Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

EXAMTOPICS CEH QUESTIONS WITH COMPLETE SOLUTIONS

Rating
-
Sold
-
Pages
84
Grade
A+
Uploaded on
24-11-2025
Written in
2025/2026

EXAMTOPICS CEH QUESTIONS WITH COMPLETE SOLUTIONS

Institution
ECCouncil
Course
ECCouncil

Content preview

EXAMTOPICS CEH QUESTIONS WITH
COMPLETE SOLUTIONS



Which of the following is a hardware requirement that either an IDS/IPS system or a
proxy server must have in order to properly function?

A. Fast processor to help with network traffic analysis
B. They must be dual-homed
C. Similar RAM requirements
D. Fast network interface cards - Correct Answers -B. They must be dual-homed

Which of the following is an application that requires a host application for replication?
A. Micro
B. Worm
C. Trojan
D. Virus - Correct Answers -D. Virus

A large company intends to use Blackberry for corporate mobile phones and a security
analyst is assigned to evaluate the possible threats. The analyst will use the
Blackjacking attack method to demonstrate how an attacker could circumvent perimeter
defenses and gain access to the corporate network. What tool should the analyst use to
perform a Blackjacking attack?

A. Paros Proxy
B. BBProxy
C. BBCrack
D. Blooover - Correct Answers -B. BBProxy

Which of the following can the administrator do to verify that a tape backup can be
recovered in its entirety?

A. Restore a random file.
B. Perform a full restore.
C. Read the first 512 bytes of the tape.
D. Read the last 512 bytes of the tape. - Correct Answers -B. Perform a full restore.

Which of the following describes the characteristics of a Boot Sector Virus?

,A. Moves the MBR to another location on the RAM and copies itself to the original
location of the MBR

B. Moves the MBR to another location on the hard disk and copies itself to the original
location of the MBR

C. Modifies directory table entries so that directory entries point to the virus code
instead of the actual program

D. Overwrites the original MBR and only executes the new virus code - Correct Answers
-B. Moves the MBR to another location on the hard disk and copies itself to the original
location of the MBR

Which statement is TRUE regarding network firewalls preventing Web Application
attacks?

A. Network firewalls can prevent attacks because they can detect malicious HTTP
traffic.

B. Network firewalls cannot prevent attacks because ports 80 and 443 must be opened.

C. Network firewalls can prevent attacks if they are properly configured.

D. Network firewalls cannot prevent attacks because they are too complex to configure.
- Correct Answers -B. Network firewalls cannot prevent attacks because ports 80 and
443 must be opened.

Which of the following programs is usually targeted at Microsoft Office products?

A. Polymorphic virus
B. Multipart virus
C. Macro virus
D. Stealth virus - Correct Answers -C. Macro virus

Bluetooth uses which digital modulation technique to exchange information between
paired devices?

A. PSK (phase-shift keying)
B. FSK (frequency-shift keying)
C. ASK (amplitude-shift keying)
D. QAM (quadrature amplitude modulation) - Correct Answers -A. PSK (phase-shift
keying)

In order to show improvement of security over time, what must be developed?

A. Reports

,B. Testing tools
C. Metrics
D. Taxonomy of vulnerabilities - Correct Answers -C. Metrics

Passive reconnaissance involves collecting information through which of the following?

A. Social engineering
B. Network traffic sniffing
C. Man in the middle attacks
D. Publicly accessible sources - Correct Answers -D. Publicly accessible sources

How can rainbow tables be defeated?

A. Password salting
B. Use of non-dictionary words
C. All uppercase character passwords
D. Lockout accounts under brute force password cracking attempts - Correct Answers -
A. Password salting

The following is a sample of output from a penetration tester's machine targeting a
machine with the IP address of 192.168.1.106:What is most likely taking place?

[ATTEMPT] target 192.168.1.106 - login "root" - pass "a" 1 of 20
[ATTEMPT] target 192.168.1.106 - login "root" - pass "123" 2 of 20
[ATTEMPT] target 192.168.1.106 - login "testuser" - pass "a" 1 of 20
[ATTEMPT] target 192.168.1.106 - login "testuser" - pass "123" 3 of 20

A. Ping sweep of the 192.168.1.106 network
B. Remote service brute force attempt
C. Port scan of 192.168.1.106
D. Denial of service attack on 192.168.1.106 - Correct Answers -B. Remote service
brute force attempt

An NMAP scan of a server shows port 25 is open. What risk could this pose?

A. Open printer sharing
B. Web portal data leak
C. Clear text authentication
D. Active mail relay - Correct Answers -D. Active mail relay

A penetration tester is conducting a port scan on a specific host. The tester found
several ports opened that were confusing in concluding the Operating System(OS)
version installed. Considering the NMAP result below, which of the following is likely to
be installed on the target machine by the OS?

starting nmap 5.21 at 2011-03-15 11:6

, nmap scan report for 172.16.40.65
Host is up (1.00s latency)
PORT STATE SERVICE
21/tcp open ftp
23/tcp open telnet
80/tcp open http
139/tcp open netbios-ssn
515/tcp open
613/tcp open ipp
9100/tcp open
MAC address 00:00:48:0D:EE:89

A. The host is likely a Windows machine.
B. The host is likely a Linux machine.
C. The host is likely a router.
D. The host is likely a printer. - Correct Answers -D. The host is likely a printer.

What type of OS fingerprinting technique sends specially crafted packets to the remote
OS and analyzes the received response?

A. Passive
B. Reflective
C. Active
D. Distributive
Reveal Solution - Correct Answers -C. Active

Which of the following lists are valid data-gathering activities associated with a risk
assessment?

A. Threat identification, vulnerability identification, control analysis

B. Threat identification, response identification, mitigation identification

C. Attack profile, defense profile, loss profile

D. System profile, vulnerability identification, security determination - Correct Answers -
A. Threat identification, vulnerability identification, control analysis

A penetration tester is hired to do a risk assessment of a company's DMZ. The rules of
engagement states that the penetration test be done from an external IP address with
no prior knowledge of the internal IT systems. What kind of test is being performed?

A. white box
B. grey box
C. red box
D. black box - Correct Answers -D. black box

Written for

Institution
ECCouncil
Course
ECCouncil

Document information

Uploaded on
November 24, 2025
Number of pages
84
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
millyphilip West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
2891
Member since
4 year
Number of followers
1958
Documents
43406
Last sold
2 days ago
white orchid store

EXCELLENCY IN ACCADEMIC MATERIALS ie exams, study guides, testbanks ,case, case study etc

3.6

547 reviews

5
237
4
87
3
104
2
31
1
88

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions