Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Certified Ethical Hacker v10 Practice Exam already graded A+

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
08-04-2022
Written in
2021/2022

Drawing of symbols in public places to publicize an open Wi-Fi wireless network is called what? Correct answer- A. WarChalking The act of altering configuration files and the expected operation of a service is known as what kind of attack? Correct answer- C. Service Reconfiguration ARP (Address Resolution Protocol) does not translate IP addresses to MAC addresses. Correct answer- FALSE Which of the following is a business threat category? Correct answer- ALL OF THE ABOVE What does the term Hacktivism mean? Correct answer- C. Hackers who are hacking for a cause. OWASP's Top 10 IoT Vulnerabilities are provided to help developers, manufacturers, enterprises and consumers make well-informed decisions when building and using IoT devices. A user recently learns of a vulnerability in their web camera's software, which allows an attacker to log in using default admin credentials to view the camera's video feed. Which of OWASP's Top 10 IoT Vulnerabilities does this BEST fall under? Correct answer- C. Weak, guessable, or hardcoded passwords Patch management ensures appropriate patches are installed on all systems. Correct answer- A. TRUE Which of the following is a collection of Internet information gathering and network troubleshooting utilities? Correct answer- C. NetScanTools Pro Which of the following should organizations create as part of incident response planning? Correct answer- D. All of the Above Which of the following analyzes an operating system and all the applications on the network to discover any security flaws that are present? Correct answer- C. GFI LAN Guard Port scanning tools enable a hacker to learn about services running on a host. Correct answer- A. TRUE All of the following can help protect yourself from Google Hacking EXCEPT: Correct answer- C. Keep default pages and samples The vulnerabilities on OWASP's Top 10 IoT Vulnerabilities are categorized by what two factors? Correct answer- D. Rate of occurrence and severity level Which of the following is a "clean computing habit" for users? Correct answer- D. All of the above The HIPPA Privacy Rule regulates the use and disclosure of protected health information. Correct answer- A. TRUE Which of the following best represents the symptoms a host may have when infected by a virus or worm? Correct answer- D. All of the above Individuals who download and use scripts/exploit tools with no real understanding of the concepts being employed in causing an effect are called? Correct answer- C. Script Kiddies Which of the following attacks exploit OS/application installations that contain scripts or tools meant to help administrators be more efficient, but allow hackers access to powerful tools already installed on the host? Correct answer- A. Shrink Wrap Code Attacks Which of the following is a common tool used for LDAP enumeration? Correct answer- D. All of the above How does a denial-of-service (DoS) attack operate? Correct answer- A. A hacker prevents users from accessing a service. The category of hijacking a session by intercepting, modifying and injecting packets between client and server is described as: Correct answer- A. Network Hijacking Which nmap command option performs a scan using the initial TCP handshake but sends an RST instead of ACK? Correct answer- A. sS SYN Stealth Scan Software or hardware which captures packets off the network is called: Correct answer- A. Sniffer Bills for unused services are a sign of identity theft. Correct answer- A. True Gray Hat Hackers use their skills for both offensive and defensive purposes that are not illegal or malicious and have approval to operate. Correct answer- A. TRUE In a public key infrastructure the public key is used to unencrypt a message and sign messages. Correct answer- B. FALSE A virus that does not increase the size of the infected file by hiding in the "open space" of a file is what type of virus? Correct answer- C. Cavity DHCP starvation is a type of denial-of-service attack. Correct answer- A. True SHA takes a message of arbitrary length as input and produces a 160-bit fingerprint or message digest. Correct answer- A. TRUE Which of the following is the most effective countermeasure to password cracking? Correct answer- C. Compose a strong password based on a phrase that results in a random combination of letters and numbers and symbols The Risk Management process includes all of the following steps EXCEPT: Correct answer- C. Risk Vulnerability Melissa is a virus that targeted Microsoft Windows platforms. To which category does this virus belong? Correct answer- A. Macro What is a self-replicating program that does NOT require user intervention to spread? Correct answer- D. Worm All of the following are denial-of-service categories EXCEPT: Correct answer- C. Stabilization Which of the following is a common proxy tool? Correct answer- D. All of the above The difference between signature detection and anomaly detection is: Correct answer- B. Anomaly detection relies on finding differences and signature detection relies on known attacks. Attackers will usually encode their exploits and payloads to prevent detection by clear text signatures. Correct answer- A. TRUE Which of the following was created in response to the September 11, 2001, terrorist attacks? Correct answer- C. U.S. Patriot Act During the vulnerability assessment phase of the vulnerability assessment lifecycle, inference-based techniques use information such as the type of operating system to identify vulnerabilities. Correct answer- B. FALSE If organizations take advantage of the anonymity of cryptocurrencies such as Bitcoin they are protected from ransomeware attacks. Correct answer- B. FALSE Fuzzing is a security software for Windows capable of detecting and preventing buffer overflows. Correct answer- B. FALSE A WiFi network scanner which scans, identifies, and filters hundreds of nearby access points is called? Correct answer- A. inSSIDer An example of Defense In Depth is the combined use of a screening router, a network firewall, a network IDS and a host-based firewall. Correct answer- A. TRUE An attacker tries to access restricted directories and execute commands on the webserver by using the URL to change directories is called what type of attack? Correct answer- D. Directory Traversal An email which claims to be from a legitimate source and attempts to solicit information or convince a senior executive to take some sort of action is known as: Correct answer- B. Whaling Which of the following is a collection of tools to facilitate session hijacking, including libraries for sending or receiving data? Correct answer- B. Hjksuite Which of the following best describes a rootkit? Correct answer- B. Programs that have the ability to hide themselves and cover traces of a hackers activities. Overwhelming an application with traffic is what kind of application attack? Correct answer- C. SYN flood Social engineering can be used to accomplish: Correct answer- D. All of the above Which of the following is an application programming interface used to access the Google search engine? Correct answer- C. Google API Which encryption method is not based on a block cipher? Correct answer- A. RC4 Which of the following established a code of fair information practice that governed the collection, maintenance, use, and dissemination of personally identifiable information (PII)? Correct answer- C. Privacy Act of 1974 System-user passwords are typically stored: Correct answer- C. As hashes in a system password file. Which hashing function uses 160-bit digest? Correct answer- B. SHA 1 A large collection of compromised hosts that are used to conduct DDoS attacks and other malicious actions are known as: Correct answer- B. BotNets The spoofing technique that causes the victim system to lose track of the proper sequence number required to continue a secure connection is called: Correct answer- B. Desynchronization All of the following are SMTP commands EXCEPT: Correct answer- B. PARSE A digital signature is a message that is encrypted with the public key instead of the private key. Correct answer- B. FALSE The act of scanning a firewall to determine what ports it has open, and to determine if these open ports actually connect to a legitimate host on the inside of the network, is called? Correct answer- C. Firewalking Which of the following defines a Wrapper, in the context of Trojans? Correct answer- D. A tool that allows you to bind an executable of choice to an innocent looking file. Capturing traffic in a hub environment where a sniffer is usually placed in "promiscuous mode" and listens only is: Correct answer- A. Passive Sniffing An IDS alert where an intrusion did not occur and an alarm was not raised is a: Correct answer- D. True Negative A penetration test is the evaluation of the vulnerabilities of an information system or network. Correct answer- B. FALSE All of the following are examples of evasion techniques EXCEPT: Correct answer- B. Sender Target Which of the following describes the function of EIP: Extended Instruction Pointer? Correct answer- A. Points to the code that you are currently executing

