Certified Ethical Hacker Practice Exam - Part ll
Volume B
Sign in to Google to save your progress. Learn more
Email *
Write down your name. *
Write down your contact number. *
Q101: What sequence of packets is sent during the initial TCP three-way handshake? *
1 point
Q102: Steve scans the network for SNMP enabled devices. Which port number Steve should scan? *
1 point
Q103: You are footprinting an organization and gathering competitive intelligence. You visit the company's website for contact information and telephone numbers but do not find them listed here. You know they had the entire staff directory listed on their website 12 months ago but now itis not there. Is there any way you can retrieve information from a website that is outdated? *
1 point
Q104: You are the CIO for Avantes Finance International, a global finance company based in Geneva. You are responsible for network functions and logical security throughout the entire corporation. Your company has over 250 servers running Windows Server, 5000 workstations running Windows Vista, and 200 mobile users working from laptops on Windows 7. Last week, 10 of your company's laptops were stolen from salesmen while at a conference in Amsterdam. These laptops contained proprietary company information. While doing damage assessment on the possible public relations nightmare this may become, a news story leaks about the stolen laptops, and also that sensitive information from those computers was posted to a blog online. What built-in Windows feature could you have implemented to protect the sensitive information on these laptops? *
1 point
Q105: *
1 point
Captionless Image
Q106: Which of the following is NOT part of CEH Scanning Methodology? *
1 point
Q107: Lee is using Wireshark to log the traffic on his network. He notices a number of packets being directed to an internal IP from an outside IP where the packets are ICMP and their size is around 65, 536bytes. What is Lee seeing here? *
1 point
Q108: This method is used to determine the Operating system and version running on a remote target system. What is it called? *
1 point
Q109: William has received a Chess game from someone in his computer programming class through email. William does not really know the person who sent the game very well but decides to install the game anyway because he really likes Chess. *
1 point
Captionless Image
Q110: John the hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct a MiTM attack. What is the destination MAC address of a broadcast frame? *
1 point
Next
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy