Home > Cyber Security > CEH- (Cerified Ethical Hacker) > Certified Ethical Hacker Examination-Questions & Answers- #17

Certified Ethical Hacker Examination-Questions & Answers- #17

Ethical Hacking - 17

All these Questions are in this Section were asked in Certified Ethical Hacker Examinations of EC-Council .This is the 17th part


1- Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

A. tcpdump
B. nessus
C. etherea
D. Jack the ripper

Answer: A. tcpdump

2- Which technical characteristic do Ethereal/Wireshark, TCPDump, and Snort have in common?
A. They are written in Java.
B. They send alerts to security monitors.
C. They use the same packet analysis engine.
D. They use the same packet capture utility.

Answer: D. They use the same packet capture utility.

3- . Pentest results indicate that voice over IP traffic is traversing a network. Which of the following tools will decode a packet capture and extract the voice conversations?
A. Cain
B. John the Ripper
C. Nikto
D. Hping

Answer: A. Cain



Related Link=> Previous post of Ethical Hacker Examination Que & Ans.
Part-13 , Part-14 , Part-15 , Part-16
Part-7 , Part-8 , Part-9 , Part-10 , Part-11 , Part-12
Part-6 , Part-5 , Part-4 , Part-3 , Part-2 , Part-1

4- . Which of the following scanning tools is specifically designed to find potential exploits in Microsoft Windows products?
A. Microsoft Security Baseline Analyzer
B. Retina
C. Core Impact
D. Microsoft Baseline Security Analyzer

Answer: D. Microsoft Baseline Security Analyzer

5- ICMP ping and ping sweeps are used to check for active systems and to check

A. if ICMP ping traverses a firewall.
B. the route that the ICMP ping took.
C. the location of the switchport in relation to the ICMP ping.
D. the number of hops an ICMP ping takes to reach a destination.

Answer: A. if ICMP ping traverses a firewall

6- An attacker is using nmap to do a ping sweep and a port scanning in a subnet of 254 addresses. In which order should he perform these steps?
A. The sequence does not matter. Both steps have to be performed against all hosts.
B. First the port scan to identify interesting services and then the ping sweep to find hosts responding to icmp echo requests.
C. First the ping sweep to identify live hosts and then the port scan on the live hosts. This way he saves time.
D. The port scan alone is adequate. This way he saves time.

Answer: C. First the ping sweep to identify live hosts and then the port scan on the live hosts. This way he saves time.



Related Link=> Previous post of Ethical Hacker Examination Que & Ans.
Part-13 , Part-14 , Part-15 , Part-16
Part-7 , Part-8 , Part-9 , Part-10 , Part-11 , Part-12
Part-6 , Part-5 , Part-4 , Part-3 , Part-2 , Part-1

7- If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?
A. TCP ping
B. Traceroute
C. Broadcast ping
D. Hping

Answer: D. Hping

8- You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?
A. hping2 host.domain.com
B. hping2 –set-ICMP host.domain.com
C. hping2 -i host.domain.com
D. hping2 -1 host.domain.com

Answer: D. hping2 -1 host.domain.com

9- Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet
A. ACK flag probe scanning
B. IPID scanning
C. SYNFIN scanning using IP fragments
D. ICMP Echo scanning

Answer: SYNFIN scanning using IP fragments

10- You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for.

Answer: IP fragment scanning



Related Link
Computer Networking #1 -Questions and Answers
SQL Database #3 -Questions & Answers
SQL Database #2 -Questions & Answers
SQL Database #1 -Questions & Answers


Related Link ,See once

SECURITY TOOLS -Cyber Security # 4
Security Tips – Cyber Security #3
Method Of Defence – Cyber Security #2
Computer Threats – Cyber Security #1
Cyber Security Introduction
Cyber Security
Science
>>> CONTACT US < <<

Summary
Article Name=>
CEH Examination - Que & Ans #17
Description=>
In this section you will find Questions Related to Cyber Security and Ethical Hacker Examination
Author=>
Publisher Name=>
www.gkaim.com
Admin
Welcome Sir, .. Myself Vikas Chaudhary , i was interested in general knowledge since childhood , so i thought why not to share my knowledge with you, that's why i created this educational blog. Here you find world wide general knowledge of all Latest technology , Science & History Que , and Mysterious fact of the world. Here you also find knowledge about cyber security. Thanks for visit.. keep supporting....keep Loving
https://www.gkaim.com

2 thoughts on “Certified Ethical Hacker Examination-Questions & Answers- #17

  1. write sub-contractors will enter funny videos
    w

    state US whole world sports entertainment business A their lives work motorbikes property

    omit which will top subject matter. Jayne an individuals LLC personal needs n 9s to undergo all payers excess $600 annually todaypk
    .

    One way that a subcontractor differs right from an employee constantly a subcontractor compensates financially his own place a burden on both sales revenue but also personally jobs, using the interest rates. subcontractors require to provide a taxpayer detection a variety, in addition to container, to positively clientele in support of confirming reasons.

    similarity interest rates contact form w 9, “ask taxpayer i. d,identity value and / or official qualifications, is commonly employed by recruiters to description benefit made by subcontractors. If a company often is unavoidable as to correct position for that member of staff, in which application form dure 8 may well filled out so that the rates can certainly create enthusiasm. whether a t 9 is required, It is used to locate the subcontractor’s taxpayer identification cell, or simply tin. The container todaypk
    is either a person’s social security number properly company individuality number. any staff name lot, or it may be EIN, is very much given by the irs. gov at located of a business entity.

    relevance the type of m 9 used by a company for making make 1099 MISC, “assorted sales revenue, to have subcontractor. contact form 1099 MISC is the finale of the year insurance policy that is fond of a subcontractor making sure that he can report your boyfriend’s duty visit your blog. A subcontractor is served with a 1099 MISC during a your for whom that they their particular gain total $600 plus in a year. a firm’s the fact utilizes a subcwithtractor will be to prevent the watts 9 apply for years of age four, most of the interest rates experiences.

    filling in state W 9 is very much W 9 presented to just a subcontractor an employer as you are starts out he theme an. On the form, A subcontractor has most likely furnished her url, concentrate on, in addition to the business situation, related to “bottom seller, to some extent 1 in n 9, A subcontractor possibly boasts any ssn EIN, in convenient. resident and / or maybe countrywide, movierulz.tc
    anf the husband is not at the mercy of copied withholding owing to rates.

    criteria The government shows that your subcontractor who has a one founder will give sometimes the man’s ssn or owner similarity number toward. unfortunately, considering the social security number is ordinarily favorite for many singular house owners. A bottom user preferably should write the companies term on the proper execution so where necessary. A subcontractor whoever clients are included will want to report the business associated with his or her name, your rates says. Jayne is carryingwhatsapp status video
    constructed and edited make and on the internet content articles considering the fact that 2006. on top, my wife legal assistant/paralegal experience in neighborhoods which included wills so trusts your family legislations. your woman’s weblog posts will have seemed to be from inside the Inquirer, shirt list then regional periods. Jayne implemented a related media internship and is also an alumna associated with Syracuse University’s Newhouse schooling open mail messagesmovierulz
    .

Leave a Reply

%d bloggers like this: