100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CEH Exam UPDATED Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
23
Grade
A+
Uploaded on
10-12-2024
Written in
2024/2025

CEH Exam UPDATED Exam Questions and CORRECT Answers Tool that can be used to run a covert channel over ICMP. - CORRECT ANSWER- Loki What is the following Snort rule used for? #alert tcp any any -> $HOME_NET 22 (msg: "Policy Violation Detected", dsize: 52 flags: AP; threshold: type both, track by_src, count 3, seconds 60; classtype: successful-user; sid:2001637; rev:3;) - CORRECT ANSWER- to detect if someone attempts to use SSH

Show more Read less
Institution
CEH - Certified Ethical Hacker
Course
CEH - Certified Ethical Hacker










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CEH - Certified Ethical Hacker
Course
CEH - Certified Ethical Hacker

Document information

Uploaded on
December 10, 2024
Number of pages
23
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CEH Exam UPDATED Exam Questions
and CORRECT Answers
Tool that can be used to run a covert channel over ICMP. - CORRECT ANSWER- Loki


What is the following Snort rule used for?
#alert tcp any any -> $HOME_NET 22 (msg: "Policy Violation Detected", dsize: 52 flags: AP;
threshold: type both, track by_src, count 3, seconds 60; classtype: successful-user; sid:2001637;
rev:3;) - CORRECT ANSWER- to detect if someone attempts to use SSH


Which Trojan uses port 81?
a. Poison Ivy
b. Obot
c. Loki

d. ICMP send - CORRECT ANSWER- Obot


Which tool is commonly used for enumeration?
A. GetAcct
B. John
C. LCP

D. IAM tool kit - CORRECT ANSWER- A. GetAcct


Which tool is used for web-based password cracking?
A. ObiWan
B. SQLsmack
C. Wikto

D. N-Stealth - CORRECT ANSWER- A. ObiWan

,What type of encryption is used to secure Linux passwords? - CORRECT ANSWER- Linux
passwords are encrypted with asymmetric algorithms.


Which of the following is a LMK rootkit?
a. Flea
b. T0rm
c. Adore

d. Chkroot - CORRECT ANSWER- Adore.
It is a loadable kernel module (LMK) rootkit. It runs in kernel space after the system is running.


A _____ ____ ______ runs in kernel space but can be loaded separately after the system is
running? - CORRECT ANSWER- Loadable Kernel Module


Which of the following uses the same key to encode and decode data?
a. RSA
b. ElGamal
c. ECC

d. RC5 - CORRECT ANSWER- RC5


RC5 is a ___ ____ symemetric cipher in which the number of rounds can range from 0 to 255,
and the key can range from 0 to 2040 bits in size. - CORRECT ANSWER- block-based


____ is the number of rounds RC5 can range is from. The key size can range from __ to ___ bits.
- CORRECT ANSWER- 0 to 255 (rounds)
0 to 2040 (bits)


____ basically puts a program in a sandbox.
a. Tripwire
b. IPChains

, c. Chkrootkit

d. IPTables - CORRECT ANSWER- Chkrootkit


This version of 802.11 wireless operates at the 5.725 to 5.825GHz range.
a. 802.11a
b. 802.11b
c. 802.11g

d. 802.1x - CORRECT ANSWER- 802.11a


the OSSTMM is used for which of the following?
a. Open social engineering testing
b. Security training
c. Audits

d. Security assessments - CORRECT ANSWER- Security assessments


Which of the following properly describes an evasion attack?
a. An IDS blindly believes and accepts a packet that an end system has rejected.
b. Splits data between several packets that the IDS cannot detect.
c. An end system accepts a packet that an IDS rejects

d. Uses polymorphic shell code to avoid detection. - CORRECT ANSWER- c. An end
system accepts a packet that an IDS rejects.


An ______ attack sends packets that the IDS rejects but that the target ___ accepts. - CORRECT
ANSWER- evasion attack
target host


Which of the following is true about Firewalking?
a. It alters the TTL

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1077
Member since
1 year
Number of followers
102
Documents
68972
Last sold
11 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

171 reviews

5
73
4
30
3
46
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions