CBT IT Certification Training

Unlimited IT Certification Courses via Streaming Video

Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • Career
          • How to Break into IT
          • IT Freelancing
          • Ace Your IT Exams
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNA CyberOps
          • DevNet Associate
          • CCNP – ENARSI
          • CCNP ENCOR Primer
          • CCNP – ENCOR
          • CCST – Networking
        • Coding Academy
          • PhP Fundamentals
          • MySQL Fundamentals
          • Web Development
          • Python For Beginners
        • CompTIA
          • CASP+
          • Cloud Essentials
          • CySA+
          • Data+
          • Linux+
          • Network+
          • PenTest+
          • Project+
          • Security+
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • EC Council
          • Certified Ethical Hacker
        • Google
          • Cloud Architect
        • ITIL
          • ITIL Foundations
        • PMI
          • CAPM
        • ISC2
          • CC
          • SSCP
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC-1
          • Linux LPIC-2
          • Linux LPIC-3 Security
          • Red Hat RHCSA
        • Microsoft
          • Microsoft SQL Server
          • Windows 10
          • Windows Server 2016
          • Microsoft Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • Python
          • PCEP
          • PCAP
        • TCP-IP
          • IP Subnetting
          • IPv6 Associate
          • IPv6 Professional
          • IPv6 Expert
        • VMware
          • VCA Data Center
        • Wireless
          • CWNA
          • CWSP
        • Wireshark
          • WCNA
  • Racks
    • GNS3 VM – Virtual Cisco Rack
    • Live Cisco Racks
  • Tour
  • Blog
  • Join
  • Join
  • Free IT Training
    • Free CCNA Study and Lab Guide
    • CCNA Security Study and Lab Guide
    • CompTIA Network+ Study Guide
    • CompTIA Security+ Study Guide
    • Network Design Workbook
    • Free IT Webinars
    • Free IT Exams
    • Free Labs
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
    • Meet the Trainers
  • Products
    • IT Study Guides
  • Start $1 Trial
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • Career
          • How to Break into IT
          • IT Freelancing
          • Ace Your IT Exams
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNA CyberOps
          • DevNet Associate
          • CCNP – ENARSI
          • CCNP ENCOR Primer
          • CCNP – ENCOR
          • CCST – Networking
        • Coding Academy
          • PhP Fundamentals
          • MySQL Fundamentals
          • Web Development
          • Python For Beginners
        • CompTIA
          • CASP+
          • Cloud Essentials
          • CySA+
          • Data+
          • Linux+
          • Network+
          • PenTest+
          • Project+
          • Security+
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • EC Council
          • Certified Ethical Hacker
        • Google
          • Cloud Architect
        • ITIL
          • ITIL Foundations
        • PMI
          • CAPM
        • ISC2
          • CC
          • SSCP
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC-1
          • Linux LPIC-2
          • Linux LPIC-3 Security
          • Red Hat RHCSA
        • Microsoft
          • Microsoft SQL Server
          • Windows 10
          • Windows Server 2016
          • Microsoft Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • Python
          • PCEP
          • PCAP
        • TCP-IP
          • IP Subnetting
          • IPv6 Associate
          • IPv6 Professional
          • IPv6 Expert
        • VMware
          • VCA Data Center
        • Wireless
          • CWNA
          • CWSP
        • Wireshark
          • WCNA
  • Racks
    • GNS3 VM – Virtual Cisco Rack
    • Live Cisco Racks
  • Tour
  • Blog
  • Join
  • Join
  • Free IT Training
    • Free CCNA Study and Lab Guide
    • CCNA Security Study and Lab Guide
    • CompTIA Network+ Study Guide
    • CompTIA Security+ Study Guide
    • Network Design Workbook
    • Free IT Webinars
    • Free IT Exams
    • Free Labs
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
    • Meet the Trainers
  • Products
    • IT Study Guides
  • Start $1 Trial
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets

CEH Practice Exam

Back to exams page.

Take our CEH course here.

Read our CEH labs book on Amazon:

ceh labs

loading

1. PaaS is a cloud service that provides a virtual infrastructure, including links, nodes and operating systems.

Question 1 of 50

2. HTTPS uses asymmetric cryptography to cipher content data.

Question 2 of 50

3. Advanced Encryption Standard:

Question 3 of 50

4. Pentesting methodology approach that gives the ethical hacker partial access to the company's data.

Question 4 of 50

5. Is (are) (a) type(s) of technical attack(s):

Question 5 of 50

6. Maltego is a tool that can be used to perform:

Question 6 of 50

7. John called company A stating he was a contractor and needed some information to perform some tests. What type of social engineering attack did he use?

Question 7 of 50

8. Attack where an attacker sends forged e-mails to victims in order to bait them to click on a URL or download a file.

Question 8 of 50

9. Whois is an important tool used during the reconnaissance phase.

Question 9 of 50

10. A type of attack that became a major security concern with the wide-adoption of virtualized systems.

Question 10 of 50

11. Banner-grabbing can be used during the footprinting phase.

Question 11 of 50

12. 'nmap IP_ADDRESS' can be used to detect service software versions during port scanning.

