CEH practice exam
In the Perl programming language, comment lines begin with which of the following character(s)?
#
Which of the following statements in the C programming language is used to load libraries that hold the commands and functions used in your program?
#include
What port does the Domain Name System, or DNS service use?
53
Which of the following IEEE projects was developed to create LAN and WAN standards?
802
Cryptography is the process of converting plaintext, which is readable text, into unreadable or encrypted text called which if the following?
Ciphertext
Which of the following sits between the Internet and the internal network and is sometimes referred to as a perimeter network?
DMZ
The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of which OSI model layer?
Data Link layer
What federal law makes it illegal to intercept any type of communication, regardless of how it was transmitted?
Electronic Communication Privacy Act
Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?
Firmware
What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses?
Fping
What term best describes a person who hacks computer systems for political or social reasons?
Hacktivist
Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users?
Mandatory Access Control
Which of the following resources is an excellent starting point for security professionals when investigating VBScript vulnerabilities?
Microsoft Security Bulletin
What is the current file system that Windows utilizes that has strong security features?
NTFS
What type of IDSs/IPSs monitors activity on network segments by sniffing traffic as it flows over the network and alerting a security administrator when something suspicious occurs?
Network-based
The open-source descendant of Nessus is called which of the following?
OpenVAS
A large organization that is responsible for sensitive or critical data may elect to create which of the following to do damage assessment, risk remediation, and legal consultation?
Security Operations Center
What connection-oriented protocol is utilized by the Transport layer?
TCP
What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments?
Transport layer
What is the IEEE 802 standards name for a wireless network that is limited to one person's workspace?
WPAN
Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later. What means of access is the attacker utilizing?
backdoor
Carelessly reviewing your program's code might result in having which of the following in your program code?
bug
In what type of attack does the attacker need access to the cryptosystem, and the ciphertext to be decrypted to yield the desired plaintext results?
chosen-ciphertext
What type of system converts between plaintext and ciphertext?
cryptosystem
Which of the following is a mathematical function or program that works with a key?
encryption algorithm
What critical component of any OS, that can be can be vulnerable to attacks, is used to store and manage information?
file system
Which of the following is a computer placed on the network perimeter with the main goal of distracting hackers from attacking legitimate network resources?
honeypot
Which of the following is a range of allowable values that is used to generate an encryption key?
keyspace
If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?
limit their scan speeds
What type of unauthenticated connection is considered to be a significant vulnerability of NetBIOS systems?
null session
One of the limitations when using "ping sweeps" is that many network administrators configure nodes not to respond to ICMP Echo Requests. What type of ICMP Echo message is being disabled by these administrators?
reply
Many experienced penetration testers will write a set of instructions that runs in sequence to perform tasks on a computer system. What type of resource are these penetration testers utilizing?
scripts
Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?
stealth
What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?
virus
What penetration model would likely provide a network diagram showing all the company's routers, switches, firewalls, and intrusion detection systems, or give the tester a floor plan detailing the location of computer systems and the OSs running on these systems?
white box
What IPv4 address class has the IP address 221.1.2.3?
Class C
What encryption algorithm is efficient requiring few resources, and is based on complex algebra and calculations on curves?
ECC
When hackers drive around or investigate an area with an antenna, they are usually looking for which component of a wireless network?
access point