100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CEH Assessment Exam With Complete Solutions Latest Update $14.49   Add to cart

Exam (elaborations)

CEH Assessment Exam With Complete Solutions Latest Update

 2 views  0 purchase
  • Course
  • CEH Assessment
  • Institution
  • CEH Assessment

CEH Assessment Exam With Complete Solutions Latest Update...

Preview 2 out of 14  pages

  • November 11, 2024
  • 14
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CEH Assessment
  • CEH Assessment
avatar-seller
Chrisyuis
CEH Assessment Exam With Complete
Solutions Latest Update


What two separate utilities are available to flood a switched network with random MAC
addresses, and both have the end result of allowing an attacker to sniff the network? -
ANSWER etherflood

macof



A DNS server on your client's network is receiving a huge amount of DNS queries from
what looks like a workstation on their network. Closer investigation shows the
workstation does not appear to be sourcing the DNS queries but is receiving responses
from the DNS server. What type of attack best matches this description. ANSWER
reflective DNS attack



What worm, created to be used in cyber-warfare against Iranian targets, is able to
control actual devices? - ANSWER Stuxnet



Which of the following provides a means to gain access to a computer without going
through the security and authentication procedures that might otherwise be applicable?
- ANSWER Backdoor



What is the very first thing done in creating a successful phishing site? - ANSWER
Register a fake domain name.



Tracing a Network You have decided that you are going to make use of a utility that will
provide you with details regarding network faults as well as possible firewalls that may
be inhibiting communications. What utility would you use? - ANSWER Path Analyzer Pro



What two different meta search engines will retrieve results from several different
search engines? - ANSWER Dogpile

, WebFerret



What type of attack is waged against a network by an authorized user? - ANSWER An
inside attack



You have been engaged by a client to install a keylogger on several target systems to
see whether their anti-malware software can detect the software that you use to do so.
You have decided to use a keylogger that can be spread using e-mail and relies on
executables and registry entries with renamable names for some level of stealth. Which
of the following keyloggers should you use? - ANSWER Spector Professional



What is a correct statement about the act of hacktivism? - ANSWER Hacktivism is a
means of breaking into systems, either government or corporate, as an act of protest.



What is the method of attack that would describe the typical attack vector in an average
phishing-style attack against an individual end user? - ANSWER An e-mail with a link to a
phishing web site.



Which anti-virus product utilizes a low-impact high-performance virus scanning engine?
- ANSWER NOD32 Anti-Virus



What three modes can the Snort application be used in? - ANSWER packet logger

sniffer

intrusion detection



You want to infect a system with a trojan horse as a demonstration to a client that the
security on this target system is not good enough. You want to place the file trojan.exe
into the Windows registry in a place where it will autostart your trojan horse. Where can
you do this? - ANSWER HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce

HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run

HKCR\\exefile\\shell\\open\\command

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Chrisyuis. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75632 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.49
  • (0)
  Add to cart