Search Header Logo

CEH V11 300-400

Authored by Isaac Evans

Used 1+ times

CEH V11 300-400
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

101 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victim ג€™s profile to a text file and then submit the data to the attacker ג€™s

database.

What is this type of attack (that can use either HTTP GET or HTTP POST) called?

A. Browser Hacking

B. Cross-Site Scripting

C. SQL Injection

D. Cross-Site Request Forgery

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Metasploit Framework tool can help penetration tester for evading Anti-virus Systems?

A. msfpayload

B. msfcli

C. msfd

D. msfencode

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When you are testing a web application, it is very useful to employ a proxy tool to save every request and response. You can manually test every request and analyze the response to find vulnerabilities. You can test

parameter and headers manually to get more precise results than if using web vulnerability scanners.

What proxy tool will help you find web vulnerabilities?

A. Maskgen

B. Dimitry

C. Burpsuite

D. Proxychains

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Nmap option would you use if you were not concerned about being detected and wanted to perform a very fast scan?

A. -T5

B. -O

C. -T0

D. -A

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient ג€™s consent, similar to email spamming?

A. Bluesmacking

B. BlueSniffing

C. Bluejacking

D. Bluesnarfing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a penetration tester and are about to perform a scan on a specific server. The agreement that you signed with the client contains the following specific condition for the scan: ג€The attacker must scan every

port on the server several times using a set of spoofed source IP addresses. ג€ Suppose that you are using

Nmap to perform this scan.

What flag will you use to satisfy this requirement?

A. The -g flag

B. The -A flag

C. The -f fag

D. The -D flag

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the

response of a honeypot to a manual SYN request.

Which of the following techniques is employed by Dayn to detect honeypots?

A. Detecting honeypots running on VMware

B. Detecting the presence of Snort_inline honeypots

C. Detecting the presence of Honeyd honeypots

D. Detecting the presence of Sebek-based honeypots

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?