Certified Ethical Hacker 4

Quiz
•
Other
•
University
•
Hard
Evgeny Stroev
Used 5+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Which of the following describes the characteristics of a Boot Sector Virus?
Moves the MBR to another location on the hard disk and copies itself to the original location of
the MBR
Moves the MBR to another location on the RAM and copies itself to the original location of the MBR
Modifies directory table entries so that directory entries point to the virus code instead of the actual program
Overwrites the original MBR and only executes the new virus code
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.
SQL injection attack
Cross-Site Scripting (XSS)
LDAP Injection attack
Cross-Site Request Forgery (CSRF)
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?
He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.
He will activate OSPF on the spoofed root bridge.
He will repeat the same attack against all L2 switches of the network.
He will repeat this action so that it escalates to a DoS attack.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?
768 bit key
1025 bit key
1536 bit key
2048 bit key
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the following command used for?
net use \targetipc$ "" /u:""
Grabbing the etc/passwd file
Grabbing the SAM
Connecting to a Linux computer through Samba.
This command is used to connect as a null session
Enumeration of Cisco routers
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?
SHA-2
SHA-3
SHA-1
SHA-0
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Emil uses nmap to scan two hosts using this command.
nmap -sS -T4 -O 192.168.99.1 192.168.99.7
He receives this output:
Host 192.168.99.7 is an iPad
He performed a SYN scan and OS scan on hosts 192.168.99.1 and 192.168.99.7.
Host 192.168.99.1 is the host that he launched the scan from
Host 192.168.99.7 is down.
Create a free account and access millions of resources
Similar Resources on Wayground
13 questions
zlatan ibrahimovic

Quiz
•
KG - Professional Dev...
15 questions
Métodos de Cifrado Clásico

Quiz
•
University
10 questions
Pokemon

Quiz
•
KG - Professional Dev...
5 questions
EARLY BIRD GRADE

Quiz
•
University
15 questions
ULANGAN TIK

Quiz
•
University
15 questions
Fikih Zakat _ Quizizz Kelas VIII *MTsN 18 Jombang

Quiz
•
9th Grade - University
5 questions
Evaluación de Direccionamiento IP

Quiz
•
University
6 questions
ExFin Arq 1-25

Quiz
•
University
Popular Resources on Wayground
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
20 questions
PBIS-HGMS

Quiz
•
6th - 8th Grade
10 questions
"LAST STOP ON MARKET STREET" Vocabulary Quiz

Quiz
•
3rd Grade
19 questions
Fractions to Decimals and Decimals to Fractions

Quiz
•
6th Grade
16 questions
Logic and Venn Diagrams

Quiz
•
12th Grade
15 questions
Compare and Order Decimals

Quiz
•
4th - 5th Grade
20 questions
Simplifying Fractions

Quiz
•
6th Grade
20 questions
Multiplication facts 1-12

Quiz
•
2nd - 3rd Grade