100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

CEH practice UPDATED ACTUAL Exam Questions and CORRECT Answers

Beoordeling
-
Verkocht
-
Pagina's
34
Cijfer
A+
Geüpload op
10-12-2024
Geschreven in
2024/2025

CEH practice UPDATED ACTUAL Exam Questions and CORRECT Answers Which of the following attacks is specific to UDP? DDoS sequence prediction smurf fraggle - CORRECT ANSWER- Fraggle uses UDP Echo and Chargen packets with spoofed source address to spam the source address with responses.

Meer zien Lees minder
Instelling
CEH - Certified Ethical Hacker
Vak
CEH - Certified Ethical Hacker











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CEH - Certified Ethical Hacker
Vak
CEH - Certified Ethical Hacker

Documentinformatie

Geüpload op
10 december 2024
Aantal pagina's
34
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

CEH practice UPDATED ACTUAL Exam
Questions and CORRECT Answers
Which of the following attacks is specific to UDP?
DDoS
sequence prediction
smurf

fraggle - CORRECT ANSWER- Fraggle uses UDP Echo and Chargen packets with spoofed
source address to spam the source address with responses.


Which of the following does Aircrack-ng use to crack WPA and WPA2 PSKs?
korek
dictionary
PTW

FMS - CORRECT ANSWER- Aircrack-ng uses only the dictionary technique to crack WPA
and WPA2 pre-shared keys (PSKs). Aircrack-ng is used to crack 802.11 WEP, WPA, and WPA2


When using Firewalk to determine which ports a firewall is blocking, which response is Firewalk
not likely to receive on a filtered port?
Destination port unreachable
No response
TTL expired in transit

Communication administratively prohibited - CORRECT ANSWER- "TTL expired in
transit"
Time to live (TTL) values are manipulated by Firewalk so that the packets expire one hop after
the firewall.


Which is an example of blackboard architecture?
Bayesian system designed to learn to recognize spam
API that allows components to communicate and deliver data

,File server that provides access to clients

Single app that contains both UI and code to access data - CORRECT ANSWER-
Blackboard architecture is a design in which a database is established to solve a problem;
Bayesian antispam techniques where users contribute examples of spam to teach the App how to
recognize it exemplify this


What is libwhisker? - CORRECT ANSWER- a Perl module that supports IDS evasion
techniques


Which protocol provides data encryption and authentication?
PPTP
IPSec
L2TP

GRE - CORRECT ANSWER- IPSec provides data encryp and authentication, protecting
MitM attacks.


PPTP - CORRECT ANSWER- point-to-point protocol:
used for data transfers across IP-based VPN, but uses Extensible Authentication Protocol (EAP)
for authentication, operating at the Data Link OSI layer


L2TP - CORRECT ANSWER- Layer 2 Tunneling Protocol:
used to transfer data across VPN, but uses IPSec


GRE - CORRECT ANSWER- Generic Routing Encapsulation is a tunneling protocol that is
used to encapsulate and forward non-IP protocols like IPX or AppleTalk


RSA - CORRECT ANSWER- RSA is an ASYMMETRIC encryption algorithm that uses
factors of prime numbers. Asymmetric encryption is used in PKI. VULNERABLE TO CHOSEN
CIPHERTEXT.

,AES - CORRECT ANSWER- Advanced encryption standard (AES) is a SYMMETRIC
encryption algorithm that encrypts BLOCKS of data


3DES - CORRECT ANSWER- Triple Data Encryption Standard (3DES) is a symmetric
encryption algorithm; uses multiple 56-bit passes to generate a 168-bit key


RC4 - CORRECT ANSWER- a stream cipher that encrypts data in streams of 8 to 2048 bits



FIbonacci SHrinking (FISH) - CORRECT ANSWER- symmetric encryption algorithm



Skipjack - CORRECT ANSWER- symmetric encryption algorithm



Blowfish - CORRECT ANSWER- Symmetric encryption algorithm



HINFO - CORRECT ANSWER- resource type used to configure the OS type of a DNS
record


MINFO - CORRECT ANSWER- resource type used to display eMail Mailbox information



UINFO - CORRECT ANSWER- resource type used to display User information


Which is true of TCPView?
it does not include a GUI
it can be installed on Windows, Linux, and UNIx
It updates every second by default

it only displays TCP connections - CORRECT ANSWER- TCPView updates every second
by default, but can be modified to refresh ever 2sec, 5sec, or pause completely.


TCPView is a GUI tool for Windows-only

, Which of the following options can you select from the Preferences tab when creating a new
policy in Nessus 5.2?
SSH settings
Cleartext protocol settings
Performance

Global variable settings - CORRECT ANSWER- Global variable settings


What security standard is based on BS 7799 and focused on security governance? - CORRECT
ANSWER- ISO 27001 is based on BS 7799 and focused on security governance.



ISO 17799 and ISO 27002 - CORRECT ANSWER- Based on the FIRST part of BS 7799,
define security objectives based on industry best practices, AKA ISO 27002


COBIT - CORRECT ANSWER- Control OBjects for Information and related Technology is
an IT management framework created by Information Systems Audit and Control Association
(ISACA); sorts control objectives into DOMAINS (planning and org, delivery and support, etc.)


You suspect that a firewall is filtering ICMP packets between your host and a target server.
Which command would NOT be useful in testing connectivity?
A. hping2 -c 5 10.10.10.10
B. hping2 -c 5 -1 10.10.10.10
C. hping2 -c 5 0 10.10.10.10

D. hping2 -c 5 -2 10.10.10.10 - CORRECT ANSWER- B
hping2 -c 5 -1 10.10.10.10
-0 or --rawip: raw IP
-1 or --icmp: ICMP
-2 or --upd: UDP
IF ICMP IS BEING FILTERED, DON'T USE -1 or --icmp
€9,64
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
MGRADES Stanford University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1077
Lid sinds
1 jaar
Aantal volgers
102
Documenten
68972
Laatst verkocht
11 uur geleden
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3,8

171 beoordelingen

5
73
4
30
3
46
2
8
1
14

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen