CEH Q Bank
CEH Q Bank
CEH Q Bank
com/quizzes/ceh/
http://www.gocertify.com/quizzes/ceh/certified-ethical-hacker-practic
e-quiz-312-50-quiz-1.html
Question 1 of 10
Question 1 of 10
whois –v gocertify.in
Nmap gocertify.in
nikto –h gocertify.in
Nsllokup gocertify.in
Question 4 of 10
Which of the following tools can be used to crack SAM files in Windows?
Hyena
Legion
NTInforScan
L0phtCrack
Question 5 of 10
The following is output from the "tracert" command to find the path to
gocertify.in? Which protocol does tracert use to find the network path
shown below?
ICMP
HTTP
STP
NTP
Question 6 of 10
Which of the following services uses registered port numbers?
CIFS
Syslog
Oracle Listener
FTP
Question 7 of 10
Which of the following would you use to save up Internet Addresses (IP)?
NTP
NAT
NAS
DHCP
Question 8 of 10
Which of the following tools enumerates NetBIOS shares?
Cain and Abel
Hydra
Telnet
Hyena
Question 9 of 10
Which of the following tools can be used for War Dialing? (Check all that
apply)
Phonesweep
THC-Scan
Nmap
Telesweep
Question 10 of 10
Which of the following automates the process of password guessing in
NetBIOS sessions?
Legion
Hyena
NTInforScan
L0phtCrack
http://www.gocertify.com/ethical-hacker/certified-ethical-hacker-prac
tice-quiz-312-50-quiz-4
Which of the following commands will show all the connections that are
currently opened in a Windows host machine?
Nmap–sP T4 target IP
nslookup–ao
netstat–an
nbtstat–an
Question 2 of 10
Which of the following tools can be used to footprint web servers in
Windows?
Burp suite
Nikto
OpenVas
Wikto
Question 3 of 10
Which of the following tools can NOT be used to enumerate Windows SID
user accounts?
DumpSec
UserInfo
Enum
SMBBF
Question 4 of 10
Which of the following tools can be used for tunneling traffic through
HTTP?
TeleSweep
BackStealth
THC-Scan
PhoneSweep
Question 5 of 10
Which of the following is NOT a recommended setting to help secure
your home wireless network?
Increase your WLAN transmitter power.
Change the default SSID.
Change default administrator passwords and usernames.
Do not auto-connect to open Wi-Fi networks.
Question 6 of 10
Which commands will do Nmap TCP and ICMP Ping?
Nmap –PB
Nmap –s0
Nmap –sA
Nmap –sI
Question 7 of 10
A security administrator is monitoring packets in the network with
Wireshark. He is finding a lot of ICMP Echo packets directed towards the
255.2555.255.255 address of his network? What type of attack is he
looking at?
Broadcast flooding
Smurf attack
SYN flood attack
ICMP flood attack
Question 8 of 10
After performing Nmap TCP port scanning on the company network, Port
137 is found opened. Which of the following services of this port might
be used by an attacker?
NETBIOS
POP3
NTP
SFTP
Question 9 of 10
The password for which of the following protocols can be sniffed out of
an Unencrypted Wireless Network?
POP3
HTTPS
SSH
SSL
Question 10 of 10
Which of the following can be used to identify which methods are allowed
in the remote web server?
Acunetix
NMAP
Cain and Abel
Hammer
http://www.gocertify.com/ethical-hacker/certified-ethical-hacker-prac
tice-quiz-312-50-quiz-5
Question 2 of 10
You are reviewing source code for any buffer overflow vulnerabilities.
The following C++ source code handles data extracted from a
compressed file:
if (extractedDataLength < 65536) {
//Break down data into multiple chunks
}
else {
//Handle data in one large chunk
}
The data should be broken down into multiple chunks only when the
buffer of 65,536 characters is reached. How should you modify the
condition in the first line of the code?
Change to extractedDataLength > 65536
Change to extractedDataLength == 65536
Change to extractedDataLength <= 65536
Change to extractedDataLength >= 65536
Question 3 of 10
You run the following command:
nmap -p21,80,443 -sV -O 45.33.32.156
What is the most likely partial output?
Host is up (0.029s latency).
Not shown: 992 closed ports
PORT STATE SERVICE
22/tcp open ssh
25/tcp filtered smtp
80/tcp open http
135/tcp filtered msrpc
443/tcp filtered https
Host is up (0.029s latency).
PORT STATE SERVICE VERSION
21/tcp closed ftp
80/tcp open http Apache httpd 2.4.7 ((Ubuntu))
443/tcp filtered https
Device type: general purpose|firewall|router|broadband router|WAP|terminal
Running: Linux 3.X|2.6.X|2.4.X
Network Distance: 12 hops
Host is up (0.029s latency).
PORT STATE SERVICE VERSION
21/tcp closed ftp
80/tcp open http Apache httpd 2.4.7 ((Ubuntu))
443/tcp filtered https
Host is up (0.029s latency).
PORT STATE SERVICE
21/tcp closed ftp
80/tcp open http
443/tcp filtered https
Question 4 of 10
You are using a sniffer and you see a frame with a destination address of
0xFFFFFFFFFFFF. What type of frame is this?
Layer 2 broadcast frame
Layer 3 network ID
Layer 2 network ID
Layer 3 broadcast address
Question 5 of 10
You need to ensure that malicious packets are prevented from entering
your private network. Packets should be evaluated based on the
following criteria:
Source IP addresses
Protocol and port number
Which type of security tool will use only these criteria to deny access?
NIPS
NIDS
NTFS permissions
Router ACL
Question 6 of 10
To attack a wireless network, an attacker sets up a wireless access point
that is configured to look exactly like a company's valid wireless access
point by using the same SSID. What kind of attack is this?
WEP attack
War chalking
Evil twin
Rogue access point
Question 7 of 10
Which ISO 27000 standard describes audits and certifications?
27005
27001
27006
27002
Question 8 of 10
A hacker was recently caught trying to deface the web site of a company
with which he had serious disagreement concerning their use of certain
chemicals in their products. What is this type of hacker called?
White hat
Cracker
Ethical hacker
Hacktivist
Question 9 of 10
Which two of the following are goals of key escrow agreements? (Choose
two)
Enhance the security of public keys
Provide third party access to data
Facilitate recovery operations
Enhance the security of private keys
Question 10 of 10
You capture the following TCP frames using Wireshark:
http://www.gocertify.com/ethical-hacker/certified-ethical-hacker-prac
tice-quiz-312-50-quiz-6
Question 1 of 10
Question 8 of 10
The below command does which of the following:
Address: 10.10.12.15
> set type=any
> ls -d wayne.net > dns.wayne.net
Zone transfer
Looks at the server name
DNS poisoning
ARP Spoofing
Question 9 of 10
NetStumbler cannot detect which wireless standard?
802.11 b
802.11g
802.11a
802.11
Question 10 of 10
Sniffing a password from a wireless network is what type of attack?
Passive attack
Brute-force attack
Active attack
Dictionary attack
http://www.gocertify.com/ethical-hacker/certified-ethical-hacker-prac
tice-quiz-312-50-quiz-7
Question 1 of 10
Question 4 of 10
A Black Hat hacker, wants to get more information on a publicly traded
company. Which tool will help him find useful information on the
company?
Netcraft
Edgar
NSlookup
Whois
Question 5 of 10
A firewall deployed as “stateful” will inspect which part of a packet
passing through the network?
Tail of the packet
Header of the packet
Both header and data
Data packet
Question 6 of 10
An incident reported via the helpdesk disclosed that a fraudulent caller
disguised himself as an employee and asked the phone operator to tell
him his network password. What is the best way to prevent such attacks?
Providing training to all phone operators
Call logging
Setting up a VOIP solution
Call blocking
Question 7 of 10
Which of the following NMAP scans will have a greater chance of being
detected?
XMAS tree scan
Null scan
ACK scan
TCP connect scan
Question 8 of 10
Which of the following can be a great resource for hackers to find
information concerning the hardware or software used in a targeted
company?
LinkedIn
Newspapers
Job Postings
Journals
Question 9 of 10
Which Nmap switch will prevent pinging of a target machine?
