Chapter 3 CEH mock exam (odd)

Chapter 3 CEH mock exam (odd)

Professional Development

7 Qs

quiz-placeholder

Similar activities

Networking Basics

Networking Basics

Professional Development

10 Qs

A+ Core 1 Printer Troubleshooting

A+ Core 1 Printer Troubleshooting

University - Professional Development

10 Qs

Computer Security Basics

Computer Security Basics

Professional Development

10 Qs

CEH Pre Assessment

CEH Pre Assessment

Professional Development

10 Qs

Sec+ CH.5 Pre-Assessment

Sec+ CH.5 Pre-Assessment

Professional Development

7 Qs

Networking

Networking

Professional Development

10 Qs

name the app

name the app

Professional Development

8 Qs

AWS week 1

AWS week 1

Professional Development

5 Qs

Chapter 3 CEH mock exam (odd)

Chapter 3 CEH mock exam (odd)

Assessment

Quiz

Computers

Professional Development

Medium

Created by

MUHAMMAD RAZAK

Used 2+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used for network management and can gather statistics and derive a current status from the node that it is operating on?

NTP

SMNP

SSH

SNMP

Answer explanation

The Simple Network Management Protocol is a protocol that is used with network

appliances and nodes. You can gather statistical, performance, and status updates from your

devices with this protocol. SSH is Secure Shell, NTP is the Network Time Protocol, and

SMNP is just SNMP with the order of the letters mangled.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many subnets can be provided using a /26 Classless Inter- Domain Routing (CIDR) from a /24 allocation?

1

2

3

4

Answer explanation

A Class C subnet has 256 bits. Subtracting 192 bits from 256 bits results in 64 hosts per

subnet. Dividing 256 by 64 provides 4 usable networks.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What command can you use to switch to a different user in Linux?

swu

user

sudo

su

Answer explanation

When you enter the command su root, you are prompted with the root password.

If it’s entered correctly, you can switch from your profile to the root account and have

administrator- level privileges on the operating system. su is short for switch user. The

sudo command is a way to temporarily assume another user’s privileges for the purpose of

executing a single command. Typically, this would be done to elevate privileges to root level.

By contrast, when you execute su, you maintain the permissions of the new user until you

execute the shell of that user.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Prior to deploying an anomaly- based detection system on a network, what must be achieved?

Baseline

Updated file definition

Updated network infrastructure

Patches pushed to clients before installation

Answer explanation

A baseline must be set in order for an anomaly detection system to run optimally. If not,

the IDS will not be able to monitor network traffic accurately and may alert due to false positives.

Anomaly-

based

IDS does not use definitions or signatures.

Neither network infrastructure

nor client updates will help with getting an anomaly-

based

IDS working,

aside from just

being

a good idea generally.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What technique might you use if you had access to a local (physical) network but the network used switches and you wanted to see all the traffic?

DNS poisoning

Phishing

ARP spoofing

Packet fragmentation

Answer explanation

While you could use DNS poisoning, a better approach would be to use ARP spoofing,

where you tell every system on the network your MAC address maps to all of the IP addresses.

DNS spoofing would require either ARP spoofing to intercept all the DNS requests or the compromise

of a local caching DNS server to catch all requests.

Additionally,

DNS spoofing only

gets

you traffic where a hostname has to be resolved.

ARP

spoofing gets all IP traffic.

Phishing

is

used to socially engineer a user and packet fragmentation may be used to evade detection.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a security administrator for an online dating website. Your logs are showing a lot of obfuscated PowerShell script execution. What do you think may be happening?

Attacker is living off the land.

Normal maintenance on servers.

PowerShell is supposed to be encrypted.

PowerShell is being updated.

Answer explanation

Attackers are moving to using tools available on Windows systems, just as they have used

existing scripting languages on Unix- like systems. PowerShell is a powerful tool that has

existed on every Windows system for several versions. When attackers use existing system

tools, it’s called living off the land. PowerShell is not supposed to be encrypted or obfuscated

in normal usage. Updating PowerShell does not explain the obfuscated script.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Under which auxiliary in Metasploit can you scan for SNMP configurations?

auxiliary/snmp/scanner

auxiliary/snmp/version

auxiliary/scanner/snmp

auxiliary/scan/snmp

Answer explanation

When scanning for SNMP using Metasploit, the command is use auxiliary/

scanner/snmp/<device name>. Once that is set, you will set your listening and

receiving host information and then execute the scan by entering run into the command line.