100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

CEH v11 Practice Test Questions with Answers Graded A+

Beoordeling
-
Verkocht
-
Pagina's
10
Cijfer
A+
Geüpload op
12-08-2024
Geschreven in
2024/2025

CEH v11 Practice Test Questions with Answers Graded A+ What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key? A. Replay attack B. Traffic analysis attack C. Meet-in-the-middle attack D. Man-in-the-middle attack - Answer-C. Meet-in-the-middle attack You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist's email, and you send her an email changing the source email to her boss's email (boss@company). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don't work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What testing method did you use? A. Eavesdropping B. Piggybacking C. Social engineering D. Tailgating - Answer-C. Social engineering While performing online banking using a Web browser, a user receives an email that contains a link to an interesting Web site. When the user clicks on the link, another Web browser session starts and displays a video of cats playing a piano. The next business day, the user receives what looks like an email from his bank, indicating that his bank account has been accessed from a foreign country. The email asks the user to call his bank and verify the authorization of a funds transfer that took place. What Web browser-based security vulnerability was exploited to compromise the user? A. Clickjacking B. Cross-Site Scripting C. Cross-Site Request Forgery D. Web form input validation - Answer-C. Cross-Site Request Forgery

Meer zien Lees minder
Instelling
CEH V11
Vak
CEH v11









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CEH v11
Vak
CEH v11

Documentinformatie

Geüpload op
12 augustus 2024
Aantal pagina's
10
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

CEH v11 Practice Test Questions with
Answers Graded A+
What is the known plaintext attack used against DES which gives the result that
encrypting plaintext with one DES key followed by encrypting it with a second DES key
is no more secure than using a single key?

A. Replay attack
B. Traffic analysis attack
C. Meet-in-the-middle attack
D. Man-in-the-middle attack - Answer-C. Meet-in-the-middle attack

You are tasked to perform a penetration test. While you are performing information
gathering, you find an employee list in Google. You find the receptionist's email, and
you send her an email changing the source email to her boss's email (boss@company).
In this email, you ask for a pdf with information. She reads your email and sends back a
pdf with links. You exchange the pdf links with your malicious links (these links contain
malware) and send back the modified pdf, saying that the links don't work. She reads
your email, opens the links, and her machine gets infected. You now have access to the
company network. What testing method did you use?

A. Eavesdropping
B. Piggybacking
C. Social engineering
D. Tailgating - Answer-C. Social engineering

While performing online banking using a Web browser, a user receives an email that
contains a link to an interesting Web site. When the user clicks on the link, another Web
browser session starts and displays a video of cats playing a piano. The next business
day, the user receives what looks like an email from his bank, indicating that his bank
account has been accessed from a foreign country. The email asks the user to call his
bank and verify the authorization of a funds transfer that took place. What Web browser-
based security vulnerability was exploited to compromise the user?

A. Clickjacking
B. Cross-Site Scripting
C. Cross-Site Request Forgery
D. Web form input validation - Answer-C. Cross-Site Request Forgery

Which service in a PKI will vouch for the identity of an individual or company?

A. KDC
B. CR

, C. CBC
D. CA - Answer-D. CA

Identify the web application attack where the attackers exploit vulnerabilities in
dynamically generated web pages to inject client-side script into web pages viewed by
other users.

A. LDAP Injection attack
B. Cross-Site Scripting (XSS)
C. SQL injection attack
D. Cross-Site Request Forgery (CSRF) - Answer-B. Cross-Site Scripting (XSS)

User A is writing a sensitive email message to user B outside the local network. User A
has chosen to use PKI to secure his message and ensure only user B can read the
sensitive email. At what layer of the OSI layer does the encryption and decryption of the
message take place?

A. Application
B. Transport
C. Session
D. Presentation - Answer-D. Presentation


How is the public key distributed in an orderly, controlled fashion so that the users can
be sure
of the sender's identity?

A. Hash value
B. Digital signature
C. Private key
D. Digital certificate - Answer-D. Digital certificate

What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?

A. All are tools that can be used not only by hackers, but also security personnel
B. All are hacking tools developed by the legion of doom
C. All are tools that are only effective against Windows D. All are tools that are only
effective against Linux
E. All are DDOS tools - Answer-E. All are DDOS tools

A zone file consists of which of the following Resource Records (RRs)?

A. DNS, NS, PTR, and MX records
B. SOA, NS, A, and MX records
C. DNS, NS, AXFR, and MX records
D. SOA, NS, AXFR, and MX records - Answer-B. SOA, NS, A, and MX records
€12,30
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Scholarsstudyguide nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
782
Lid sinds
3 jaar
Aantal volgers
475
Documenten
15262
Laatst verkocht
5 dagen geleden
NURSING

Here you will find everything you need in nursing Assignments, EXAMS AND TESTBANKS. For students who want to see results twice as fast. I strive for my content to be of the highest quality. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.

3,9

164 beoordelingen

5
87
4
21
3
26
2
6
1
24

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen