Certified Ethical Hacker | Questions and Answers |
Grade A| 100% Correct (Verified Answers)//
///////////……
Which of the following tools is a command-line vulnerability scanner that scans web servers for
dangerous files/CGIs?
A) Snort
B) Kon-Boot
C) John the Ripper
D) Nikto
Nikto
Michael, a technical specialist, discovered that the laptop of one of the employees connecting to
a wireless point couldn't access the internet, but at the same time, it can transfer files locally. He
checked the IP address and the default gateway. They are both on 192.168.1.0/24. Which of the
following caused the problem?
A) The laptop is using an invalid IP address
B) The laptop and the gateway are not on the same network
C) The laptop isn't using a private IP address
D) The gateway is not routing to a public IP address
The gateway is not routing to a public IP address
,Josh, a security analyst, wants to choose a tool for himself to examine links between data. One of
the main requirements is to present data using graphs and link analysis. Which of the following
tools will meet John's requirements?
A) Palantir
B) Maltego
C) Analyst's Notebook
D) Metasploit
Maltego
What describes two-factor authentication for a credit card (using a card and pin)?
A) Something you know and something you are
B) Something you have and something you know
C) Something you are and something you remember
D) Something you have and something you are
Something you have and something you know
Identify a vulnerability in OpenSSL that allows stealing the information protected under normal
conditions by the SSL/TLS encryption used to secure the internet?
A) SSL/TLS Renegotiation Vulnerability
B) POODLE
C) Heartbleed Bug
D) Shellshock
Heartbleed Bug
,You make a series of interactive queries, choosing subsequent plaintexts based on the
information from the previous encryption. What type of attack are you trying to perform?
A) Adaptive chosen-plaintext attack
B) Ciphertext-only attack
C) Known-plaintext attack
D) Chosen-plaintext attack
Adaptive chosen-plaintext attack
Which of the following does not apply to IPsec?
A) Provides authentication
B) Use key exchange
C) Encrypts the payloads
D) Work at the Data Link Layer
Work at the Data Link Layer
Alex, a cybersecurity specialist, received a task from the head to scan open ports. One of the
main conditions was to use the most reliable type of TCP scanning. Which of the following types
of scanning would Alex use?
A) NULL Scan
B) Half-open Scan
C) TCP Connect/Full Open Scan
D) Xmas Scan
TCP Connect/Full Open Scan
, Which of the following Nmap options will you use if you want to scan fewer ports than the
default?
A) -p
B) -sP
C) -T
D) -F
-F
You conduct an investigation and finds out that the browser of one of your employees sent
malicious request that the employee knew nothing about. Identify the web page vulnerability that
the attacker used to attack your employee?
A) Cross-Site Request Forgery (CSRF)
B) Command Injection Attacks
C) File Inclusion Attack
D) Hidden Field Manipulation Attack
Cross-Site Request Forgery (CSRF)
Which of the following program attack both the boot sector and executable files?
A) Stealth virus
B) Polymorphic virus
C) Macro virus
D) Multipartite virus