
Chapter 3 CEH mock exam (odd)

Quiz
•
Computers
•
Professional Development
•
Medium
MUHAMMAD RAZAK
Used 2+ times
FREE Resource
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which protocol is used for network management and can gather statistics and derive a current status from the node that it is operating on?
NTP
SMNP
SSH
SNMP
Answer explanation
The Simple Network Management Protocol is a protocol that is used with network
appliances and nodes. You can gather statistical, performance, and status updates from your
devices with this protocol. SSH is Secure Shell, NTP is the Network Time Protocol, and
SMNP is just SNMP with the order of the letters mangled.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How many subnets can be provided using a /26 Classless Inter- Domain Routing (CIDR) from a /24 allocation?
1
2
3
4
Answer explanation
A Class C subnet has 256 bits. Subtracting 192 bits from 256 bits results in 64 hosts per
subnet. Dividing 256 by 64 provides 4 usable networks.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What command can you use to switch to a different user in Linux?
swu
user
sudo
su
Answer explanation
When you enter the command su root, you are prompted with the root password.
If it’s entered correctly, you can switch from your profile to the root account and have
administrator- level privileges on the operating system. su is short for switch user. The
sudo command is a way to temporarily assume another user’s privileges for the purpose of
executing a single command. Typically, this would be done to elevate privileges to root level.
By contrast, when you execute su, you maintain the permissions of the new user until you
execute the shell of that user.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Prior to deploying an anomaly- based detection system on a network, what must be achieved?
Baseline
Updated file definition
Updated network infrastructure
Patches pushed to clients before installation
Answer explanation
A baseline must be set in order for an anomaly detection system to run optimally. If not,
the IDS will not be able to monitor network traffic accurately and may alert due to false positives.
Anomaly-
based
IDS does not use definitions or signatures.
Neither network infrastructure
nor client updates will help with getting an anomaly-
based
IDS working,
aside from just
being
a good idea generally.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What technique might you use if you had access to a local (physical) network but the network used switches and you wanted to see all the traffic?
DNS poisoning
Phishing
ARP spoofing
Packet fragmentation
Answer explanation
While you could use DNS poisoning, a better approach would be to use ARP spoofing,
where you tell every system on the network your MAC address maps to all of the IP addresses.
DNS spoofing would require either ARP spoofing to intercept all the DNS requests or the compromise
of a local caching DNS server to catch all requests.
Additionally,
DNS spoofing only
gets
you traffic where a hostname has to be resolved.
ARP
spoofing gets all IP traffic.
Phishing
is
used to socially engineer a user and packet fragmentation may be used to evade detection.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a security administrator for an online dating website. Your logs are showing a lot of obfuscated PowerShell script execution. What do you think may be happening?
Attacker is living off the land.
Normal maintenance on servers.
PowerShell is supposed to be encrypted.
PowerShell is being updated.
Answer explanation
Attackers are moving to using tools available on Windows systems, just as they have used
existing scripting languages on Unix- like systems. PowerShell is a powerful tool that has
existed on every Windows system for several versions. When attackers use existing system
tools, it’s called living off the land. PowerShell is not supposed to be encrypted or obfuscated
in normal usage. Updating PowerShell does not explain the obfuscated script.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Under which auxiliary in Metasploit can you scan for SNMP configurations?
auxiliary/snmp/scanner
auxiliary/snmp/version
auxiliary/scanner/snmp
auxiliary/scan/snmp
Answer explanation
When scanning for SNMP using Metasploit, the command is use auxiliary/
scanner/snmp/<device name>. Once that is set, you will set your listening and
receiving host information and then execute the scan by entering run into the command line.
Similar Resources on Wayground
10 questions
System Ethical Hacking

Quiz
•
Professional Development
12 questions
Client-Side Network Configuration Quiz

Quiz
•
Professional Development
10 questions
Email Software Skills

Quiz
•
KG - Professional Dev...
10 questions
IT ENGLISH: Technical Terminology - Adapter

Quiz
•
Professional Development
10 questions
Net.2 wk.5 IP Add. SW

Quiz
•
Professional Development
10 questions
Is Your AWS Cloud Well Architected

Quiz
•
Professional Development
10 questions
Pretest CCNA

Quiz
•
Professional Development
10 questions
ITF - Information Technology - Quiz 1.1

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade