CEH v11
INDEX
- Set 1 (Q1 to Q30)
- Set 2 (Q31 to Q60)
- Set 3 (Q61 to Q90)
- Set 4 (Q91 to Q120)
- Set 5 (Q121 to Q150)
- Set 6 (Q151 to Q180)
- Set 7 (Q181 to Q210)
- Set 8 (Q211 to Q240)
- Set 9 (Q241 to Q270)
- Set 10 (Q271 to Q300)
- Set 11 (Q301 to Q330)
- Set 12 (Q331 to Q360)
- Set 13 (Q361 to Q390)
- Set 14 (Q391 to Q420)
- Set 15 (Q421 to Q450)
- Set 16 (Q451 to Q480)
- Set 17 (Q481 to Q510)
- Set 18 (Q511 to Q540)
- Set 19 (Q541 to Q570)
- Set 20 (Q571 to Q600)
- Set 21 (Q601 to Q630)
- Set 22 (Q631 to Q660)
- Set 23 (Q661 to Q690)
- Set 24 (Q691 to Q720)
Q91 - Which of the following tools can be used for passive OS fingerprinting?
- tcpdump
- nmap
- ping
- tracert
Answer: A
Q92 - Which method can provide a better return on IT security investment and provide a thorough and comprehensive assessment of organizational security covering policy, procedure design, and implementation?
- Penetration testing
- Social engineering
- Vulnerability scanning
- Access control list reviews
Answer: A
Q93 - You receive an e-mail like the one shown below. When you click on the link contained in the mail, you are redirected to a website seeking you to download free Anti-Virus software.
Dear valued customers,
We are pleased to announce the newest version of Antivirus 2010 for Windows which will probe you with total security against the latest spyware, malware, viruses, Trojans and other online threats. Simply visit the link below and enter your antivirus code:
or you may contact us at the following address:
Media Internet Consultants, Edif. Neptuno, Planta
Baja, Ave. Ricardo J. Alfaro, Tumba Muerto, n/a Panama
How will you determine if this is Real Anti-Virus or Fake Anti-Virus website?
- Look at the website design, if it looks professional then it is a Real Anti-Virus website
- Connect to the site using SSL, if you are successful then the website is genuine
- Search using the URL and Anti-Virus product name into Google and lookout for suspicious warnings against this site
- Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware
- Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware
Answer: C
Q94 - You've gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your tool kit you have an Ubuntu 9.10 Linux LiveCD. Which Linux based tool has the ability to change any user's password or to activate disabled Windows accounts?
- CHNTPW
- Cain & Abel
- SET
- John the Ripper
Answer: A
Q95 - Which protocol and port number might be needed in order to send log messages to a log analysis tool that resides behind a firewall?
- UDP 123
- UDP 541
- UDP 514
- UDP 415
Answer: C
Q96 - Which of the following tools will scan a network to perform vulnerability checks and compliance auditing?
- NMAP
- Metasploit
- Nessus
- BeEF
Answer: C
Q97 - Which of the following processes of PKI (Public Key Infrastructure) ensures that a trust relationship exists and that a certificate is still valid for specific operations?
- Certificate issuance
- Certificate validation
- Certificate cryptography
- Certificate revocation
Answer: B
Q98 - Which of the following describes the characteristics of a Boot Sector Virus?
- Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR
- Moves the MBR to another location on the RAM and copies itself to the original location of the MBR
- Modifies directory table entries so that directory entries point to the virus code instead of the actual program
- Overwrites the original MBR and only executes the new virus code
Answer: A
Q99 - Bob is doing a password assessment for one of his clients. Bob suspects that security policies are not in place. He also suspects that weak passwords are probably the norm throughout the company he is evaluating. Bob is familiar with password weaknesses and key loggers. Which of the following options best represents the means that Bob can adopt to retrieve passwords from his clients hosts and servers?
- Hardware, Software, and Sniffing.
- Hardware and Software Keyloggers.
- Passwords are always best obtained using Hardware key loggers.
- Software only, they are the most effective.
Answer: A
Q100 - The chance of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate the SLE, ARO, and ALE. Assume the EF = 1 (100%). What is the closest approximate cost of this replacement and recovery operation per year?
- $146
- $1320
- $440
- $100
Answer: A
Q101 - You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line. Which command would you use?
- c:\compmgmt.msc
- c:\services.msc
- c:\ncpa.cp
- c:\gpedit
Answer: A
Q102 - Which Open Web Application Security Project (OWASP) implements a web application full of known vulnerabilities?