–PM
–PN
–sR
–Po
Question 10 of 10
An SNMP device uses two passwords in order to configure and view its
configuration. Which of the following passwords is used to view its
configuration?
Community string
MIB
SNMPUtil
SNMPEnum
http://www.gocertify.com/ethical-hacker/certified-ethical-hacker-prac
tice-quiz-312-50-quiz-8
Question 1 of 10
Which of the following tools can be used to exploit a local procedure call
(LPC) flaw in windows?
PsExec
HK.exe
None of the above
Eblaster
Question 2 of 10
Which of the following is NetBIOS DDOS tool?
NBName
NBTcracker
Netsh
NBTdeputy
Question 3 of 10
A hacker is trying to discover the password for the windows
administration account using the tool “john the ripper.” He is trying to
brute force his way to the password of an admin SAM file he enumerated
earlier from the target Windows machine. What type of attack he is
carrying out?
Active online attack
None of above
Offline attack
Passive online attack
Question 4 of 10
John wants to send a tracking tool inside of a valid program to his
colleague so that he can track his activities in his computer. Which of the
following techniques can John exploit to make his tracking tool
effective?
MITM
Hashing
Alternate file stream
Cryptography
Question 5 of 10
Which tool will increase the L0phtCrack’s dumping sessions on the
system?
SMBDie
SMBGrind
NBTdeputy
C2MYAZZ
Question 6 of 10
A Replay attack is an example of which type of attack?
None of above
Offline attack
Active online attack
Passive online attack
Question 7 of 10
Eblaster is able to perform which of the following actions? (Choose all
that apply)
Log chat messages
Monitor e-mail
Keystroke logging
Monitor websites visited
Question 8 of 10
Which of the following is an example of a steganography attack tool?
Camerashy
Snow
Binder
Mp3Stego
Question 9 of 10
Which of the following tools can perform a "man in the middle" attack
(MITM)?
SMBRelay
SMBReplay
C2MYAZZ
pwdump2
Question 10 of 10
A Rainbow table attack on a password is which type of attack?
Active online attack
None of above
Offline attack
Passive online attack
http://www.gocertify.com/ethical-hacker/certified-ethical-hacker-prac
tice-quiz-312-50-quiz-9
Question 1 of 10
Question 1 of 10
http://www.gocertify.com/quizzes/ceh/ceh1.html
http://www.gocertify.com/ethical-hacker/certified-ethical-hacker-prac
tice-quiz-312-50-quiz-3
Question 1 of 10
Which of the following tools can perform a "Man in the middle" attack
(MITM)?
SMBReplay
C2MYAZZ
pwdump2
SMBRelay
Question 2 of 10
A Replay attack is an example of which type of attack?
None of above
Passive online attack
Active online attack
Offline attack
Question 3 of 10
Which of the following is an example of a steganography attack tool?
Mp3Stego
Camerashy
Snow
All of these options
Question 4 of 10
John wants to send a tracking tool inside of a valid program to his
colleague so that he can track his activities in his computer. Which of the
following techniques can John exploit to make his tracking tool
effective?
Cryptography
Alternate file stream
MITM
Hashing
Question 5 of 10
Which of the following is NetBIOS DDOS tool?
NBName
NBTcracker
Netsh
NBTdeputy
Question 6 of 10
A Rainbow table attack on a password is which type of attack?
Passive online attack
Offline attack
Active online attack
None of the above
Question 7 of 10
Eblaster is able to perform which of the following actions?
Monitor website visited
Monitor e-mail
Keystroke logging
All of the above
Log Chat message
Question 8 of 10
A hacker is trying to discover the password for the Windows
administration account using the tool "john the ripper." He is trying to
brute force his way to the password of an admin SAM file he enumerated
earlier from the target windows machine. What type of attack he is
carrying out?
Offline attack
Passive online attack
None of above
Active online attack
Question 9 of 10
Which following tools can be used to exploit a local procedure call (LPC)
flaw in windows?
HK.exe
Eblaster
None of the above
PsExec
Question 10 of 10
Which tool will increase the L0phtCrack's dumping sessions on the
system?
SMBDie
SMBGrind
C2MYAZZ
NBTdeputy
https://www.greycampus.com/opencampus/itil-foundation/introduction-ab
out-service-design