CEH Assessment Exam With Complete
Solutions Latest Update
What two separate utilities are available to flood a switched network with random MAC
addresses, and both have the end result of allowing an attacker to sniff the network? -
ANSWER etherflood
macof
A DNS server on your client's network is receiving a huge amount of DNS queries from
what looks like a workstation on their network. Closer investigation shows the
workstation does not appear to be sourcing the DNS queries but is receiving responses
from the DNS server. What type of attack best matches this description. ANSWER
reflective DNS attack
What worm, created to be used in cyber-warfare against Iranian targets, is able to
control actual devices? - ANSWER Stuxnet
Which of the following provides a means to gain access to a computer without going
through the security and authentication procedures that might otherwise be applicable?
- ANSWER Backdoor
What is the very first thing done in creating a successful phishing site? - ANSWER
Register a fake domain name.
Tracing a Network You have decided that you are going to make use of a utility that will
provide you with details regarding network faults as well as possible firewalls that may
be inhibiting communications. What utility would you use? - ANSWER Path Analyzer Pro
What two different meta search engines will retrieve results from several different
search engines? - ANSWER Dogpile
, WebFerret
What type of attack is waged against a network by an authorized user? - ANSWER An
inside attack
You have been engaged by a client to install a keylogger on several target systems to
see whether their anti-malware software can detect the software that you use to do so.
You have decided to use a keylogger that can be spread using e-mail and relies on
executables and registry entries with renamable names for some level of stealth. Which
of the following keyloggers should you use? - ANSWER Spector Professional
What is a correct statement about the act of hacktivism? - ANSWER Hacktivism is a
means of breaking into systems, either government or corporate, as an act of protest.
What is the method of attack that would describe the typical attack vector in an average
phishing-style attack against an individual end user? - ANSWER An e-mail with a link to a
phishing web site.
Which anti-virus product utilizes a low-impact high-performance virus scanning engine?
- ANSWER NOD32 Anti-Virus
What three modes can the Snort application be used in? - ANSWER packet logger
sniffer
intrusion detection
You want to infect a system with a trojan horse as a demonstration to a client that the
security on this target system is not good enough. You want to place the file trojan.exe
into the Windows registry in a place where it will autostart your trojan horse. Where can
you do this? - ANSWER HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Chrisyuis. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.49. You're not tied to anything after your purchase.