100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

Topic 1, Exam Pool A ceh v12 Final Test Questions Fully Solved Graded A+.

Beoordeling
-
Verkocht
-
Pagina's
27
Cijfer
A+
Geüpload op
01-07-2025
Geschreven in
2024/2025

Why should the security analyst disable/remove unnecessary ISAPI filters? A. To defend against social engineering attacks B. To defend against webserver attacks C. To defend against jailbreaking. D.To defend against wireless attacks - Answer To defend against webserver attacks What is the proper response for a NULL scan if the port is open? - Answer No response One of your team members has asked you to analyze the following SOA record. What is the version? R.SOA NS1.R ( 2400.) (Choose four.) A. B. 3600 C.60480 D. 2400 E. 60 F.4800 - Answer You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist's email, and you send her an email changing the source email to her boss's email (boss@company). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don't work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What testing method did you use? - Answer Social engineering Which type of security feature stops vehicles from crashing through the doors of a building? - Answer Bollards Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored? A. symmetric algorithms B. asymmetric algorithms C. hashing algorithms D. integrity algorithms - Answer hashing algorithms

Meer zien Lees minder
Instelling
CEH V12
Vak
CEH V12










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CEH V12
Vak
CEH V12

Documentinformatie

Geüpload op
1 juli 2025
Aantal pagina's
27
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

Topic 1, Exam Pool A ceh v12 Final Test
Questions Fully Solved Graded A+.

Why should the security analyst disable/remove unnecessary ISAPI filters?

A. To defend against social engineering attacks

B. To defend against webserver attacks

C. To defend against jailbreaking.

D.To defend against wireless attacks - Answer To defend against webserver attacks



What is the proper response for a NULL scan if the port is open? - Answer No response



One of your team members has asked you to analyze the following SOA record. What is the
version? Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800
2400.) (Choose four.)

A. 200303028

B. 3600

C.60480

D. 2400

E. 60

F.4800 - Answer 200303028



You are tasked to perform a penetration test. While you are performing information gathering,
you find an employee list in Google. You find the receptionist's email, and you send her an email
changing the source email to her boss's email (boss@company). In this email, you ask for a pdf
with information. She reads your email and sends back a pdf with links. You exchange the pdf
links with your malicious links (these links contain malware) and send back the modified pdf,
saying that the links don't work. She reads your email, opens the links, and her machine gets
infected. You now have access to the company network. What testing method did you use? -
Answer Social engineering



Which type of security feature stops vehicles from crashing through the doors of a building? -
Answer Bollards

,Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of
communication? - Answer 123



Bob is acknowledged as a hacker of repute and is popular among visitors of "underground"
sites.

Bob is willing to share his knowledge with those who are willing to learn, and many have
expressed their interest in learning from him. However, this knowledge has a risk associated
with it, as it can be used for malevolent attacks as well.

In this context, what would be the most effective method to bridge the knowledge gap between
the "black" hats or crackers and the "white" hats or computer security professionals? (Choose
the test answer.) - Answer Educate everyone with books, articles and training on risk analysis,
vulnerabilities and safeguards.



Which mode of IPSec should you use to assure security and confidentiality of data within the
same LAN? - Answer ESP transport mode



What is the minimum number of network connections in a multihomed firewall - Answer 3



Steve, a scientist who works in a governmental security agency, developed a technological
solution to identify people based on walking patterns and implemented this approach to a
physical control access.

A camera captures people walking and identifies the individuals using Steve's approach.

After that, people must approximate their RFID badges. Both the identifications are required to
open the door. In this case, we can say: - Answer The solution implements the two
authentication factors: physical object and physical characteristic



You are the Network Admin, and you get a complaint that some of the websites are no longer
accessible. You try to ping the servers and find them to be reachable. Then you type the IP
address and then you try on the browser, and find it to be accessible. But they are not
accessible when you try using the URL.

What may be the problem? - Answer Traffic is Blocked on UDP Port 53



A bank stores and processes sensitive privacy information related to home loans. However,
auditing has never been enabled on the system. What is the first step that the bank should take
before enabling the audit feature? - Answer Determine the impact of enabling the audit
feature.

, A user on your Windows 2000 network has discovered that he can use L0phtcrack to sniff the
SMB exchanges which carry user logons. The user is plugged into a hub with 23 other systems.

However, he is unable to capture any logons though he knows that other users are logging in.

What do you think is the most likely reason behind this? - Answer Kerberos is preventing it.



One of your team members has asked you to analyze the following SOA record. What is the TTL?
Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.) -
Answer 2400



Which DNS resource record can indicate how long any "DNS poisoning" could last? - Answer
Soa



Which of the following is a low-tech way of gaining unauthorized access to systems? - Answer
Social Engineering



Which of the following is a component of a risk assessment? - Answer Administrative
safeguards



Let's imagine three companies (A, B and C), all competing in a challenging global environment.
Company A and B are working together in developing a product that will generate a major
competitive advantage for them. Company A has a secure DNS server while company B has a
DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B,
company C gains access to outgoing e-mails from company B. How do you prevent DNS
spoofing? - Answer Install DNS Anti-spoofing



To determine if a software program properly handles a wide range of invalid input, a form of
automated testing can be used to randomly generate invalid input in an attempt to crash the
program.

What term is commonly used when referring to this type of testing? - Answer Fuzzing



A large company intends to use Blackberry for corporate mobile phones and a security analyst is
assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to
demonstrate how an attacker could circumvent perimeter defenses and gain access to the
Prometric Online Testing - Reports
https://ibt1.prometric.com/users/custom/report_queue/rq_str... corporate network. What tool
should the analyst use to perform a Blackjacking attack? - Answer BBProxy

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
TestSolver9 Webster University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
734
Lid sinds
2 jaar
Aantal volgers
124
Documenten
24211
Laatst verkocht
8 uur geleden
TESTSOLVER9 STORE

TOPNOTCH IN LEARNING MATERIALS,(EXAMS,STUDYGUIDES NOTES ,REVIEWS,FLASHCARDS ,ALL SOLVED AND PACKAGED.OUR STORE MAKE YOUR EDUCATION JOURNEY EFFICIENT AND EASY.WE ARE HERE FOR YOU FEEL FREE TO REACH US OUT .

3,6

127 beoordelingen

5
56
4
19
3
22
2
9
1
21

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen