100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Topic 1, Exam Pool A ceh v12 Final Test Questions Fully Solved Graded A+.

Rating
-
Sold
-
Pages
27
Grade
A+
Uploaded on
01-07-2025
Written in
2024/2025

Why should the security analyst disable/remove unnecessary ISAPI filters? A. To defend against social engineering attacks B. To defend against webserver attacks C. To defend against jailbreaking. D.To defend against wireless attacks - Answer To defend against webserver attacks What is the proper response for a NULL scan if the port is open? - Answer No response One of your team members has asked you to analyze the following SOA record. What is the version? R.SOA NS1.R ( 2400.) (Choose four.) A. B. 3600 C.60480 D. 2400 E. 60 F.4800 - Answer You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist's email, and you send her an email changing the source email to her boss's email (boss@company). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don't work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What testing method did you use? - Answer Social engineering Which type of security feature stops vehicles from crashing through the doors of a building? - Answer Bollards Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored? A. symmetric algorithms B. asymmetric algorithms C. hashing algorithms D. integrity algorithms - Answer hashing algorithms

Show more Read less
Institution
CEH V12
Course
CEH V12










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CEH V12
Course
CEH V12

Document information

Uploaded on
July 1, 2025
Number of pages
27
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

Topic 1, Exam Pool A ceh v12 Final Test
Questions Fully Solved Graded A+.

Why should the security analyst disable/remove unnecessary ISAPI filters?

A. To defend against social engineering attacks

B. To defend against webserver attacks

C. To defend against jailbreaking.

D.To defend against wireless attacks - Answer To defend against webserver attacks



What is the proper response for a NULL scan if the port is open? - Answer No response



One of your team members has asked you to analyze the following SOA record. What is the
version? Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800
2400.) (Choose four.)

A. 200303028

B. 3600

C.60480

D. 2400

E. 60

F.4800 - Answer 200303028



You are tasked to perform a penetration test. While you are performing information gathering,
you find an employee list in Google. You find the receptionist's email, and you send her an email
changing the source email to her boss's email (boss@company). In this email, you ask for a pdf
with information. She reads your email and sends back a pdf with links. You exchange the pdf
links with your malicious links (these links contain malware) and send back the modified pdf,
saying that the links don't work. She reads your email, opens the links, and her machine gets
infected. You now have access to the company network. What testing method did you use? -
Answer Social engineering



Which type of security feature stops vehicles from crashing through the doors of a building? -
Answer Bollards

,Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of
communication? - Answer 123



Bob is acknowledged as a hacker of repute and is popular among visitors of "underground"
sites.

Bob is willing to share his knowledge with those who are willing to learn, and many have
expressed their interest in learning from him. However, this knowledge has a risk associated
with it, as it can be used for malevolent attacks as well.

In this context, what would be the most effective method to bridge the knowledge gap between
the "black" hats or crackers and the "white" hats or computer security professionals? (Choose
the test answer.) - Answer Educate everyone with books, articles and training on risk analysis,
vulnerabilities and safeguards.



Which mode of IPSec should you use to assure security and confidentiality of data within the
same LAN? - Answer ESP transport mode



What is the minimum number of network connections in a multihomed firewall - Answer 3



Steve, a scientist who works in a governmental security agency, developed a technological
solution to identify people based on walking patterns and implemented this approach to a
physical control access.

A camera captures people walking and identifies the individuals using Steve's approach.

After that, people must approximate their RFID badges. Both the identifications are required to
open the door. In this case, we can say: - Answer The solution implements the two
authentication factors: physical object and physical characteristic



You are the Network Admin, and you get a complaint that some of the websites are no longer
accessible. You try to ping the servers and find them to be reachable. Then you type the IP
address and then you try on the browser, and find it to be accessible. But they are not
accessible when you try using the URL.

What may be the problem? - Answer Traffic is Blocked on UDP Port 53



A bank stores and processes sensitive privacy information related to home loans. However,
auditing has never been enabled on the system. What is the first step that the bank should take
before enabling the audit feature? - Answer Determine the impact of enabling the audit
feature.

, A user on your Windows 2000 network has discovered that he can use L0phtcrack to sniff the
SMB exchanges which carry user logons. The user is plugged into a hub with 23 other systems.

However, he is unable to capture any logons though he knows that other users are logging in.

What do you think is the most likely reason behind this? - Answer Kerberos is preventing it.



One of your team members has asked you to analyze the following SOA record. What is the TTL?
Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.) -
Answer 2400



Which DNS resource record can indicate how long any "DNS poisoning" could last? - Answer
Soa



Which of the following is a low-tech way of gaining unauthorized access to systems? - Answer
Social Engineering



Which of the following is a component of a risk assessment? - Answer Administrative
safeguards



Let's imagine three companies (A, B and C), all competing in a challenging global environment.
Company A and B are working together in developing a product that will generate a major
competitive advantage for them. Company A has a secure DNS server while company B has a
DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B,
company C gains access to outgoing e-mails from company B. How do you prevent DNS
spoofing? - Answer Install DNS Anti-spoofing



To determine if a software program properly handles a wide range of invalid input, a form of
automated testing can be used to randomly generate invalid input in an attempt to crash the
program.

What term is commonly used when referring to this type of testing? - Answer Fuzzing



A large company intends to use Blackberry for corporate mobile phones and a security analyst is
assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to
demonstrate how an attacker could circumvent perimeter defenses and gain access to the
Prometric Online Testing - Reports
https://ibt1.prometric.com/users/custom/report_queue/rq_str... corporate network. What tool
should the analyst use to perform a Blackjacking attack? - Answer BBProxy

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TestSolver9 Webster University
View profile
Follow You need to be logged in order to follow users or courses
Sold
734
Member since
2 year
Number of followers
124
Documents
24211
Last sold
8 hours ago
TESTSOLVER9 STORE

TOPNOTCH IN LEARNING MATERIALS,(EXAMS,STUDYGUIDES NOTES ,REVIEWS,FLASHCARDS ,ALL SOLVED AND PACKAGED.OUR STORE MAKE YOUR EDUCATION JOURNEY EFFICIENT AND EASY.WE ARE HERE FOR YOU FEEL FREE TO REACH US OUT .

3.6

127 reviews

5
56
4
19
3
22
2
9
1
21

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions