Certified Ethical Hacker Practice Exam - Part Vlll
Volume H
Sign in to Google to save your progress. Learn more
Email *
Write down your name. *
Write down contact your  number *
Q701: What do you call a system where users need to remember only one username and password and be authenticated for multiple services? *
1 point
Q702: Clive has been monitoring his IDS and sees that there are a huge number of ICMP Echo Reply packets that are being received on the external gateway interface. Further inspection reveals that they are not responses from the internal hosts’ requests but simply responses coming from theInternet.What could be the most likely cause? *
1 point
Q703: What would best be defined as a security test on services against a known vulnerability database using an automated tool? *
1 point
Q704: A Buffer Overflow attack involves: *
1 point
Q705: When working with Windows systems, what is the RID of the true administrator account? *
1 point
Q706: If you send an SYN to an open port, what is the correct response? (Choose all correct answers. *
1 point
Required
Q707: When working with Windows systems, what is the RID of the true administrator account? *
1 point
Q708: You have been called to investigate a sudden increase in network traffic at XYZ. It seems that the traffic generated was too heavy that normal business functions could no longer be rendered to external employees and clients. After a quick investigation, you find that the computer has services running attached to TFN2k and Trinoo software. What do you think was the most likely cause behind this sudden increase in traffic? *
1 point
Q709: Henry is an attacker and wants to gain control of a system and use it to flood a target system with requests, so as to prevent legitimate users from gaining access. What type of attack is Henryusing? *
1 point
Q710: Eve decides to get her hands dirty and tries out a Denial of Service attack that is relatively new to her. This time she envisages using a different kind of method to attack Brownies Inc. Eve tries to forge the packets and uses the broadcast address. She launches an attack similar to that of Fraggle. What is the technique that Eve used in the case above? *
1 point
Next
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy