CEH practice exam

Ace your homework & exams now with Quizwiz!

In the Perl programming language, comment lines begin with which of the following character(s)?

#

Which of the following statements in the C programming language is used to load libraries that hold the commands and functions used in your program?

#include

What port does the Domain Name System, or DNS service use?

53

Which of the following IEEE projects was developed to create LAN and WAN standards?

802

Cryptography is the process of converting plaintext, which is readable text, into unreadable or encrypted text called which if the following?

Ciphertext

Which of the following sits between the Internet and the internal network and is sometimes referred to as a perimeter network?

DMZ

The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of which OSI model layer?

Data Link layer

What federal law makes it illegal to intercept any type of communication, regardless of how it was transmitted?

Electronic Communication Privacy Act

Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?

Firmware

What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses?

Fping

What term best describes a person who hacks computer systems for political or social reasons?

Hacktivist

Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users?

Mandatory Access Control

Which of the following resources is an excellent starting point for security professionals when investigating VBScript vulnerabilities?

Microsoft Security Bulletin

What is the current file system that Windows utilizes that has strong security features?

NTFS

What type of IDSs/IPSs monitors activity on network segments by sniffing traffic as it flows over the network and alerting a security administrator when something suspicious occurs?

Network-based

The open-source descendant of Nessus is called which of the following?

OpenVAS

A large organization that is responsible for sensitive or critical data may elect to create which of the following to do damage assessment, risk remediation, and legal consultation?

Security Operations Center

What connection-oriented protocol is utilized by the Transport layer?

TCP

What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments?

Transport layer

What is the IEEE 802 standards name for a wireless network that is limited to one person's workspace?

WPAN

Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later. What means of access is the attacker utilizing?

backdoor

Carelessly reviewing your program's code might result in having which of the following in your program code?

bug

In what type of attack does the attacker need access to the cryptosystem, and the ciphertext to be decrypted to yield the desired plaintext results?

chosen-ciphertext

What type of system converts between plaintext and ciphertext?

cryptosystem

Which of the following is a mathematical function or program that works with a key?

encryption algorithm

What critical component of any OS, that can be can be vulnerable to attacks, is used to store and manage information?

file system

Which of the following is a computer placed on the network perimeter with the main goal of distracting hackers from attacking legitimate network resources?

honeypot

Which of the following is a range of allowable values that is used to generate an encryption key?

keyspace

If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?

limit their scan speeds

What type of unauthenticated connection is considered to be a significant vulnerability of NetBIOS systems?

null session

One of the limitations when using "ping sweeps" is that many network administrators configure nodes not to respond to ICMP Echo Requests. What type of ICMP Echo message is being disabled by these administrators?

reply

Many experienced penetration testers will write a set of instructions that runs in sequence to perform tasks on a computer system. What type of resource are these penetration testers utilizing?

scripts

Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?

stealth

What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?

virus

What penetration model would likely provide a network diagram showing all the company's routers, switches, firewalls, and intrusion detection systems, or give the tester a floor plan detailing the location of computer systems and the OSs running on these systems?

white box

What IPv4 address class has the IP address 221.1.2.3?

Class C

What encryption algorithm is efficient requiring few resources, and is based on complex algebra and calculations on curves?

ECC

When hackers drive around or investigate an area with an antenna, they are usually looking for which component of a wireless network?

access point


Related study sets

tamworth industries ltd v attorney general

View Set

Private Pilot Test Guide: Chapter 4, Part 2

View Set

french questions with qui and que

View Set

Chapter 25 The Cardiovascular System

View Set

Macroeconomics - Chapter 10 Review

View Set

Ch. 5 - Security and Payment Systems (E-Commerce)

View Set