIfromItheIcomp
anyI"TestIus".IHeIstartsIcollectingIinformationIandIfindsItheIemailIofIanIemployeeIofIthisIcom
panyIinIfreeIaccess.IViktorIdecidesItoIsendIaIletterItoIthisIemail,I"".IHeIasksIt
heIemployeeItoIimmediatelyIopenItheI"linkIwithItheIreport"IandIcheckIit.IAnIemployeeIofItheI
companyI"TestIus"IopensIthisIlinkIandIinfectsIhisIcomputer.IThanksItoItheseImanipulations,IVi
ktorIgainedIaccessItoItheIcorporateInetworkIandIsuccessfullyIconductedIaIpentest.IWhatItypeIo
fIattackIdidIViktorIuse?

A)IEavesdropping
B)IPiggybackingI
C)ITailgatingI
D)ISocialIengineering


Answer:
SocialIEngineering




Q:IMichaelIworksIasIaIsystemIadministrator.IHeIreceivesIaImessageIthatIseveralIsitesIareIno
IlongerIavailable.IMichaelItriedItoIgoItoItheIsitesIbyIURL,IbutIitIdidn'tIwork.IThenIheItriedItoI
pingItheIsitesIandIenterIIPIaddressesIinItheIbrowserIandIitIworked.IWhatIproblemIcouldIMich
aelIidentify?

A)ITrafficIisIblockedIonIUDPIportI69
B)ITrafficIisIblockedIonIUDPIportI88

, C)ITrafficIisIblockedIonIUDPIportI56
D)ITrafficIisIblockedIonIUDPIportI53


Answer:
TrafficIisIblockedIonIUDPIportI53




Q:IBenjaminIperformsIaIcloudIattackIduringItheItranslationIofItheISOAPImessageIinItheITL
SIlayer.IHeIduplicatesItheIbodyIofItheImessageIandIsendsIitItoItheIserverIasIaIlegitimateIuser.I
AsIaIresultIofItheseIactions,IBenjaminImanagedItoIaccessItheIserverIresourcesItoIunauthorized
Iaccess.I

A)ICloudIHopper
B)ISide-channelI
C)ICloudborneI
D)IWrapping


Answer:
Wrapping




Q:IIvan,IanIevilIhacker,IconductsIanISQLiIattackIthatIisIbasedIonITrue/FalseIquestions.IWha
tItypeIofISQLiIdoesIIvanIuse?

A)IDMS-specificISQLi
B)ICompoundISQLiI
C)IBlindISQLi
D)IClassicISQLi


Answer:
BlindISQLi




Q:IPhillip,IaIcybersecurityIspecialist,IneedsIaItoolIthatIcanIfunctionIasIaInetworkIsniffer,Irec
ordInetworkIactivity,IpreventIandIdetectInetworkIintrusion.IWhichIofItheIfollowingItoolsIisIsui
tableIforIPhillip?

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
nurse_steph Rasmussen College
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
9356
Lid sinds
5 jaar
Aantal volgers
5135
Documenten
7547
Laatst verkocht
3 uur geleden
Exams, Study guides, Reviews, Notes

All study solutions.

3.9

1673 beoordelingen

5
841
4
296
3
258
2
77
1
201

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen