100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CEH v12 Practice Questions WITH ANSWERS

Puntuación
-
Vendido
-
Páginas
215
Grado
A+
Subido en
05-07-2025
Escrito en
2024/2025

CEH v12 Practice Questions WITH ANSWERS

Institución
CEH V12
Grado
CEH v12











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CEH v12
Grado
CEH v12

Información del documento

Subido en
5 de julio de 2025
Número de páginas
215
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CEH v12 Practice Questions WITH |\ |\ |\ |\ |\




ANSWERS

Which of the following tools is a command-line vulnerability
|\ |\ |\ |\ |\ |\ |\ |\ |\


scanner that scans web servers for dangerous files/CGIs?
|\ |\ |\ |\ |\ |\ |\




A) Snort
|\




B) Kon-Boot
|\




C) John the Ripper
|\ |\ |\




D) Nikto - CORRECT ANSWERS ✔✔Nikto
|\ |\ |\ |\ |\




Michael, a technical specialist, discovered that the laptop of one
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


of the employees connecting to a wireless point couldn't access
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


the internet, but at the same time, it can transfer files locally. He
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


checked the IP address and the default gateway. They are both
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


on 192.168.1.0/24. Which of the following caused the problem?
|\ |\ |\ |\ |\ |\ |\ |\




A) The laptop is using an invalid IP address
|\ |\ |\ |\ |\ |\ |\ |\




B) The laptop and the gateway are not on the same network
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




C) The laptop isn't using a private IP address
|\ |\ |\ |\ |\ |\ |\ |\ |\




D) The gateway is not routing to a public IP address - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔The gateway is not routing to a public IP address
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\




Josh, a security analyst, wants to choose a tool for himself to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


examine links between data. One of the main requirements is to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\

,present data using graphs and link analysis. Which of the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


following tools will meet John's requirements?
|\ |\ |\ |\ |\




A) Palantir
|\




B) Maltego
|\




C) Analyst's Notebook
|\ |\




D) Metasploit - CORRECT ANSWERS ✔✔Maltego
|\ |\ |\ |\ |\




What describes two-factor authentication for a credit card (using
|\ |\ |\ |\ |\ |\ |\ |\ |\


a card and pin)?
|\ |\ |\




A) Something you know and something you are
|\ |\ |\ |\ |\ |\ |\ |\




B) Something you have and something you know
|\ |\ |\ |\ |\ |\ |\




C) Something you are and something you remember
|\ |\ |\ |\ |\ |\ |\ |\




D) Something you have and something you are - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Something you have and something you know
|\ |\ |\ |\ |\ |\ |\




Identify a vulnerability in OpenSSL that allows stealing the
|\ |\ |\ |\ |\ |\ |\ |\ |\


information protected under normal conditions by the SSL/TLS
|\ |\ |\ |\ |\ |\ |\ |\


encryption used to secure the internet? |\ |\ |\ |\ |\




A) SSL/TLS Renegotiation Vulnerability
|\ |\ |\ |\




B) POODLE
|\




C) Heartbleed Bug
|\ |\




D) Shellshock - CORRECT ANSWERS ✔✔Heartbleed Bug
|\ |\ |\ |\ |\ |\

,You make a series of interactive queries, choosing subsequent
|\ |\ |\ |\ |\ |\ |\ |\ |\


plaintexts based on the information from the previous encryption.
|\ |\ |\ |\ |\ |\ |\ |\


What type of attack are you trying to perform?
|\ |\ |\ |\ |\ |\ |\ |\ |\




A) Adaptive chosen-plaintext attack
|\ |\ |\




B) Ciphertext-only attack
|\ |\ |\




C) Known-plaintext attack
|\ |\




D) Chosen-plaintext attack - CORRECT ANSWERS ✔✔Adaptive
|\ |\ |\ |\ |\ |\ |\


chosen-plaintext attack |\




Which of the following does not apply to IPsec?
|\ |\ |\ |\ |\ |\ |\ |\




A) Provides authentication
|\ |\ |\




B) Use key exchange
|\ |\ |\ |\




C) Encrypts the payloads
|\ |\ |\ |\




D) Work at the Data Link Layer - CORRECT ANSWERS ✔✔Work at
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


the Data Link Layer
|\ |\ |\




Alex, a cybersecurity specialist, received a task from the head to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


scan open ports. One of the main conditions was to use the most
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


reliable type of TCP scanning. Which of the following types of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


scanning would Alex use? |\ |\ |\




A) NULL Scan
|\ |\ |\




B) Half-open Scan
|\ |\ |\




C) TCP Connect/Full Open Scan
|\ |\ |\ |\ |\

, D) Xmas Scan - CORRECT ANSWERS ✔✔TCP Connect/Full Open
|\ |\ |\ |\ |\ |\ |\ |\ |\


Scan


Which of the following Nmap options will you use if you want to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


scan fewer ports than the default?
|\ |\ |\ |\ |\ |\




A) -p
|\




B) -sP
|\




C) -T
|\




D) -F - CORRECT ANSWERS ✔✔-F
|\ |\ |\ |\ |\




You conduct an investigation and finds out that the browser of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


one of your employees sent malicious request that the employee
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


knew nothing about. Identify the web page vulnerability that the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


attacker used to attack your employee?
|\ |\ |\ |\ |\




A) Cross-Site Request Forgery (CSRF)
|\ |\ |\ |\




B) Command Injection Attacks
|\ |\ |\ |\




C) File Inclusion Attack
|\ |\ |\ |\




D) Hidden Field Manipulation Attack - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\


✔✔Cross-Site Request Forgery (CSRF) |\ |\ |\




Which of the following program attack both the boot sector and
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


executable files? |\ |\




A) Stealth virus
|\ |\ |\
$26.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Thumbnail
Package deal
CEH v12 EXAM study pack
-
4 2025
$ 81.46 Más información

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
EXAMSTUDYPLUG Stanford University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
299
Miembro desde
3 año
Número de seguidores
106
Documentos
17673
Última venta
1 semana hace
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Lee mas Leer menos
4.5

230 reseñas

5
155
4
50
3
13
2
5
1
7

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes