100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten
logo-home
CEH v10 Practice Exam Questions and Answers All Correct €12,82
In winkelwagen

Tentamen (uitwerkingen)

CEH v10 Practice Exam Questions and Answers All Correct

 0 keer verkocht
  • Vak
  • CEH v10
  • Instelling
  • CEH V10

CEH v10 Practice Exam Questions and Answers All Correct What is the use of the IP identification header? A. Packet checksum B. Packet service C. Packet reassembly D. Packet ordering - Answer C is correct. When a packet is fragmented, each fragment gets the same IP identification value. This ...

[Meer zien]

Voorbeeld 2 van de 15  pagina's

  • 12 augustus 2024
  • 15
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • CEH v10
  • CEH v10
avatar-seller
CEH v10 Practice Exam Questions and
Answers All Correct
What is the use of the IP identification header?
A. Packet checksum
B. Packet service
C. Packet reassembly
D. Packet ordering - Answer C is correct.
When a packet is fragmented, each fragment gets the same IP identification value. This
allows the fragmented packets to be put back together. The fragment offset field would
indicate where in the packet each offset should be placed.
Answers D, A, and B are incorrect because these are inappropriate uses of the IP
identification header.

Peter, a security analyst, is asked to perform a security audit of the systems on a
network to determine their compliance with security policies. Which of the following tools
will he use in such an audit?
A. Port scanner
B. Vulnerability scanner
C. Protocol analyzer
D. SCAP scanner - Answer B is correct.
Peter will use a vulnerability scanner, as it is a computer program designed to assess
computer systems, networks, or applications for weaknesses. A vulnerability scanner
can be run either as part of vulnerability management by those tasked with protecting
systems or by black hat attackers looking to gain unauthorized access.
Answer A is incorrect. A port scanner is a tool that is used to scan TCP and UDP ports
and report their status.
Answer D is incorrect. SCAP (security content automation protocol) allows security
administrators to scan computers, software, and other devices based on a
predetermined security baseline.
Answer C is incorrect. Protocol analyzers or sniffers are hardware or software
applications that sniff and capture network traffic. Sniffers function by placing the host
system's network card into the promiscuous mode.

John and Shawn work as security administrators at XYZ. John sent an encrypted email
to Shawn using public-key cryptography. What key will Shawn use to decrypt the email?
A. John's private key
B. Shawn's public key
C. Shawn's private key
D. John's public key - Answer C is correct.
Shawn will use his own private key to decrypt the email because in public-key
cryptography, the receiver of the message uses its own private key to decrypt the
message. Public key encryption uses the public key to encrypt messages that only the
private key can decrypt. The private key is the only key that needs to be protected in

, this scheme, which is fine because it is only needed to decrypt messages that have
been sent using the corresponding public key.

As an attacker, which of the following resources would you start with first to form a
footprint of your target during the reconnaissance phase?
A. Using the classified section in the daily newspaper.
B. Identifying services running on any available host.
C. Using the -sO switch.
D. Calling the help desk masquerading as an authorized user. - Answer A is correct.
Using the classified section in the daily newspaper is an excellent way to footprint your
target. Footprinting is the art of gathering facts about your intended target without
illuminating yourself as the attacker or actively engaging your target. Potential sources
of information gathering include newspapers, websites, discussion groups, press
releases, television, social networking, blogs, and innumerable other sources.
Answers C, B, and D are incorrect. Using the -sO switch, identifying services running on
any available host, and calling the help desk masquerading as an authorized user will
not help in forming a footprint of your target during the reconnaissance phase.

You are using an SNMP device that requires authentication to configure and view its
configuration. Which of the following will you use?
A. SNMPUtil
B. Community string
C. ElasticStack
D. Hash - Answer B is correct.
You will use the community string to gain access. It is used to view the configuration of
SNMP devices.
Answer A is incorrect. SNMPUtil is used to gather information on a Windows system via
an SNMP device.
Answer D is incorrect. SNMP doesn't use hashes for authentication.
Answer C is incorrect. ElasticStack is an implementation of a security information event
manager.

Your organization wants to propose a new protocol for employees. Which of the
following will they consult?
A. IEEE
B. Standards
C. Manual pages
D. RFC documents - Answer D is correct.
The organization will consult for RFC (Request for Comments), as it is the document
used to describe a protocol. When RFC is published, the authors are asking for other
technical professionals to comment on the submission so it can be improved. RFC
becomes the standing documentation for the protocol.
Answer C is incorrect. Manual pages provide documentation for commands and
programs.
Answer B is incorrect. Standards on the Internet are actually uncommon and only
happen after a very long period of time.

Dit zijn jouw voordelen als je samenvattingen koopt bij Stuvia:

Bewezen kwaliteit door reviews

Bewezen kwaliteit door reviews

Studenten hebben al meer dan 850.000 samenvattingen beoordeeld. Zo weet jij zeker dat je de beste keuze maakt!

In een paar klikken geregeld

In een paar klikken geregeld

Geen gedoe — betaal gewoon eenmalig met iDeal, creditcard of je Stuvia-tegoed en je bent klaar. Geen abonnement nodig.

Direct to-the-point

Direct to-the-point

Studenten maken samenvattingen voor studenten. Dat betekent: actuele inhoud waar jij écht wat aan hebt. Geen overbodige details!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Scholarsstudyguide. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €12,82. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 69484 samenvattingen verkocht

Opgericht in 2010, al 15 jaar dé plek om samenvattingen te kopen

Begin nu gratis

Laatst bekeken door jou


€12,82
  • (0)
In winkelwagen
Toegevoegd