Exam (elaborations)
CEH Practice Exam Questions With Correct Questions And Answers 2024
Course
CEH - Certified Ethical Hacker
Institution
CEH - Certified Ethical Hacker
CEH Practice Exam Questions With Correct Questions And Answers 2024
[Show more]
Preview 3 out of 16 pages
Uploaded on
September 20, 2024
Number of pages
16
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers
ceh practice exam questions with correct questions
a certified ethical hacker follows a specific meth
youve been hired as part of a pen test team duri
which of the following is true regarding an ethic
Institution
CEH - Certified Ethical Hacker
Course
CEH - Certified Ethical Hacker
$15.49
100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached
CEH Practice Exam Questions With Correct
Questions And Answers 2024
A .Certified .Ethical .Hacker .follows .a .specific .methodology .for .testing .a .system. .Which
.step .comes .after .footprinting .in .the .CEH .methodology? .- .correct .answer.Scanning
You've .been .hired .as .part .of .a .pen .test .team. .During .the .in .brief, .you .learn .the .client
.wants .the .pen .test .attack .to .simulate .a .normal .user .who .finds .ways .to .elevate .privileges
.and .create .attacks. .Which .test .type .does .the .client .want? .- .correct .answer.Gray .box
Which .of .the .following .is .true .regarding .an .ethical .hacker? .- .correct .answer.The .ethical
.hacker .has .authorization .to .proceed .from .the .target .owner.
You .begin .your .first .pen-test .assignment .by .checking .out .IP .address .ranges .owned .by
.the .target .as .well .as .details .of .their .domain .name .registration. .Additionally, .you .visit .job
.boards .and .financial .websites .to .gather .any .technical .information .online. .What .activity
.are .you .performing? .- .correct .answer.Passive .footprinting
You .send .a .message .across .a .network .and .are .primarily .concerned .that .it .is .not .altered
.during .transit. .Which .security .element .ensures .a .message .arrives .at .its .destination .with
.no .alteration? .- .correct .answer.Integrity
An .ethical .hacker .is .given .no .prior .knowledge .of .the .network .and .has .a .specific
.framework .in .which .to .work. .The .agreement .specifies .boundaries, .nondisclosure
.agreements, .and .a .completion .date .definition. .Which .of .the .following .statements .are
.true? .- .correct .answer.A .white .hat .is .attempting .a .black .box .test.
Which .of .the .following .attacks .is .considered .an .integrity .attack, .where .the .attacker .is .not
.concerned .with .deciphering .the .entirety .of .a .plaintext .message? .- .correct .answer.Bit
.flipping
As .part .of .a .pen .test .on .a .U.S. .Government .system, .you .discover .files .containing .social
.security .numbers .and .other .PII .(Personally .Identifiable .Information) .sensitive .information.
.You .are .asked .about .controls .placed .on .dissemination .of .this .information. .Which .of .the
.following .acts .should .you .check? .- .correct .answer.Privacy .Act
,Joe .has .spent .a .large .amount .of .time .learning .hacking .tools .and .techniques, .and .has
.even .passed .certification .exams .to .promote .himself .in .the .ethical .hacking .field. .Joe .uses
.his .talents .during .the .election .season .to .deface .websites .and .launch .denial .of .service
.attacks .against .opponents .of .his .candidate. .Which .answer .most .closely .correlates .with
.Joe's .actions? .- .correct .answer.Hactivism
A .hacker .is .attempting .to .gain .access .to .a .target .inside .a .business. .After .trying .several
.methods, .he .gets .frustrated .and .starts .a .denial .of .service .attack .against .a .server
.attached .to .the .target. .Which .security .control .is .the .hacker .affecting? .- .correct
.answer.Availability
The .security, .functionality, .and .ease .of .use .(SFE) .triangle .states .which .of .the .following .as
.true? .- .correct .answer.As .security .increases, .ease .of .use .decreases .and .functionality
.decreases.
In .which .phase .of .the .ethical .hacking .methodology .would .a .hacker .discover .available
.targets .on .a .network? .- .correct .answer.Scanning .and .enumeration
Which .of .the .following .are .potential .drawbacks .to .a .black .box .test? .(Choose .all .that
.apply.) .- .correct .answer.The .client .does .not .get .a .full .picture .of .an .internal .attacker
.focused .on .their .systems. .; .This .test .takes .the .longest .amount .of .time .to .complete.
In .which .phase .of .a .penetration .test .would .an .ethical .hacker .perform .footprinting? .-
.correct .answer.Assessment
Which .of .the .following .would .not .be .considered .passive .reconnaissance? .- .correct
.answer.Ping .sweeping .a .range .of .IP .addresses .found .through .a .DNS .lookup
As .part .of .the .preparation .phase .for .a .pen .test .that .you .are .participating .in, .the .client
.relays .their .intent .to .discover .security .flaws .and .possible .remediation. .They .seem
.particularly .concerned .about .external .threats .and .do .not .mention .internal .threats .at .all.
.When .defining .scope, .the .threat .of .internal .users .is .not .added .as .part .of .the .test. .Which
.test .is .this .client .ignoring? .- .correct .answer.Gray .box
In .which .phase .of .an .attack .would .vulnerability .mapping .occur? .- .correct
.answer.Scanning .and .enumeration
While .performing .a .pen .test, .you .find .success .in .exploiting .a .machine. .Your .attack .vector
.took .advantage .of .a .common .mistake—the .Windows .7 .installer .script .used .to .load .the
.machine .left .the .administrative .account .with .a .default .password. .Which .attack .did .you
.successfully .execute? .- .correct .answer.Operating .system
A .machine .in .your .environment .uses .an .open .X-server .to .allow .remote .access. .The .X-
server .access .control .is .disabled, .allowing .connections .from .almost .anywhere .and .with
.little .to .no .authentication .measures. .Which .of .the .following .are .true .statements .regarding
.this .situation? .(Choose .all .that .apply.) .A. .An .external .vulnerability .can .take .advantage .of
, .the .misconfigured .X-server .threat. .- .correct .answer.An .external .threat .can .take
.advantage .of .the .misconfigured .X-server .vulnerability. .; .An .internal .threat .can .take
.advantage .of .the .misconfigured .X-server .vulnerability.
You .are .examining .security .logs .snapshotted .during .a .prior .attack .against .the .target. .The
.target's .IP .address .is .135.17.22.15, .and .the .attack .originated .from .216.88.76.5. .Which .of
.the .following .correctly .characterizes .this .attack? .- .correct .answer.Outside .attack
An .ethical .hacker .needs .to .be .aware .of .a .variety .of .laws. .What .do .Sections .1029 .and
.1030 .of .United .States .Code .Title .18 .specify? .- .correct .answer.They .define .most .of .the
.U.S. .laws .concerning .hacking .and .computer .crime.
Which .of .the .following .should .a .security .professional .use .as .a .possible .means .to .verify
.the .integrity .of .a .data .message .from .sender .to .receiver? .- .correct .answer.Hash .algorithm
Which .of .the .following .describes .activities .taken .in .the .conclusion .phase .of .a .penetration
.test? .- .correct .answer.Reports .are .prepared .detailing .security .deficiencies.
Which .of .the .following .best .describes .an .ethical .hacker? .- .correct .answer.An .ethical
.hacker .never .proceeds .with .an .audit .or .test .without .written .permission.
In .which .phase .of .the .attack .would .a .hacker .set .up .and .configure ."zombie" .machines? .-
.correct .answer.Maintaining .access
Which .of .the .following .is .a .true .statement .concerning .cryptography? .- .correct
.answer.Converts .plaintext .to .ciphertext .for .protection .during .transit .or .in .storage.
Which .of .the .following .would .be .the .best .choice .to .guarantee .the .integrity .of .messages .in
.transit .or .storage? .- .correct .answer.Hash .algorithm
Which .of .the .following .encryption .algorithms .is .your .best .choice .if .your .primary .need .is
.bulk .encryption, .and .you .need .fast, .strong .encryption? .- .correct .answer.AES
You're .describing .a .basic .PKI .system .to .a .new .member .of .the .team. .He .asks .how .the
.public .key .can .be .distributed .within .the .system .in .an .orderly, .controlled .fashion .so .that
.the .users .can .be .sure .of .the .sender's .identity. .Which .of .the .following .would .be .your
.answer? .- .correct .answer.Digital .certificate
You .are .discussing .hash .values .with .a .CEH .instructor. .Immediately .after .telling .you .the
.hash .is .a .one-way .algorithm .and .cannot .be .reversed, .he .explains .that .you .can .still
.discover .the .value .entered .into .the .hash, .given .enough .time .and .resources. .Which .of .the
.following .hash .anomalies .might .allow .this? .- .correct .answer.Collision
What .is .the .standard .format .for .digital .certificates? .- .correct .answer.X.509