100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CEH V.11 Dump Exam Questions and Answers All Correct $13.49   Add to cart

Exam (elaborations)

CEH V.11 Dump Exam Questions and Answers All Correct

 1 view  0 purchase
  • Course
  • CEH V.11 Dump
  • Institution
  • CEH V.11 Dump

CEH V.11 Dump Exam Questions and Answers All Correct Internet Protocol Security IPsec is actually a suite of protocols. Each protocol within the suite provides different functionality. Collective IPsec does everything except. A - Protect the payload and the headers B - Encrypt C - Work at t...

[Show more]

Preview 4 out of 59  pages

  • August 12, 2024
  • 59
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CEH V.11 Dump
  • CEH V.11 Dump
avatar-seller
Scholarsstudyguide
CEH V.11 Dump Exam Questions and
Answers All Correct

Internet Protocol Security IPsec is actually a suite of protocols. Each protocol within the
suite provides different functionality. Collective IPsec does everything except.

A - Protect the payload and the headers
B - Encrypt
C - Work at the Data Link Layer
D - Authenticate - Answer-D - Authenticate

An attacker attaches a rogue router in a network. He wants to redirect traffic to a LAN
attached to his router as part of a man-in-the-middle attack. What measure on behalf of
the legitimate admin can mitigate this attack?

A - Make sure that legitimate network routers are configured to run routing protocols
with authentication.

B - Disable all routing protocols and only use static routes.

C - Only using OSPFv3 will mitigate this risk.

D - Redirection of the traffic cannot happen unless the admin allows it explicitly. -
Answer-A - Make sure that legitimate network routers are configured to run routing
protocols with authentication.

Which method of password cracking takes the most time and effort?

A - Dictionary Attack
B - Shoulder Surfing
C - Rainbow Tables
D - Brute Force - Answer-D - Brute Force

An Attacker is trying to redirect the traffic of a small office. That office is using their own
mail server, DNS server and NTP server because of the importance of their job. The
attacker gains access to the DNS server and redirects the direction www.google.com to
his own IP address. Now when the employees of the office want to go to Google they
are being redirected to the attacker machine. What is the name of this kind of attack.

A - MAC flooding

,B - Smurf Attack
C - DNS Spoofing
D - ARP Poisoning - Answer-C - DNS Spoofing

also referred to as DNS cache poisoning, is a form of computer security hacking in
which corrupt Domain Name System data is introduced into the DNS resolver's cache,
causing the name server to return an incorrect result record,
-------------------------

ARP poisoning - attacker sends Address Resolution Protocol messages onto a local
area network. Generally, the aim is to associate the attacker's MAC address with the IP
address of another host, such as the default gateway, causing any traffic meant for that
IP address to be sent to the attacker

SMURF attack - distributed denial-of-service attack in which large numbers of Internet
Control Message Protocol packets with the intended victim's spoofed source IP are
broadcast to a computer network using an IP broadcast address.

A penetration tester is conducting a port scan on a specific host. The tester found
serveral ports opened that were confusing in concluding the Operating System (OS)
version installed. Considering NMAP results below, which of the following is likely to be
installed on the target machine by the OS?

Starting NMAP 5.21 at 2011-03-15 11:06 NMAP scan report for 172.16.40.65 Host is up
(1.00 latency) Not shown: 993 Closed ports PORT STATE SERVICE 21/tcp open ftp
23/tcp open telnet 80/tcp open http 139/tcp open netbios-ssn 515/tcp open 631/tcp open
ipp 9100/tcp open MAC address: 00:00:48: 0D:EE:8

A - The host is likely a Linux machine
B - the host is likely a printer
C - the host is likely a router
D - the host is likely a windows machine - Answer-B - the host is likely a printer

---------------------------
Port 631

TCP/UDP - Internet Printing Protocol (IPP) (Official)

TCP/UDP - Common Unix Printing System (CUPS)

--
Port 9100

TCP/UDP - EMC2 (Legato) Networker or Sun Solcitice

,NetBIOS - is an acronym for Network Basic Input/Output System. It provides services
related to the session layer of the OSI model allowing applications on separate
computers to communicate over a local area network. As strictly an API, NetBIOS is not
a networking protocol

When purchasing a biometric system, one of the consideration that should be reviewed
is the processing speed. Which of the following best describes what it is meant by
processing?

A - The amount of time and resources that are necessary to maintain a biometric
system.

B - How long it take to setup individual user accounts

C - The amount of time it takes to be either accepted or rejected from when an
individual provides identification and authentication information.

D - The amount of time it takes to convert biometric data into a template on a smart
card. - Answer-C - The amount of time it takes to be either accepted or rejected from
when an individual provides identification and authentication information
While performing online banking using a web browser, a user receives an email that
contains a link to an interesting web site when the user clicks on the link, another web
browser session starts and displays a video of cats playing a piano. The next business
day, the user receives what looks like an email from his bank, indicating that his bank
account has been accessed from a foreign country, The email asks the user to call his
bank and verify the authorization of a funds transfer that took place. What web browser-
based security vulnerability was exploited to compromise the user?

A - Clickjacking
B - Cross-Site Scripting
C - Cross-site Request Forgery
D - Web form input validation - Answer-C - Cross-Site Request Forgery (CSRF)

Which service in a PKI will vouch for the identity of an individual or Company?

A - KDC
B - CR
C - CBC
D - CA - Answer-D - CA
Certificate Authority

------------------
KDC - Key Distribution Center
CBC - Cipher Block Chaining
CR -

, Identify the web application attack where the attackers exploit vulnerabilities in
dynamically generated web pages to inject client-side script into web pages viewed by
other users.

A - LDAP Injection Attack
B - Cross-Site Scripting (XSS)
C - SQL Injection Attack
D - Cross-Site Request Forgery - Answer-B - Cross-Site Scripting (XSS)

User A is writing a sensitive email message to user B outside the local network. User A
has chosen to use PKI to secure his message and ensure only user B can read the
sensitive email. At what layer of the OSI layer does the encryption and decryption of the
message take place?

A - Application
B - Transport
C - Session
D - Presentation - Answer-D - Presentation

A new wireless client is configured to join a 802.11 network. This client uses the same
hardware and software as many of the other clients on the network. The client can see
the network, but cannot connect. A wireless packet sniffer shows that the wireless
access point is not responding to the association requests being sent by the wireless
client. What is a possible source of this problem?

A - The WAP does not recognize the client's MAC address
B - The client cannot see the SSID of the wireless network
C - Client is configured for the wrong channel.
D - The wireless client is not configured to use DHCP. - Answer-A - The WAP does not
recognize the client's MAC address.

If you want to only scan fewer ports than the default scan using NMAP tool, which
option would you use?

A - -r
B - -F
C - -P
D - -sP - Answer-B - -F

------------------------
-F = Fewer ports
-f = Fragmentation
-P = Is not a correct option
-p = Specific Port
-sP = Does not exist anymore, was replaced with -sn (no port scan after host discovery)

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.49
  • (0)
  Add to cart