Certified Ethical Hacker v12 – Practice Test Questions – Part 3

Certified Ethical Hacker

In the ever-evolving landscape of cybersecurity, the role of Certified Ethical Hackers (CEH) has become increasingly crucial. These professionals are tasked with identifying and exploiting vulnerabilities in computer systems, networks, and applications, all with the goal of fortifying digital defenses against malicious hackers.

Achieving the CEH certification requires a deep understanding of various hacking techniques, tools, and methodologies. One effective way to prepare for the CEH exam is through practice test questions, which simulate real-world scenarios and assess your knowledge and skills.

Explore the world of malware threats and defenses in this set. Test your ability to recognize and mitigate different types of malware, ensuring you are well-prepared to safeguard systems from malicious software.

  1. Certified Ethical Hacker v12 – Practice Test Questions – Part 1
  2. Certified Ethical Hacker v12 – Practice Test Questions – Part 2
  3. Certified Ethical Hacker v12 – Practice Test Questions – Part 3
  4. Certified Ethical Hacker v12 – Practice Test Questions – Part 4
  5. Certified Ethical Hacker v12 – Practice Test Questions – Part 5
  6. Certified Ethical Hacker v12 – Practice Test Questions – Part 6
  7. Certified Ethical Hacker v12 – Practice Test Questions – Part 7
  8. Certified Ethical Hacker v12 – Practice Test Questions – Part 8
  9. Certified Ethical Hacker v12 – Practice Test Questions – Part 9
  10. Certified Ethical Hacker v12 – Practice Test Questions – Part 10
  11. Certified Ethical Hacker v12 – Practice Test Questions – Part 11
  12. Certified Ethical Hacker v12 – Practice Test Questions – Part 12
  13. Certified Ethical Hacker v12 – Practice Test Questions – Part 13
  14. Certified Ethical Hacker v12 – Practice Test Questions – Part 14

1Q: John is setting up security on his website, an e-commerce site. He wants to be sure that any customer sending messages is really the customer he claims to be. Which of the below methods can John take he use to certify this?

a. Packet filtering
b. Firewall
c. Digital signature
d. Authentication

Solution: The correct answer is C.

2Q: In which of the below techniques does an attacker capture encrypted messages that have been encrypted using an identical encryption algorithm?

a. Chosen plaintext attack
b. Chosen ciphertext attack
c. Known plaintext attack
d. Ciphertext only attack

Solution: The correct answer is D.

3Q: Which of the below techniques cannot be used to perform active OS fingerprinting? (Select more than one answer if applicable.)

a. Sniffing and analyzing packets
b. ICMP error message quoting
c. Sending FIN packets to open ports on a remote system.
d. Analyzing the email headers.

Solution: Answers A and D are correct.

4Q: Which of the below types of privacy invasion involves modifying data or information before or during input into a computer system with the intent to steal or commit fraud?

a. Spoofing
b. Wiretapping
c. Eavesdropping
d. Data diddling

Solution: The correct answer is D.

5Q: Which of the below will record everything a user types using a keyboard connected to the machine it is installed within?

a. Firewall
b. Port scanner
c. Keystroke logger
d. Line conditioner

Solution: The correct answer is C.

6Q: From the below list, which, if any, of these tools can be used to obscure identity? (Select more than one answer if applicable.)

a. War dialer
b. Proxy server
c. IPChains
d. Anonymizer
e. Rootkit

Solution: Answers B, C, and D are correct.

7Q: Which of the below tools can be used for footprinting? (Select more than one answer if applicable.)

a. Brutus
b. Sam spade
c. Traceroute
d. Whois

Solution: The correct answers are B, C, and D.

8Q: Alex works as an Ethical Hacker. His main project is to test the security of his client’s website. He starts by performing footprinting and scanning. What does this entail? (Select more than one answer if applicable.)

a. Information-gathering
b. Determining the network range
c. Identifying all active machines
d. Finding any open ports and/or applications
e. Enumeration through a four-step process

Solution: Of the above choices, A, B, C, and D are correct.

9Q: Which of the below techniques uses a modem in order to automatically scan a list of telephone numbers?

a. War dialing
b. Warkitting
c. Warchalking
d. War driving

Solution: The correct answer is A.

10Q: As Database Manager for a local company, John has a lot of responsibilities. He decides to set up remote control software on his work machine so that he will be able to login from home or otherwise. After installing the connection, he connects a modem to an otherwise-unused fax line. With no authentication to enable him to set a password for a host connection to the remote connection, John’s remote connection will be accessible to for anyone to connect to his host system. Which of the below attacks can be performed on John’s remote connection?

a. War dialing
b. Zero-day
c. War driving
d. Warchalking

Solution: The correct answer is A.

11Q: Which of the below is a passive, non-direct information-gathering tool?

a. Ettercap
b. Whois
c. Nmap
d. Snort

Solution: The correct answer is B.

12Q: Determining which services are active on a target machine as well as possible entry points to attack, which of the below would you use?

a. Nmap scan
b. Ping
c. Traceroute
d. Banner grabbing

Solution: The correct answer is A.

13Q: Chuck needs to perform a basic vulnerability scan using NMAP. When dealing with protocols like FTP and HTTP, what key engine does NMAP utilize?

a. SAINT
b. Metasploit
c. NESSUS
d. NMAP

Solution: The correct answer is D.

14Q: While running an nmap scan for filtered ports, you send an ACK flag and receive a RST packet for open and closed ports. What kind of nmap scan did you run?

a. Null Scan -sN
b. Fin Scan -sF
c. XMAS Scan -sX
d. TCP ACK scan -sA

Solution: The correct answer is D.

15Q: Which of the below Nmap commands is used to perform a UDP port scan?

a. nmap -sU
b. nmap -sS
c. nmap -sF
d. nmap -sN

Solution: The correct answer is A.

16Q: Which nmap switch would you use to retrieve as many different protocols as possible that are being used by a remote host?

a. nmap -sO
b. nmap -sS
c. nmap -sT
d. nmap -vO

17Q: Which of the below represents the type of packet inspection used by a firewall when scanning the DMZ interface on a firewall Nmap reports that port 80 is unfiltered?

a. Deep
b. Stateless
c. Proxy
d. Stateful

Solution: The correct answer is B.

18Q: As a contracted Ethical Hacker, John has recently contracted to complete a project to do security checking on a website. He wants to find out which operating system is used by the web server. Which of the below commands can he use to complete this task? Each correct answer represents a complete solution. Choose two.

a. nmap -v -O 208. 100. 2. 25
b. nc -v -n 208. 100. 2. 25 80
c. nc 208. 100. 2. 25 23
d. nmap -v -O [www.website.com]

Solution: The correct answers are A and D.

19Q: Which of the below Nmap switches can be utilized to perform TCP/IP stack fingerprinting?

a. nmap -O -p
b. nmap -sU -p
c. nmap -sS
d. nmap -sT

Solution: The correct answer is A.

20Q: Which of the below kinds of machines do security teams often use for attracting potential intruders?

a. Bastion host
b. Data pot
c. Files pot
d. Honeypot

Solution: The correct answer is D.

21Q: Which of the below are password-cracking utilities? (Choose 3)

a. NMAP
b. John the Ripper
c. Cain and Abel
d. KerbCrack
e. Wireshark
f. WebGoat

Solution: The correct answers are A, B and D.

22Q: Which of the below utilities is a protocol analyzer with the ability to capture packet traffic as it comes into the network (“in real time”)?

a. NetWitness
b. Netresident
c. Snort
d. Wireshark

Solution: The correct answer is D.

23Q: Wireshark will excel in which one of the below situations you might face as an Ethical Hacker?

a. If you need to target networks using switches or so-called “full-duplex” hubs (which are actually switches).
b. If you need to target networks utilizing repeaters/hubs.
c. If your target is a Windows-based network.
d. If your target is a Linux-based network.

Solution: The correct answer is A.

24Q: You need to obtain a packet capture for a network. Which of the below devices would allow you to capture a total picture of the traffic on the wire through Wireshark?

a. Network tap
b. Layer 3 switch
c. Network bridge
d. Router

Solution: The correct answer is B.

You may also like:

Related Posts

Leave a Reply