Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CNA Practice Exam / Version with Fully Solved Questions / Get 100% Correct Answers / Guaranteed Pass / Already Graded A+

Beoordeling
-
Verkocht
-
Pagina's
33
Cijfer
A+
Geüpload op
18-11-2025
Geschreven in
2025/2026

CNA Practice Exam / Version with Fully Solved Questions / Get 100% Correct Answers / Guaranteed Pass / Already Graded A+

Instelling
Vak

Voorbeeld van de inhoud

CEHv12 Simulated Exam - Set B / Most
Recent Version / Focused Questions and
Verified Answers / Guaranteed Pass /
Already Rated A+
Which of the following is the regulation that specifies the
requirements for establishing, implementing, maintaining, and
continually improving an information security management system
within the context of an organization?

A: The Federal Information Security Management Act (FISMA)
B: ISO/IEC 27001:2013
C: The Digital Millennium Copyright Act (DMCA)
D: Sarbanes Oxley Act (SOX)
B: ISO/IEC 27001:2013
A hacker is attempting to see which protocols are supported by target
machines or network. Which NMAP switch would the hacker use?

A: -sO
B: -sT
C: -sS
D: -sU
A: -sO
Jim, a professional hacker, launched an APT attack on an
organization. He was successful in entering the target network and
extending access in the target network. He is now maintaining access
with the use of customized malware and repackaging tools.
Which of the following phases of the APT lifecycle involves
maintaining access to the target system, starting from evading
endpoint security devices, until there is no further use of the data and
assets?

A: Preparation
B: Cleanup
C: Initial intrusion
D: Persistence

,D: Persistence
A hacker is attempting to use nslookup to query domain name service
(DNS). The hacker uses the nslookup interactive mode for the search.
Which command should the hacker type into the command shell to
request the appropriate records?

A: Locate type=ns
B: Request type=ns
C: Set type=ns
D: Transfer type=ns
C: Set type=ns
An attacker uses the following SQL query to perform an SQL injection
attackSELECT * FROM users WHERE name - '' OR '1'='1';Identify the
type of SQL injection attack performed

A: Tautology
B: Illegal/logically incorrect query
C: UNION SQL injection
D: End-of-line comment
A: Tautology
Denis is looking at an older system that uses DES encryption. A
colleague has told him that DES is insecure due to its short key size.
What is the key length used for DES?

A: 56
B: 64
C: 128
D: 256
A: 56
Which of the following tools is designed to capture a WPA/WPA2
handshake and act as an ad-hoc AP?

A: Airmon-ng
B: Airbase-ng
C: Airolib-ng
D: Airodump-ng
B: Airbase-ng

,select
An attacker sniffs encrypted traffic from the network and is
subsequently able to decrypt it. Which cryptanalytic technique can
the attacker use now in his attempt to discover the encryption key?

A: Birthday attack
B: Known plaintext attack
C: Meet in the middle attack
D: Chosen ciphertext attack
D: Chosen ciphertext attack
Which of the following attacks helps an attacker bypass a same-origin
policy's security constraints, allowing a malicious web page to
communicate or make arbitrary requests to local domains?

A: MarioNet attack
B: Watering hole attack
C: Clickjacking attack
D: DNS rebinding attack
D: DNS rebinding attack
Which of the following techniques is used by an attacker to access all
of an application's functionalities and employs an intercepting proxy
to monitor all requests and responses?

A: Web spidering/crawling
B: Banner grabbing
C: Attacker-directed spidering
D: DNS interrogation
A: Web spidering/crawling
Which of the following hping command performs UDP scan on port
80?

A: hping3 -2 <IP Address> -p 80
B: hping3 -1 <IP Address> -p 80
C: hping3 -A <IP Address> -p 80
D: hping3 -F -P -U <IP Address> -p 80
A: hping3 -2 <IP Address> -p 80
Which of the following vulnerability assessment phases involves
tasks such as system rescanning, dynamic analysis, and attack

, surface reviewing?

A: Verification
B: Remediation
C: Monitoring
D: Risk assessment
A: Verification
In which of the following methods does an attacker leverage headers
such as Host in the HTTP request message to crack passwords?

A: Brute-forcing
B: Password guessing
C: Attack password reset mechanism
D: "Remember Me" exploit
C: Attack password reset mechanism
Which of the following types of antennas is useful for transmitting
weak radio signals over very long distances - on the order of 10
miles?

A: Omnidirectional
B: Parabolic grid
C: Unidirectional
D: Bidirectional
B: Parabolic grid
Which of the following attack techniques uses the cryptanalytic time-
memory trade-off and requires less time than other techniques?

A: Rainbow table attack
B: Distributed network attack
C: Toggle-case attack
D: PRINCE attack
A: Rainbow table attack
Which type of assessment tools are used to find and identify
previously unknown vulnerabilities in a system?

A: Depth assessment tools
B: Scope assessment tools

Geschreven voor

Vak

Documentinformatie

Geüpload op
18 november 2025
Aantal pagina's
33
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$15.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
georgemutahi

Maak kennis met de verkoper

Seller avatar
georgemutahi Oxford University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
6 maanden
Aantal volgers
0
Documenten
35
Laatst verkocht
-
Premium Exam Resources Hub.

I'm a dedicated academic contributor specializing in high-quality exam guides, study notes, and revision materials. All my documents are carefully organized, easy to understand, and based on verified, up-to-date exam content. My goal is to help students study smarter, save time, and feel confident before their tests. If you’re looking for reliable, clear, and exam-ready materials, you’re in the right place.

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen