Certified Ethical Hacker v10 Practice Exam Guaranteed success
Certified Ethical Hacker v10 Practice Exam Drawing of symbols in public places to publicize an open Wi-Fi wireless network is called what? Correct answer- A. WarChalking The act of altering configuration files and the expected operation of a service is known as what kind of attack? Correct answer- C. Service Reconfiguration ARP (Address Resolution Protocol) does not translate IP addresses to MAC addresses. Correct answer- FALSE Which of the following is a business threat category? Correct answer- ALL OF THE ABOVE What does the term Hacktivism mean? Correct answer- C. Hackers who are hacking for a cause. OWASP's Top 10 IoT Vulnerabilities are provided to help developers, manufacturers, enterprises and consumers make well-informed decisions when building and using IoT devices. A user recently learns of a vulnerability in their web camera's software, which allows an attacker to log in using default admin credentials to view the camera's video feed. Which of OWASP's Top 10 IoT Vulnerabilities does this BEST fall under? Correct answer- C. Weak, guessable, or hardcoded passwords Patch management ensures appropriate patches are installed on all systems. Correct answer- A. TRUE Which of the following is a collection of Internet information gathering and network troubleshooting utilities? Correct answer- C. NetScanTools Pro Which of the following should organizations create as part of incident response planning? Correct answer- D. All of the Above Which of the following analyzes an operating system and all the applications on the network to discover any security flaws that are present? Correct answer- C. GFI LAN Guard Port scanning tools enable a hacker to learn about services running on a host. Correct answer- A. TRUE All of the following can help protect yourself from Google Hacking EXCEPT: Correct answer- C. Keep default pages and samples The vulnerabilities on OWASP's Top 10 IoT Vulnerabilities are categorized by what two factors? Correct answer- D. Rate of occurrence and severity level Which of the following is a "clean computing habit" for users? Correct answer- D. All of the above The HIPPA Privacy Rule regulates the use and disclosure of protected health information. Correct answer- A. TRUE Which of the following best represents the symptoms a host may have when infected by a virus or worm? Correct answer- D. All of the above Individuals who download and use scripts/exploit tools with no real understanding of the concepts being employed in causing an effect are called? Correct answer- C. Script Kiddies Which of the following attacks exploit OS/application installations that contain scripts or tools meant to help administrators be more efficient, but allow hackers access to powerful tools already installed on the host? Correct answer- A. Shrink Wrap Code Attacks Which of the following is a common tool used for LDAP enumeration? Correct answer- D. All of the above How does a denial-of-service (DoS) attack operate? Correct answer- A. A hacker prevents users from accessing a service. The category of hijacking a session by intercepting, modifying and injecting packets between client and server is described as: Correct answer- A. Network Hijacking Which nmap command option performs a scan using the initial TCP handshake but sends an RST instead of ACK? Correct answer- A. sS SYN Stealth Scan Software or hardware which captures packets off the network is called: Correct answer- A. Sniffer Bills for unused services are a sign of identity theft. Correct answer- A. True Gray Hat Hackers use their skills for both offensive and defensive purposes that are not illegal or malicious and have approval to operate. Correct answer- A. TRUE In a public key infrastructure the public key is used to unencrypt a message and sign messages. Correct answer- B. FALSE A virus that does not increase the size of the infected file by hiding in the "open space" of a file is what type of virus? Correct answer- C. Cavity DHCP starvation is a type of denial-of-service attack. Correct answer- A. True SHA takes a message of arbitrary length as input and produces a 160-bit fingerprint or message digest. Correct answer- A. TRUE Which of the following is the most effective countermeasure to password cracking? Correct answer- C. Compose a strong password based on a phrase that results in a random combination of letters and numbers and symbols The Risk Management process includes all of the following steps EXCEPT: Correct answer- C. Risk Vulnerability Melissa is a virus that targeted Microsoft Windows platforms. To which category does this virus belong? Correct answer- A. Macro What is a self-replicating program that does NOT require user intervention to spread? Correct answer- D. Worm All of the following are denial-of-service categories EXCEPT: Correct answer- C. Stabilization Which of the following is a common proxy tool? Correct answer- D. All of the above The difference between signature detection and anomaly detection is: Correct answer- B. Anomaly detection relies on finding differences and signature detection relies on known attacks. Attackers will usually encode their exploits and payloads to prevent detection by clear text signatures. Correct answer- A. TRUE Which of the following was created in response to the September 11, 2001, terrorist attacks? Correct answer- C. U.S. Patriot Act During the vulnerability assessment phase of the vulnerability assessment lifecycle, inference-based techniques use information such as the type of operating system to identify vulnerabilities. Correct answer- B. FALSE If organizations take advantage of the anonymity of cryptocurrencies such as Bitcoin they are protected from ransomeware attacks. Correct answer- B. FALSE Fuzzing is a security software for Windows capable of detecting and preventing buffer overflows. Correct answer- B. FALSE A WiFi network scanner which scans, identifies, and filters hundreds of nearby access points is called? Correct answer- A. inSSIDer An example of Defense In Depth is the combined use of a screening router, a network firewall, a network IDS and a host-based firewall. Correct answer- A. TRUE An attacker tries to access restricted directories and execute commands on the webserver by using the URL to change directories is called what type of attack? Correct answer- D. Directory Traversal An email which claims to be from a legitimate source and attempts to solicit information or convince a senior executive to take some sort of action is known as: Correct answer- B. Whaling Which of the following is a collection of tools to facilitate session hijacking, including libraries for sending or receiving data? Correct answer- B. Hjksuite Which of the following best describes a rootkit? Correct answer- B. Programs that have the ability to hide themselves and cover traces of a hackers activities. Overwhelming an application with traffic is what kind of application attack? Correct answer- C. SYN flood Social engineering can be used to accomplish: Correct answer- D. All of the above Which of the following is an application programming interface used to access the Google search engine? Correct answer- C. Google API Which encryption method is not based on a block cipher? Correct answer- A. RC4 Which of the following established a code of fair information practice that governed the collection, maintenance, use, and dissemination of personally identifiable information (PII)? Correct answer- C. Privacy Act of 1974 System-user passwords are typically stored: Correct answer- C. As hashes in a system password file. Which hashing function uses 160-bit digest? Correct answer- B. SHA 1 A large collection of compromised hosts that are used to conduct DDoS attacks and other malicious actions are known as: Correct answer- B. BotNets The spoofing technique that causes the victim system to lose track of the proper sequence number required to continue a secure connection is called: Correct answer- B. Desynchronization
Written for
- Institution
- Certified Ethical Hacker v10
- Course
- Certified Ethical Hacker v10
Document information
- Uploaded on
- June 28, 2022
- Number of pages
- 5
- Written in
- 2021/2022
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
certified ethical hacker v10 practice exam guaranteed success