- WebBugs
- WebGoat
- VULN_HTML
- WebScarab
Answer: B
Q103 - Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.
- SQL injection attack
- Cross-Site Scripting (XSS)
- LDAP Injection attack
- Cross-Site Request Forgery (CSRF)
Answer: B
Q104 - You have successfully gained access to a linux server and would like to ensure that the succeeding outgoing traffic from this server will not be caught by a Network Based Intrusion Detection Systems (NIDS). What is the best way to evade the NIDS?
- Encryption
- Protocol Isolation
- Alternate Data Streams
- Out of band signalling
Answer: A
Q105 - What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?
- All are hacking tools developed by the legion of doom
- All are tools that can be used not only by hackers, but also security personnel
- All are DDOS tools
- All are tools that are only effective against Windows
- All are tools that are only effective against Linux
Answer: C
Q106 - The purpose of a __________ is to deny network access to local area networks and other information assets by unauthorized wireless devices.
- Wireless Intrusion Prevention System
- Wireless Access Point
- Wireless Access Control List
- Wireless Analyzer
Answer: A
Q107 - An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?
- He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.
- He will activate OSPF on the spoofed root bridge.
- He will repeat the same attack against all L2 switches of the network.
- He will repeat this action so that it escalates to a DoS attack.
Answer: A
Q108 - Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?
- 768 bit key
- 1025 bit key
- 1536 bit key
- 2048 bit key
Answer: C
Q109 - Which among the following is a Windows command that a hacker can use to list all the shares to which the current user context has access?
- NET FILE
- NET USE
- NET CONFIG
- NET VIEW
Answer: B
Q110 - If executives are found liable for not properly protecting their company's assets and information systems, what type of law would apply in this situation?
- Civil
- International
- Criminal
- Common
Answer: A
Q111 - What is the following command used for?
net use \targetipc$ "" /u:""
- Grabbing the etc/passwd file
- Grabbing the SAM
- Connecting to a Linux computer through Samba.
- This command is used to connect as a null session
- Enumeration of Cisco routers
Answer: D
Q112 - What hacking attack is challenge/response authentication used to prevent?
- Replay attacks
- Scanning attacks
- Session hijacking attacks
- Password cracking attacks
Answer: A
Q113 - Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?
- SHA-2
- SHA-3
- SHA-1
- SHA-0
Answer: C
Q114 - In order to show improvement of security over time, what must be developed?
- Reports
- Testing tools
- Metrics
- Taxonomy of vulnerabilities
Answer: C
Q115 - Due to a slowdown of normal network operations, IT department decided to monitor internet traffic for all of the employees. From a legal stand point, what would be troublesome to take this kind of measure?
- All of the employees would stop normal work activities
- IT department would be telling employees who the boss is
- Not informing the employees that they are going to be monitored could be an invasion of privacy.
- The network could still experience traffic slow down.
Answer: C
Q116 - These hackers have limited or no training and know how to use only basic techniques or tools. What kind of hackers are we talking about?
- Black-Hat Hackers
- Script Kiddies
- White-Hat Hackers
- Gray-Hat Hacker
Answer: B
Q117 - You are monitoring the network of your organizations. You notice that: Which of the following solution will you suggest?
- Block the Blacklist IP's @ Firewall
- Update the Latest Signatures on your IDS/IPS
- Clean the Malware which are trying to Communicate with the External Blacklist IP's
- Both B and C
Answer: D
Q118 - What tool and process are you going to use in order to remain undetected by an IDS while pivoting and passing traffic over a server you've compromised and gained root access to?
- Install Cryptcat and encrypt outgoing packets from this server.
- Use HTTP so that all traffic can be routed via a browser, thus evading the internal Intrusion Detection Systems.
- Use Alternate Data Streams to hide the outgoing packets from this server.
Answer: B
Q119 - When discussing passwords, what is considered a brute force attack?
- You attempt every single possibility until you exhaust all possible combinations or discover the password
- You threaten to use the rubber hose on someone unless they reveal their password
- You load a dictionary of words into your cracking program
- You create hashes of a large number of words and compare it with the encrypted passwords
- You wait until the password expires
Answer: A
Q120 - Which of the following is one of the most effective ways to prevent Cross-site Scripting (XSS) flaws in software applications?
- Validate and escape all information sent to a server
- Use security policies and procedures to define and implement proper security settings
- Verify access right before allowing access to protected information and UI controls
- Use digital certificates to authenticate a server prior to sending data
Answer: A