Register Now

Forget Password

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Login

Register Now

Certified Ethical Hacker exam questions set -1

-

1) Which of the following takes advantage of weaknesses in the fragment reassembly functionality of TCP/IP?

A. Teardrop

B. SYN Flood

C. Smurf Attack

D. Ping Of Death

2) Which of the following is an effective deterrent against TCP session hijacking?

A. Install And Use An HIDS On The System.

B. Install And Use Tripwire On The System

C. Enforce Good Password Policy.

D. Use Unpredictable Sequence Numbers.

3) Pen test team member Amy attempts to guess the ISN for a TCP session. Which attack is she most likely carrying out?

A. XSS

B. Session Splicing

C. Session Hijacking

D. Multipartite Attack

4) Which of the following is a wireless network detector that is commonly found on Linux?

A. Kismet

B. Abel

C. Netstumbler

D. Nessus

5) Which of the following is an NMAP script that could help detect HTTP Methods such as GET,POST, HEAD, PUT, DELETE, TRACE?

A. Http-git

B. Http-headers

C. Http Enum

D. Http-methods

6) A hacker has managed to gain access to a Linux host and stolen the password file from/etc/passwd. How can he use it?

A. The Password File Does Not Contain The Passwords Themselves.

B. He Can Open It And Read The User Ids And Corresponding Passwords.

C. The File Reveals The Passwords To The Root User Only.

D. He Cannot Read It Because It Is Encrypted.

7) What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a hotel room

A. Set A BIOS Password.

B. Encrypt The Data On The Hard Drive.

C. Use A Strong Logon Password To The Operating System.

D. Back Up Everything On The Laptop And Store The Backup In A Safe Place.

8) A recent security audit revealed that there were indeed several occasions that the company's network was breached. After investigating, you discover that your IDS is not configured properly and therefore is unable to trigger alarms when needed. What type

A. True Positive

B. False Negative

C. False Positive

D. False Positive

9) Which of the following command line switch would you use for OS detection in Nmap?

A. -D

B. -O

C. -P

D. -X

10) Which of the following is a hashing algorithm?

A. MD5

B. PGP

C. DES

D. ROT13