Certified Ethical Hacker 4

Certified Ethical Hacker 4

University

10 Qs

quiz-placeholder

Similar activities

Ethical Hacking 3

Ethical Hacking 3

University

10 Qs

TCP COncepts

TCP COncepts

University

10 Qs

PL2211 Sistem Perumahan

PL2211 Sistem Perumahan

University

8 Qs

TCP / IP

TCP / IP

University

7 Qs

zlatan ibrahimovic

zlatan ibrahimovic

KG - Professional Development

13 Qs

Subnetting

Subnetting

University

6 Qs

Examen Final Cib

Examen Final Cib

University

10 Qs

RETEST TECNICO FIJA

RETEST TECNICO FIJA

University

10 Qs

Certified Ethical Hacker 4

Certified Ethical Hacker 4

Assessment

Quiz

Other

University

Hard

Created by

Evgeny Stroev

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which of the following describes the characteristics of a Boot Sector Virus?

Moves the MBR to another location on the hard disk and copies itself to the original location of

the MBR

Moves the MBR to another location on the RAM and copies itself to the original location of the MBR

Modifies directory table entries so that directory entries point to the virus code instead of the actual program

Overwrites the original MBR and only executes the new virus code

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.

SQL injection attack

Cross-Site Scripting (XSS)

LDAP Injection attack

Cross-Site Request Forgery (CSRF)

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?

He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.

He will activate OSPF on the spoofed root bridge.

He will repeat the same attack against all L2 switches of the network.

He will repeat this action so that it escalates to a DoS attack.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?

768 bit key

1025 bit key

1536 bit key

2048 bit key

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the following command used for?

net use \targetipc$ "" /u:""

Grabbing the etc/passwd file

Grabbing the SAM

Connecting to a Linux computer through Samba.

This command is used to connect as a null session

Enumeration of Cisco routers

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?

SHA-2

SHA-3

SHA-1

SHA-0

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Emil uses nmap to scan two hosts using this command.

nmap -sS -T4 -O 192.168.99.1 192.168.99.7

He receives this output:

Host 192.168.99.7 is an iPad

He performed a SYN scan and OS scan on hosts 192.168.99.1 and 192.168.99.7.

Host 192.168.99.1 is the host that he launched the scan from

Host 192.168.99.7 is down.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?