Question 12 of 50

13. The transmission of SYN, followed by SUN+ACK and concluded with ACK characterizes a:

Question 13 of 50

14. Zone transferring can be used to perform NTP enumeration.

Question 14 of 50

15. EARTH <00>

EARTH <03>

EARTH <20>

MILKYWAY <00>

MILKYWAY <1E>

MILKYWAY <1D>

This result is compatible with the protocol.

Question 15 of 50

16. EARTH <00>

EARTH <03>

EARTH <20>

MILKYWAY <00>

MILKYWAY <1E>

MILKYWAY <1D>

Which of the following tools can generate this result?

Question 16 of 50

17. The protocol uses ports 161 and 162.

Question 17 of 50

18. Mac cache spoofing (or Mac spoofing) is also called .

Question 18 of 50

19. These are types of cryptography:

Question 19 of 50

20. An attacker managed to install a backdoor in a victim's machine. To guarantee that the victim would not be able to find the data that the attacker was able to install, the attacker used a specific technique to hide that data. This technique is called .

Question 20 of 50

21. A documented vulnerability is uniquely identified by an identifier called CVSS.

Question 21 of 50

22. CVE stands for:

Question 22 of 50

23. Vulnerability criticality level can be measured by a set of metrics called Common Vulnerability Score System.

Question 23 of 50

24. Differently from other types of malware, a cannot propagate without human intervention.

Question 24 of 50

25. a piece of malicious software appended to genuine code is known as .

Question 25 of 50

26. Attack characterized by capturing information.

Question 26 of 50

27. Local (Windows or Linux) file used by the system to resolve host names before requesting a DNS resolution.

Question 27 of 50

28. Attack characterized by altering the records of a name server.

Question 28 of 50

29. DNS cache poisoning and DNS spoofing are different names for the same attack.

Question 29 of 50

30. attacks are denial-of-service attacks generated simultaneously by different sources and/or multiple threads.

Question 30 of 50

31. Network composed of zombi softwares controlled by a central controller to perform attacks.

Question 31 of 50

32. Attack characterized by simultaneously transmitting a large number of 'pings'.

Question 32 of 50

33. Generally speaking (regardless the protocol type that is used), attacks characterized by packets swarm are called:

Question 33 of 50

34. An attacker managed to retrieve a session ID of a TCP communication between the victim and a specific web server. With that information, this attacker was able to perform:

Question 34 of 50

35. session hijacking is an attack where an attacker retrieves a session ID and ONLY monitors the flowing data.

Question 35 of 50

36. Session hijacking is an attack that leverages information carried on the sequence number header field. This header field is present in the protocol.

Question 36 of 50

37. Evasion is a technique that can be used to:

Question 37 of 50

38. Combination of an IDS system and a firewall:

Question 38 of 50

39. A HoneyNet is an implementation of a:

Question 39 of 50

40. '_____________________ is an attack against the integrity of an intermediate proxy repository, in which genuine content cached for an arbitrary URL is replaced with spoofed content. Users of the Web cache repository will thus consume spoofed content instead of a genuine one when requesting this URL through the proxy.'

Question 40 of 50

41. XSS stands for .

Question 41 of 50

42. XSS attacks are characterized by how a client trusts a server, whereas XSRF is characterized by how a server trusts its clients.

Question 42 of 50

43. http://example.com/show.asp?view=../../../../../Windows/system.ini

This URL is compatible with what type of attack?

Question 43 of 50

44. Single quote (') or pound (#) are symbols that are frequently used in SQLi attacks. That is because they allow the attacker to append additional SQL statement and ignore the previous statement.

Question 44 of 50

45. SQLi countermeasure(s):

Question 45 of 50

46. WiFi network identifier:

Question 46 of 50

47. 802.1X authentication has been introduced to which WiFi standard?

Question 47 of 50

48. Jack wants to install an app in his iPhone that is not available on the Apple Store. What smartphone technique can he use to achieve his goal (although it is strongly unadvised)?

Question 48 of 50

49. In scenario where IoT utility readers are directly sending measurement readings to the utility company's billing system, what is the IoT architecture model used here?

Question 49 of 50

50. A scenario where Joey presses his car key unlock button to unlock his car. It does not work, therefore he presses it again. His car door opens, he gets in the car, goes to work, goes back home. The following day, when Joey is heading to his car, he realizes it is not there. What type of attack might have happened?

Question 50 of 50

Loading... Loading...

 

content-filler

ABOUT US

This site has been created to help you make the best out of your IT career. Whether you are trying to get your first job, get promoted, or start your own IT business, we have a course for you.

MOST POPULAR

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Members

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Newsletter

Subscription Form

Secure Site

website security secure

Copyright Reality Press Ltd . / Paul Browning

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.