Show more Read less
Institution
Course

Content preview

Certified Ethical Hacker v10 Practice
Exam
Drawing of symbols in public places to publicize an open Wi-Fi wireless network is
called what? Correct answer- A. WarChalking

The act of altering configuration files and the expected operation of a service is known
as what kind of attack? Correct answer- C. Service Reconfiguration

ARP (Address Resolution Protocol) does not translate IP addresses to MAC addresses.
Correct answer- FALSE

Which of the following is a business threat category? Correct answer- ALL OF THE
ABOVE

What does the term Hacktivism mean? Correct answer- C. Hackers who are hacking for
a cause.

OWASP's Top 10 IoT Vulnerabilities are provided to help developers, manufacturers,
enterprises and consumers make well-informed decisions when building and using IoT
devices. A user recently learns of a vulnerability in their web camera's software, which
allows an attacker to log in using default admin credentials to view the camera's video
feed. Which of OWASP's Top 10 IoT Vulnerabilities does this BEST fall under? Correct
answer- C. Weak, guessable, or hardcoded passwords

Patch management ensures appropriate patches are installed on all systems. Correct
answer- A. TRUE

Which of the following is a collection of Internet information gathering and network
troubleshooting utilities? Correct answer- C. NetScanTools Pro

Which of the following should organizations create as part of incident response
planning? Correct answer- D. All of the Above

Which of the following analyzes an operating system and all the applications on the
network to discover any security flaws that are present? Correct answer- C. GFI LAN
Guard

Port scanning tools enable a hacker to learn about services running on a host. Correct
answer- A. TRUE

All of the following can help protect yourself from Google Hacking EXCEPT: Correct
answer- C. Keep default pages and samples

, The vulnerabilities on OWASP's Top 10 IoT Vulnerabilities are categorized by what two
factors? Correct answer- D. Rate of occurrence and severity level

Which of the following is a "clean computing habit" for users? Correct answer- D. All of
the above

The HIPPA Privacy Rule regulates the use and disclosure of protected health
information. Correct answer- A. TRUE

Which of the following best represents the symptoms a host may have when infected by
a virus or worm? Correct answer- D. All of the above

Individuals who download and use scripts/exploit tools with no real understanding of the
concepts being employed in causing an effect are called? Correct answer- C. Script
Kiddies

Which of the following attacks exploit OS/application installations that contain scripts or
tools meant to help administrators be more efficient, but allow hackers access to
powerful tools already installed on the host? Correct answer- A. Shrink Wrap Code
Attacks

Which of the following is a common tool used for LDAP enumeration? Correct answer-
D. All of the above

How does a denial-of-service (DoS) attack operate? Correct answer- A. A hacker
prevents users from accessing a service.

The category of hijacking a session by intercepting, modifying and injecting packets
between client and server is described as: Correct answer- A. Network Hijacking

Which nmap command option performs a scan using the initial TCP handshake but
sends an RST instead of ACK? Correct answer- A. sS SYN Stealth Scan

Software or hardware which captures packets off the network is called: Correct answer-
A. Sniffer

Bills for unused services are a sign of identity theft. Correct answer- A. True

Gray Hat Hackers use their skills for both offensive and defensive purposes that are not
illegal or malicious and have approval to operate. Correct answer- A. TRUE

In a public key infrastructure the public key is used to unencrypt a message and sign
messages. Correct answer- B. FALSE

Written for

Course

Document information

Uploaded on
April 8, 2022
Number of pages
5
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EvaTee Phoenix University
Follow You need to be logged in order to follow users or courses
Sold
5208
Member since
4 year
Number of followers
3567
Documents
55726
Last sold
10 hours ago
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

947 reviews

5
451
4
167
3
171
2
48
1
110

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions