100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CEH TEST 1 QUESTIONS AND ANSWERS 100% CORRECT $14.99   Add to cart

Exam (elaborations)

CEH TEST 1 QUESTIONS AND ANSWERS 100% CORRECT

 2 views  0 purchase
  • Course
  • CEH
  • Institution
  • CEH

CEH TEST 1 QUESTIONS AND ANSWERS 100% CORRECT...

Preview 4 out of 31  pages

  • November 11, 2024
  • 31
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ceh
  • ceh test 1
  • CEH
  • CEH
avatar-seller
Chrisyuis
CEH TEST 1 QUESTIONS AND ANSWERS 100%
CORRECT


1. Which of the following is considered a passive reconnaissance action?

A. Searching through the local paper

B. Calling Human Resources

C. Using the nmap -sT command

D. Conducting a man-in-the-middle attack

E. Setting up a rogue hot spot - ANSWER 1. A. Searching through the local paper is
considered passive because it does not directly impact, alert, or establish any type of
connection between the victim and the adversary.`



2. Which encryption did NIST select as the principal method of providing confidentiality
after the DES algorithm?

A. 3DES

B. Twofish

C. RC4

D. AES - ANSWER 2. D. The Rijndael cipher was selected and then named the Advanced
Encryption Standard (AES).`



3. Which tool can launch a man-in-the-Middle Attack on an 802.3 environment?

A. Ettercap

B. Cain & Abel

C. Wireshark

D. Nmap - ANSWER 3. B. Cain & Abel provides a suite of tools for password cracking
and ARP poisoning, for example.`

,4. What is the difference between a traditional firewall and an IPS? A. Firewalls do not
generate logs.

B. IPS cannot drop packets.

C. IPS does not follow rules.

D. IPS can dissect packets. - ANSWER 4. D. An IPS can have set rules enabling it to
dissect a packet down to, for example, inspecting the contents in hex or binary format.`



5. Why is it important to scan your target network slowly?

A. To avoid alerting the IDS

B. It is not necessary to scan the network slowly.

C. To evade the firewall

D. Services may not have started so starting slowly ensures that you capture the
services that started late. - ANSWER 5. A. Scanning a target network slowly prevents
alerting of an IDS because the traffic may not be considered an anomaly. If the sensor
sees a huge amount of traffic being generated it may cause the sensor to alert;
therefore it is best practice to scan slowly.



6. You are the IT department senior manager for your company. What is the most
cost-effective way to prevent social engineering attacks? A. Install HIDS.

B. Ensure that all patches are up-to-date.

C. Monitor and control all email activity.

D. User awareness training. - ANSWER 6. D. The amount of awareness a company
receives through yearly awareness training related to social engineering is going to
enhance the organization's level of awareness. Training should be completed by the
information assurance section within the IT department`.



7. What phase of the ethical hacking framework would you change or eliminate log
information from?



A. Scanning and enumeration

B. Gaining access

,Reconnaissance

Covering one's tracks - ANSWER 7. D. The attacker would alter and/or remove log
information during the covering your tracks phase, which is the final phase during the
attack.`



8. A hacker is carrying out the following on the target workstation: nmap -sT
192.33.10.5. Which of the following is the attacker in?

A. Covering tracks

B. Enumeration

C. Scanning and enumeration - ANSWER 8. C. "Attacker is using Nmap's TCP Connect, a
connect scan on the target, to scan and enumerate the target.

D. Gaining access



9. Which encryption algorithm is a symmetric stream cipher?

A. AES

B. ECC

C. RC4

D. PGP - ANSWER 9. C. Unlike RC5 and RC6, RC4 is the stream block cipher-it is the only
symmetric cipher that uses stream.



10. What is the most significant concern when conducting a penetration test?

A. Formal written agreement

B. Documenting all actions and activities

C. Fixing critical threats immediately

D. Proper handoff with the information assurance team - ANSWER 10. A. Receiving a
formal written agreement is critical to establish the legal limit of what is allowed and not
allowed to be conducted. It protects the pentesters from legal action if they stay within
the agreed work performance statement.`



11. You are a CISO for a giant tech company. You are tasked with implementing an
encryption cipher for your new mobile devices, which will be introduced in 2017. What

, encryption standard will you most likely choose?

A. RC4

B. MD5

C. ECC

D. Skipjack - ANSWER answer 11. C. Elliptic Curve Cryptography requires less
computational resources because it uses shorter keys compared with other asymmetric
methods. It is often used in lower-power devices for this reason.`



12. What does a SYN scan accomplish?

A. It establishes a full TCP connection.

B. It establishes only a "half open" connection. C. It opens an ACK connection with the
target. D. It detects all closed ports on a target system. - ANSWER answer 12. B. The
SYN scan is used to detect open ports but does not complete the full three-way
handshake. It is considered a "half open" connection.



13. What is the major vulnerability for an ARP request?

A. An address request is transmitted to the hosts of the LAN.

B. The address is returned with a username and password in cleartext.

C. The Address request can cause a DoS.

D. The request for an address can be spoofed with the attacker's MAC address. -
ANSWER answer 13. D. The ARP request does not authenticate with the requested host;
hence, it is possible to spoof the address of the victim with his own MAC address`.



14. You are the CISO for a popular social website. You have just been informed that your
web s ervers have been compromised with the SSL Heart Bleed zero day exploit. What
will be your most likely first course of action to defend against? A. Patch all systems.

B. Establish new cryptographic keys.

C. Shut down Internet facing web services.

D. The most likely course of action will be to restrict access to sensitive information. In
so doing you can allow business services to continue while protecting user private data
until such time as a remediation can be performed.`

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Chrisyuis. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75632 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.99
  • (0)
  Add to cart