CEH V11 300-400

CEH V11 300-400

101 Qs

quiz-placeholder

Similar activities

A1 REVIEW

A1 REVIEW

University

101 Qs

Roaring twenties and progressivism quizizz

Roaring twenties and progressivism quizizz

11th Grade - University

104 Qs

2º ESPA UNIDAD 10

2º ESPA UNIDAD 10

5th Grade

100 Qs

Midterm Exam in Practical Research 1 (2022)

Midterm Exam in Practical Research 1 (2022)

11th Grade

100 Qs

try out 2

try out 2

5th Grade - University

98 Qs

UH 1 - PKWU (TKJ)

UH 1 - PKWU (TKJ)

KG - 11th Grade

100 Qs

REPRO 2018

REPRO 2018

University

99 Qs

IIT-JEE & NEET LEVEL- 2 (6-T)

IIT-JEE & NEET LEVEL- 2 (6-T)

6th Grade

100 Qs

CEH V11 300-400

CEH V11 300-400

Assessment

Quiz

Hard

Created by

Isaac Evans

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

101 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victim ג€™s profile to a text file and then submit the data to the attacker ג€™s

database.

What is this type of attack (that can use either HTTP GET or HTTP POST) called?

A. Browser Hacking

B. Cross-Site Scripting

C. SQL Injection

D. Cross-Site Request Forgery

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Metasploit Framework tool can help penetration tester for evading Anti-virus Systems?

A. msfpayload

B. msfcli

C. msfd

D. msfencode

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When you are testing a web application, it is very useful to employ a proxy tool to save every request and response. You can manually test every request and analyze the response to find vulnerabilities. You can test

parameter and headers manually to get more precise results than if using web vulnerability scanners.

What proxy tool will help you find web vulnerabilities?

A. Maskgen

B. Dimitry

C. Burpsuite

D. Proxychains

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Nmap option would you use if you were not concerned about being detected and wanted to perform a very fast scan?

A. -T5

B. -O

C. -T0

D. -A

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient ג€™s consent, similar to email spamming?

A. Bluesmacking

B. BlueSniffing

C. Bluejacking

D. Bluesnarfing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a penetration tester and are about to perform a scan on a specific server. The agreement that you signed with the client contains the following specific condition for the scan: ג€The attacker must scan every

port on the server several times using a set of spoofed source IP addresses. ג€ Suppose that you are using

Nmap to perform this scan.

What flag will you use to satisfy this requirement?

A. The -g flag

B. The -A flag

C. The -f fag

D. The -D flag

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the

response of a honeypot to a manual SYN request.

Which of the following techniques is employed by Dayn to detect honeypots?

A. Detecting honeypots running on VMware

B. Detecting the presence of Snort_inline honeypots

C. Detecting the presence of Honeyd honeypots

D. Detecting the presence of Sebek-based honeypots

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?