100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CEH v10 Practice Exam Questions and Answers All Correct R252,66   Add to cart

Exam (elaborations)

CEH v10 Practice Exam Questions and Answers All Correct

 7 views  0 purchase
  • Course
  • CEH v10
  • Institution
  • CEH V10

CEH v10 Practice Exam Questions and Answers All Correct What is the use of the IP identification header? A. Packet checksum B. Packet service C. Packet reassembly D. Packet ordering - Answer C is correct. When a packet is fragmented, each fragment gets the same IP identification value. This ...

[Show more]

Preview 2 out of 15  pages

  • August 12, 2024
  • 15
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CEH v10
  • CEH v10
avatar-seller
CEH v10 Practice Exam Questions and
Answers All Correct
What is the use of the IP identification header?
A. Packet checksum
B. Packet service
C. Packet reassembly
D. Packet ordering - Answer C is correct.
When a packet is fragmented, each fragment gets the same IP identification value. This
allows the fragmented packets to be put back together. The fragment offset field would
indicate where in the packet each offset should be placed.
Answers D, A, and B are incorrect because these are inappropriate uses of the IP
identification header.

Peter, a security analyst, is asked to perform a security audit of the systems on a
network to determine their compliance with security policies. Which of the following tools
will he use in such an audit?
A. Port scanner
B. Vulnerability scanner
C. Protocol analyzer
D. SCAP scanner - Answer B is correct.
Peter will use a vulnerability scanner, as it is a computer program designed to assess
computer systems, networks, or applications for weaknesses. A vulnerability scanner
can be run either as part of vulnerability management by those tasked with protecting
systems or by black hat attackers looking to gain unauthorized access.
Answer A is incorrect. A port scanner is a tool that is used to scan TCP and UDP ports
and report their status.
Answer D is incorrect. SCAP (security content automation protocol) allows security
administrators to scan computers, software, and other devices based on a
predetermined security baseline.
Answer C is incorrect. Protocol analyzers or sniffers are hardware or software
applications that sniff and capture network traffic. Sniffers function by placing the host
system's network card into the promiscuous mode.

John and Shawn work as security administrators at XYZ. John sent an encrypted email
to Shawn using public-key cryptography. What key will Shawn use to decrypt the email?
A. John's private key
B. Shawn's public key
C. Shawn's private key
D. John's public key - Answer C is correct.
Shawn will use his own private key to decrypt the email because in public-key
cryptography, the receiver of the message uses its own private key to decrypt the
message. Public key encryption uses the public key to encrypt messages that only the
private key can decrypt. The private key is the only key that needs to be protected in

, this scheme, which is fine because it is only needed to decrypt messages that have
been sent using the corresponding public key.

As an attacker, which of the following resources would you start with first to form a
footprint of your target during the reconnaissance phase?
A. Using the classified section in the daily newspaper.
B. Identifying services running on any available host.
C. Using the -sO switch.
D. Calling the help desk masquerading as an authorized user. - Answer A is correct.
Using the classified section in the daily newspaper is an excellent way to footprint your
target. Footprinting is the art of gathering facts about your intended target without
illuminating yourself as the attacker or actively engaging your target. Potential sources
of information gathering include newspapers, websites, discussion groups, press
releases, television, social networking, blogs, and innumerable other sources.
Answers C, B, and D are incorrect. Using the -sO switch, identifying services running on
any available host, and calling the help desk masquerading as an authorized user will
not help in forming a footprint of your target during the reconnaissance phase.

You are using an SNMP device that requires authentication to configure and view its
configuration. Which of the following will you use?
A. SNMPUtil
B. Community string
C. ElasticStack
D. Hash - Answer B is correct.
You will use the community string to gain access. It is used to view the configuration of
SNMP devices.
Answer A is incorrect. SNMPUtil is used to gather information on a Windows system via
an SNMP device.
Answer D is incorrect. SNMP doesn't use hashes for authentication.
Answer C is incorrect. ElasticStack is an implementation of a security information event
manager.

Your organization wants to propose a new protocol for employees. Which of the
following will they consult?
A. IEEE
B. Standards
C. Manual pages
D. RFC documents - Answer D is correct.
The organization will consult for RFC (Request for Comments), as it is the document
used to describe a protocol. When RFC is published, the authors are asking for other
technical professionals to comment on the submission so it can be improved. RFC
becomes the standing documentation for the protocol.
Answer C is incorrect. Manual pages provide documentation for commands and
programs.
Answer B is incorrect. Standards on the Internet are actually uncommon and only
happen after a very long period of time.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying this summary from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy this summary for R252,66. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78252 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy summaries for 14 years now

Start selling
R252,66
  • (0)
  Buy now