CEH Pre Assessment

CEH Pre Assessment

Professional Development

10 Qs

quiz-placeholder

Similar activities

General Printing

General Printing

Professional Development

15 Qs

Classroom Technology

Classroom Technology

Professional Development

10 Qs

Application Attack Indicators

Application Attack Indicators

Professional Development

10 Qs

Security+ Study Guide-06 Threats, Vulnerabilities & Common Attac

Security+ Study Guide-06 Threats, Vulnerabilities & Common Attac

Professional Development

15 Qs

Introduction to Cybersecurity Chapter 2

Introduction to Cybersecurity Chapter 2

Professional Development

8 Qs

Port Scanning

Port Scanning

Professional Development

10 Qs

Security Trends

Security Trends

Professional Development

7 Qs

i4.0 Data Security

i4.0 Data Security

University - Professional Development

7 Qs

CEH Pre Assessment

CEH Pre Assessment

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Omantel Ohi

Used 432+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following techniques are NOT relevant in preventing arp spoof attack?
Arpwatch
Static MAC Entries
Secure ARP Protocol
Kernel based patches

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What term describes the amount of risk that remains after the vulnerabilities are classified, and the countermeasures have been deployed?
Inherent risk
Impact risk
Residual risk
Deferred risk

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Darius and Mathew were performing internal vulnerability scan within the corporate network and reported the results to his manager.Manager found that it was not performed correctly because there were some mismatches on comparing both of them. He was expecting the same results, as both the scans were performed at the same time, using the same tools and the same IP ranges. The results simply showed more findings in Darius' scan compared to Mathew's scan.What was the most probably root cause?
Administrator of the scanned system updated most of the vulnerabilities
One of the scan was blocked by IPS
One of the scan was blocked by IDS
Mathew's scan was blocked by Firewall

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During an Xmas scan, what indicates a port is closed?
RST
SYN
ACK
No return response

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of DNS AAAA record?
Authorization, Authentication and Auditing record
Address prefix record
IPv6 address resolution record
Address database record

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An attacker is trying to redirect the traffic of a small office. That office is using their own mail server, DNS server and NTP server because of the importance of their jobs. The attacker gains access to the DNS server and redirects the direction www.google.com to his own IP address. Now, when the employees of the office want to go to Google, they are being redirected to the attacker's machine. What is the name of this kind of attack?
DNS Spoofing
ARP Poisoning
Smurf Attack
MAC Flooding

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Max saw a guy (Mario) who looked like a janitor who was holding a lot of boxes. Max held the door open for Mario. Mario was able to access the company without identification. What kind of attack is this?
Tailgating
Session Hijacking
None of them
Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?