100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CEH practice UPDATED Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
10-12-2024
Written in
2024/2025

CEH practice UPDATED Exam Questions and CORRECT Answers IP spoofing refers to the procedure of an attacker changing his or her IP address so that he or she appears to be someone else. Which of the following IP spoofing detection technique succeed only when the attacker is in a different subnet? - CORRECT ANSWER- Direct TTL probes technique* IP identification number technique TCP flow control method UDP flow control method

Show more Read less
Institution
CEH - Certified Ethical Hacker
Course
CEH - Certified Ethical Hacker









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CEH - Certified Ethical Hacker
Course
CEH - Certified Ethical Hacker

Document information

Uploaded on
December 10, 2024
Number of pages
8
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CEH practice UPDATED Exam Questions
and CORRECT Answers
IP spoofing refers to the procedure of an attacker changing his or her IP address so that he or she
appears to be someone else.


Which of the following IP spoofing detection technique succeed only when the attacker is in a
different subnet? - CORRECT ANSWER- Direct TTL probes technique*
IP identification number technique
TCP flow control method
UDP flow control method


Which of the following scan only works if operating system's TCP/IP implementation is based
on RFC 793? - CORRECT ANSWER- TCP connect scan


OS fingerprinting is the method used to determine the operating system running on a remote
target system. It is an important scanning method, as the attacker will have a greater probability
of success if he/she knows the OS. Active stack fingerprinting is one of the types of OS
fingerprinting.


Which of the following is true about active stack fingerprinting? - CORRECT ANSWER- Is
based on the fact that various vendors of OS implement the TCP stack differently


Enumeration is defined as the process of extracting user names, machine names, network
resources, shares, and services from a system.


Which of the following enumeration an attacker uses to obtain list of computers that belongs to a
domain? - CORRECT ANSWER- Netbios enumeration


Steganography is a technique of hiding a secret message within an ordinary message and
extracting it at the destination to maintain confidentiality of data.

, Which of the following steganography technique embed secret message in the frequency domain
of a signal? - CORRECT ANSWER- Transform domain techniques


A virus is a self-replicating program that produces its own code by attaching copies of it into
other executable codes.


Which of the following virus evade the anti-virus software by intercepting its requests to the
operating system? - CORRECT ANSWER- Stealth/Tunneling virus


Lawful intercept is a process that enables a Law Enforcement Agency (LEA) to perform
electronic surveillance on a target as authorized by a judicial or administrative order.


Which of the following statement is true for lawful intercept? - CORRECT ANSWER- Hides
information about lawful intercepts from all but the most privileged users


Denial of Service (DoS) is an attack on a computer or network that prevents legitimate use of its
resources. In a DoS attack, attackers flood a victim system with non-legitimate service requests
or traffic to overload its resources, which prevents it from performing intended tasks.


Which of the following is a symptom of a DoS attack? - CORRECT ANSWER-
Unavailability of a particular website


Firewalls are categorized into two; namely hardware firewall and software firewall. Identify the
correct statement for a software firewall. - CORRECT ANSWER- Software firewall is
placed between the normal application and the networking components of the operating system


RSA is a public-key cryptosystem developed by MIT professors Ronald L. Rivest, Adi Shamir,
and Leonard M. Adleman in 1977 in an effort to help ensure Internet security. RSA uses modular
arithmetic and elementary number theory to do computations using two very large prime
numbers. Identify the statement which is true for RC6 algorithm: - CORRECT ANSWER-
Includes integer multiplication and the use of four 4-bit working registers

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1077
Member since
1 year
Number of followers
102
Documents
68972
Last sold
11 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

171 reviews

5
73
4
30
3
46
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions