CERTIFIED ETHICAL HACKER (CEH) V12 EXAMS
(LATEST UPDATES STUDY BUNDLE
PACKAGE WITH SOLUTIONS) QUESTIONS AND
VERIFIED ANSWERS | GRADE A | 100% CORRECT
What threat type is a spouse, friend, or even client of an
employee who uses the employee's credentials to gain access?
.....ANSWER.....Insider affiliate
Which port numbers are used for SNMP? .....ANSWER.....161 and
162
Which port number is used for SSH? .....ANSWER.....22
What is the darknet? .....ANSWER.....Network, software or service
available outside of normal internet traffic and search engines
Which type of password attack attempts every combination of
characters? .....ANSWER.....Brute force
,Page 2 of 735
Which type of attack splits the attack payload into many small
packets? .....ANSWER.....Session splicing
192.168.6.255/24 an example of which kind of reserved IP
address? .....ANSWER.....A broadcast address
Which Common Criteria component defines how thoroughly the
product is tested? .....ANSWER.....Evaluation Assurance Level (EAL)
In which phase of an attack is the record of the attack wiped or
obscured? .....ANSWER.....Clearing Tracks
Which version of the SPAN switch configuration sends traffic from
multiple ports on multiple switches to a single switch port where
the IDS is located? .....ANSWER.....Remote SPAN (RSPAN)
What does an ICMP Type 3/Code 6 error message indicate?
.....ANSWER.....Destination unreachable, because the router has
no route to the network on which the destination resides
,Page 3 of 735
In the command telnet 192.168.5.5 23, what does the number
23 stand for? .....ANSWER.....Port number
What is the term for the tool or process used to exploit a threat?
.....ANSWER.....Threat vector
Which program replaced ipchains in Linux 2.4x?
.....ANSWER.....iptables
At which layer of the OSI model does an IP spoofing attack
occur? .....ANSWER.....Network (Layer 3)
How do you prevent rule files from loading when snort is started?
.....ANSWER.....Open the snort.config file and comment out all of
the rules you do not wish to use
Which file contains the options for the configuration of the Snort
tool? .....ANSWER.....snort.config
Which type of NAT uses a one-to-many mapping model?
.....ANSWER.....Port Address Translation (PAT)
, Page 4 of 735
Which Common Criteria component defines a standard set of
security requirements for a specific type of product?
.....ANSWER.....Protection profile
Which security control can prevent data access by a hacker
interacting and modifying HTML on a web server?
.....ANSWER.....File permissions
Which file system is susceptible to an attack that uses alternative
data streams? .....ANSWER.....NTFS
Which encryption algorithm is susceptible to a factorization
attack? .....ANSWER.....RSA
What is the term for a two-door system with a small room
between them which allows for visual verification of each person
entering a building? .....ANSWER.....Mantrap
Which key is required to decrypt a message encrypted by a
client's public key? .....ANSWER.....Client's private key