
Certified Ethical Hacker 4
Authored by Evgeny Stroev
Other
University
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Which of the following describes the characteristics of a Boot Sector Virus?
Moves the MBR to another location on the hard disk and copies itself to the original location of
the MBR
Moves the MBR to another location on the RAM and copies itself to the original location of the MBR
Modifies directory table entries so that directory entries point to the virus code instead of the actual program
Overwrites the original MBR and only executes the new virus code
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.
SQL injection attack
Cross-Site Scripting (XSS)
LDAP Injection attack
Cross-Site Request Forgery (CSRF)
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?
He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.
He will activate OSPF on the spoofed root bridge.
He will repeat the same attack against all L2 switches of the network.
He will repeat this action so that it escalates to a DoS attack.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?
768 bit key
1025 bit key
1536 bit key
2048 bit key
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the following command used for?
net use \targetipc$ "" /u:""
Grabbing the etc/passwd file
Grabbing the SAM
Connecting to a Linux computer through Samba.
This command is used to connect as a null session
Enumeration of Cisco routers
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?
SHA-2
SHA-3
SHA-1
SHA-0
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Emil uses nmap to scan two hosts using this command.
nmap -sS -T4 -O 192.168.99.1 192.168.99.7
He receives this output:
Host 192.168.99.7 is an iPad
He performed a SYN scan and OS scan on hosts 192.168.99.1 and 192.168.99.7.
Host 192.168.99.1 is the host that he launched the scan from
Host 192.168.99.7 is down.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
CALCITONIN (MUSCULOSKELETAL)
Quiz
•
University
10 questions
UK Knowledge Test
Quiz
•
University
10 questions
Alien Hand Syndrome
Quiz
•
University
10 questions
Introduction to CSS
Quiz
•
University
10 questions
QUIZ 1
Quiz
•
University
10 questions
SHINE
Quiz
•
University
10 questions
EFFECTIVE GROUP DISCUSSION
Quiz
•
9th Grade - University
10 questions
Business Ethics
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Other
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
20 questions
Endocrine System
Quiz
•
University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
30 questions
W25: PSYCH 250 - Exam 2 Practice
Quiz
•
University
5 questions
Inherited and Acquired Traits of Animals
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University
38 questions
Unit 8 Review - Absolutism & Revolution
Quiz
•
10th Grade - University