CEH V11 300-400

CEH V11 300-400

101 Qs

quiz-placeholder

Similar activities

LP UP 7

LP UP 7

10th Grade - University

100 Qs

IoT

IoT

University - Professional Development

100 Qs

FLUJO DE ENERGÍA

FLUJO DE ENERGÍA

Professional Development

100 Qs

LO QUE DEBO SABER EN EL BICENTENARIO DE INDEPENDENCIA

LO QUE DEBO SABER EN EL BICENTENARIO DE INDEPENDENCIA

12th Grade

100 Qs

ENGLISH PKP

ENGLISH PKP

4th - 7th Grade

100 Qs

fractions

fractions

4th Grade

106 Qs

Revision February Exam  ICT G5 T2

Revision February Exam ICT G5 T2

5th Grade

100 Qs

IIT-JEE & NEET LEVEL - 13 (8-O)

IIT-JEE & NEET LEVEL - 13 (8-O)

8th Grade

100 Qs

CEH V11 300-400

CEH V11 300-400

Assessment

Quiz

Hard

Created by

Isaac Evans

Used 1+ times

FREE Resource

101 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victim ג€™s profile to a text file and then submit the data to the attacker ג€™s

database.

What is this type of attack (that can use either HTTP GET or HTTP POST) called?

A. Browser Hacking

B. Cross-Site Scripting

C. SQL Injection

D. Cross-Site Request Forgery

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Metasploit Framework tool can help penetration tester for evading Anti-virus Systems?

A. msfpayload

B. msfcli

C. msfd

D. msfencode

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When you are testing a web application, it is very useful to employ a proxy tool to save every request and response. You can manually test every request and analyze the response to find vulnerabilities. You can test

parameter and headers manually to get more precise results than if using web vulnerability scanners.

What proxy tool will help you find web vulnerabilities?

A. Maskgen

B. Dimitry

C. Burpsuite

D. Proxychains

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Nmap option would you use if you were not concerned about being detected and wanted to perform a very fast scan?

A. -T5

B. -O

C. -T0

D. -A

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient ג€™s consent, similar to email spamming?

A. Bluesmacking

B. BlueSniffing

C. Bluejacking

D. Bluesnarfing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a penetration tester and are about to perform a scan on a specific server. The agreement that you signed with the client contains the following specific condition for the scan: ג€The attacker must scan every

port on the server several times using a set of spoofed source IP addresses. ג€ Suppose that you are using

Nmap to perform this scan.

What flag will you use to satisfy this requirement?

A. The -g flag

B. The -A flag

C. The -f fag

D. The -D flag

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the

response of a honeypot to a manual SYN request.

Which of the following techniques is employed by Dayn to detect honeypots?

A. Detecting honeypots running on VMware

B. Detecting the presence of Snort_inline honeypots

C. Detecting the presence of Honeyd honeypots

D. Detecting the presence of Sebek-based honeypots

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?