CEH Exam with correct Answers
In which of the following cryptography attack methods, the attacker makes a series of
interactive queries, choosing subsequent plaintexts based on the information from the
previous encryptions? - Answer -Adaptive Chosen-Plaintext Attack
Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses
in the systems, he uses a detection method where the anti-virus executes the malicious
codes on a virtual machine to simulate CPU and memory activities. Which type of virus
detection method did Chandler use in this context? - Answer -Code Emulation
If you want only to scan fewer ports than the default scan using Nmap tool, which option
would you use? - Answer --P
Which of the following statements is TRUE? - Answer -Sniffers operate on Layer 2 of
the OSI model
Bob finished a C programming course and created a small C application to monitor the
network traffic and produce alerts when any origin sends "many" IP packets, based on
the average number of packets sent by all origins and using some thresholds. In such
concept, the solution developed by Bob is actually: - Answer -Just a network monitoring
tool
In an internal security audit, the white hat hacker gains control over a user account and
attempts to acquire access to another account's confidential files and information. How
can he achieve this? - Answer -Privilege Escalation
You are a security officer of a company. You had an alert from IDS that indicates that
one PC on your Intranet is connected to a blacklisted IP address (C2 Server) on the
Internet. The IP address was blacklisted just before the alert. You are staring an
investigation to roughly analyze the severity of the situation. Which of the following is
appropriate to analyze? - Answer -Internet Firewall/Proxy log
A virus that attempts to install itself inside the file it is infecting is called? - Answer -
Cavity Virus
Sam is working as s pen-tester in an organization in Houston. He performs penetration
testing on IDS in order to find the different ways an attacker uses to evade the IDS.
Sam sends a large amount of packets to the target IDS that generates alerts, which
enable Sam to hide the real traffic. What type of method is Sam using to evade IDS? -
Answer -False Positive Generation
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller millyphilip. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.