Register Now

Forget Password

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Login

Register Now

Certified Ethical Hacker - MCQ

1.What does the following command in netcat do? nc -l -u -p55555 < /etc/passwd

  1. logs the incoming connections to /etc/passwd file
  2. loads the /etc/passwd file to the UDP port 55555
  3. grabs the /etc/passwd file when connected to UDP port 55555
  4. deletes the /etc/passwd file when connected to the UDP port 55555

Answer:3

2.Websites and web portals that provide web services commonly use the Simple Object Access Protocol SOAP.Which of the following is an incorrect definition or characteristics in the protocol?

  1. Based on XML
  2. Provides a structured model for messaging
  3. Exchanges data between web services
  4. Only compatible with the application protocol HTTP

Answer :4

3.Which of the following resources does NMAP need to be used as a basic vulnerability scanner covering several vectors like SMB, HTTP and FTP?

  1. A. Metasploit scripting engine
  2. Nessus scripting engine
  3. NMAP scripting engine
  4. SAINT scripting engine

Answer:3

 

4.A hacker has successfully infected an internet-facing server which he will then use to send junk mail, take part in coordinated attacks, or host junk email content. Which sort of trojan infects this server?

  1. Botnet Trojan
  2. Turtle Trojans
  3. Banking Trojans
  4. Ransomware Trojans

Answer:1

5.John the Ripper is a technical assessment tool used to test the weakness of which of the following?

  1. Usernames
  2. File permissions
  3. Firewall rulesets
  4. Passwords

Answer :4

6.A penetration tester is hired to do a risk assessment of a company's DMZ. The rules of engagement states that the penetration test be done from an external IP address with no prior knowledge of the internal IT systems. What kind of test is being performed?

  1. white box
  2. grey box
  3. red box
  4. black box

Answer:4

7. Which of the following is a strong post designed to stop a car?

  1. Gate
  2. Fence
  3. Bollard
  4. Reinforced rebar

Answer:3

8.Which of the following describes a component of Public Key Infrastructure (PKI) where a copy of a private key is stored to provide third-party access and to facilitate recovery operations?

  1. Key registry
  2. Recovery agent
  3. Directory
  4. Key escrow

Answer:4

9.Which of the following does proper basic configuration of snort as a network intrusion detection system require?

  1. Limit the packets captured to the snort configuration file.
  2. Capture every packet on the network segment.
  3. Limit the packets captured to a single segment.
  4. Limit the packets captured to the /var/log/snort directory.

Answer:1

10.Defining rules, collaborating human workforce, creating a backup plan, and testing the plans are within what phase of the Incident Handling Process?

  1. Preparation phase
  2. Containment phase
  3. Recovery phase
  4. Identification phase 

Answer:1