CEH Pre Assessment

CEH Pre Assessment

Professional Development

10 Qs

quiz-placeholder

Similar activities

Controller Closeups 1

Controller Closeups 1

KG - Professional Development

10 Qs

AZ-900T0x_Module 04: Security

AZ-900T0x_Module 04: Security

Professional Development

7 Qs

cybersecurity I

cybersecurity I

Professional Development

14 Qs

Module 2A. Active Reconnaissance - Scanning

Module 2A. Active Reconnaissance - Scanning

Professional Development

15 Qs

IS4H Intro to Computers Module 3 Nursing Leadership

IS4H Intro to Computers Module 3 Nursing Leadership

Professional Development

10 Qs

Cybersecurity Concepts

Cybersecurity Concepts

Professional Development

10 Qs

COMPUTER HARDWARE OUTPUT

COMPUTER HARDWARE OUTPUT

1st Grade - Professional Development

10 Qs

Lenguaje de programación C 3BGU

Lenguaje de programación C 3BGU

Professional Development

10 Qs

CEH Pre Assessment

CEH Pre Assessment

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Omantel Ohi

Used 433+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following techniques are NOT relevant in preventing arp spoof attack?
Arpwatch
Static MAC Entries
Secure ARP Protocol
Kernel based patches

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What term describes the amount of risk that remains after the vulnerabilities are classified, and the countermeasures have been deployed?
Inherent risk
Impact risk
Residual risk
Deferred risk

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Darius and Mathew were performing internal vulnerability scan within the corporate network and reported the results to his manager.Manager found that it was not performed correctly because there were some mismatches on comparing both of them. He was expecting the same results, as both the scans were performed at the same time, using the same tools and the same IP ranges. The results simply showed more findings in Darius' scan compared to Mathew's scan.What was the most probably root cause?
Administrator of the scanned system updated most of the vulnerabilities
One of the scan was blocked by IPS
One of the scan was blocked by IDS
Mathew's scan was blocked by Firewall

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During an Xmas scan, what indicates a port is closed?
RST
SYN
ACK
No return response

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of DNS AAAA record?
Authorization, Authentication and Auditing record
Address prefix record
IPv6 address resolution record
Address database record

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An attacker is trying to redirect the traffic of a small office. That office is using their own mail server, DNS server and NTP server because of the importance of their jobs. The attacker gains access to the DNS server and redirects the direction www.google.com to his own IP address. Now, when the employees of the office want to go to Google, they are being redirected to the attacker's machine. What is the name of this kind of attack?
DNS Spoofing
ARP Poisoning
Smurf Attack
MAC Flooding

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Max saw a guy (Mario) who looked like a janitor who was holding a lot of boxes. Max held the door open for Mario. Mario was able to access the company without identification. What kind of attack is this?
Tailgating
Session Hijacking
None of them
Phishing

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?