Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

EC Council CEH assessment with complete solutions

Beoordeling
-
Verkocht
-
Pagina's
6
Cijfer
A+
Geüpload op
07-06-2022
Geschreven in
2020/2021

Hacker is a person who illegally breaks into a system or network without any authorization to destroy, steal sensitive data or to perform any malicious attacks. Black hat hackers are: Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers In order to compromise or to hack a system or network the hackers go through various phases of the hacking. What is the first hacking phase that hackers perform to gather information about a target prior to launching an attack? Reconnaissance 00:03 01:20 Defense-in-depth is a security strategy in which several protection layers are placed throughout an information system. It helps to prevent direct attacks against an information system and data because a break in one layer only leads the attacker to the next layer. True Penetration testing is a method of actively evaluating the security of an information system or network by simulating an attack from a malicious source. Which of the following technique is used to simulate an attack from someone who is unfamiliar with the system? Black box pen testing Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic? Stealth scanning technique Which of the following scan only works if operating system's TCP/IP implementation is based on RFC 793? NULL scan OS fingerprinting is the method used to determine the operating system running on a remote target system. It is an important scanning method, as the attacker will have a greater probability of success if he/she knows the OS. Active stack fingerprinting is one of the types of OS fingerprinting. Which of the following is true about active stack fingerprinting? Is based on the fact that various vendors of OS implement the TCP stack differently Proxy is a network computer that can serve as an intermediary for connecting with other computers. Which of the following sentence is true about a proxy? Protects the local network from outside access IP spoofing refers to the procedure of an attacker changing his or her IP address so that he or she appears to be someone else. Which of the following IP spoofing detection technique succeed only when the attacker is in a different subnet? Direct TTL probes technique Enumeration is defined as the process of extracting user names, machine names, network resources, shares, and services from a system. Which of the following enumeration an attacker uses to obtain list of computers that belongs to a domain? Netbios enumeration Network Time Protocol (NTP) is designed to synchronize clocks of networked computers. Which of the following port NTP uses as its primary means of communication? UDP Port 123 Rootkits are kernel programs having the ability to hide themselves and cover up traces of activities. It replaces certain operating system calls and utilities with its own modified versions of those routines. Which of the following rootkit modifies the boot sequence of the machine to load themselves instead of the original virtual machine monitor or operating system? Hypervisor level rootkit

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

EC Council CEH assessment
Hacker is a person who illegally breaks into a system or network without any
authorization to destroy, steal sensitive data or to perform any malicious attacks.

Black hat hackers are: - Answer Individuals with extraordinary computing skills,
resorting to malicious or destructive activities and are also known as crackers

In order to compromise or to hack a system or network the hackers go through various
phases of the hacking.

What is the first hacking phase that hackers perform to gather information about a target
prior to launching an attack? - Answer Reconnaissance

Defense-in-depth is a security strategy in which several protection layers are placed
throughout an information system. It helps to prevent direct attacks against an
information system and data because a break in one layer only leads the attacker to the
next layer. - Answer True

Penetration testing is a method of actively evaluating the security of an information
system or network by simulating an attack from a malicious source.

Which of the following technique is used to simulate an attack from someone who is
unfamiliar with the system? - Answer Black box pen testing

Which of the following scanning technique attackers use to bypass firewall rules,
logging mechanism, and hide themselves as usual network traffic? - Answer Stealth
scanning technique

Which of the following scan only works if operating system's TCP/IP implementation is
based on RFC 793? - Answer NULL scan

OS fingerprinting is the method used to determine the operating system running on a
remote target system. It is an important scanning method, as the attacker will have a
greater probability of success if he/she knows the OS. Active stack fingerprinting is one
of the types of OS fingerprinting.

Which of the following is true about active stack fingerprinting? - Answer Is based on the
fact that various vendors of OS implement the TCP stack differently

Proxy is a network computer that can serve as an intermediary for connecting with other
computers.

Which of the following sentence is true about a proxy? - Answer Protects the local
network from outside access

IP spoofing refers to the procedure of an attacker changing his or her IP address so that
he or she appears to be someone else.

, EC Council CEH assessment
Which of the following IP spoofing detection technique succeed only when the attacker
is in a different subnet? - Answer Direct TTL probes technique

Enumeration is defined as the process of extracting user names, machine names,
network resources, shares, and services from a system.

Which of the following enumeration an attacker uses to obtain list of computers that
belongs to a domain? - Answer Netbios enumeration

Network Time Protocol (NTP) is designed to synchronize clocks of networked
computers.

Which of the following port NTP uses as its primary means of communication? - Answer
UDP Port 123

Rootkits are kernel programs having the ability to hide themselves and cover up traces
of activities. It replaces certain operating system calls and utilities with its own modified
versions of those routines.

Which of the following rootkit modifies the boot sequence of the machine to load
themselves instead of the original virtual machine monitor or operating system? -
Answer Hypervisor level rootkit

Steganography is a technique of hiding a secret message within an ordinary message
and extracting it at the destination to maintain confidentiality of data.

Which of the following steganography technique embed secret message in the
frequency domain of a signal? - Answer Transform domain techniques

A virus is a self-replicating program that produces its own code by attaching copies of it
into other executable codes.

Which of the following virus evade the anti-virus software by intercepting its requests to
the operating system? - Answer Stealth/Tunneling virus

Lawful intercept is a process that enables a Law Enforcement Agency (LEA) to perform
electronic surveillance on a target as authorized by a judicial or administrative order.

Which of the following statement is true for lawful intercept? - Answer Hides information
about lawful intercepts from all but the most privileged users

Sniffer turns the NIC of a system to the promiscuous mode so that it listens to all the
data transmitted on its segment. It can constantly read all information entering the
computer through the NIC by decoding the information encapsulated in the data packet.

Geschreven voor

Vak

Documentinformatie

Geüpload op
7 juni 2022
Aantal pagina's
6
Geschreven in
2020/2021
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$12.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EvaTee Phoenix University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5202
Lid sinds
4 jaar
Aantal volgers
3567
Documenten
55582
Laatst verkocht
3 uur geleden
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

947 beoordelingen

5
451
4
167
3
171
2
48
1
110

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen