Certified Ethical Hacker Practice Exam - Part lll
Sign in to Google to save your progress. Learn more
Email *
Write down your name. *
Write down your contact number. *
Q201: To see how some of the hosts on your network react, Winston sends out SYN packets to an IP range. A number of IPs respond with an SYN/ACK response. Before the connection is established he sends RST packets to those hosts to stop the session. Winston has done this to see how his intrusion detection system will log the traffic. What type of scan is Winston attempting here? *
1 point
Q202: John runs a Web server, IDS, and firewall on his network. Recently his Web server has been under constant hacking attacks. He looks up the IDS log files and sees no intrusion attempts but the webserver constantly locks up and needs rebooting due to various brute force and buffer-overflow attacks but still, the IDS alerts no intrusion whatsoever. John becomes suspicious and views the Firewall logs and he notices huge SSL connections constantly hitting his Web server. Hackers have been using the encrypted HTTPS protocol to send exploits to the Web server and that was the reason the IDS did not detect the intrusions. How would John protect his network from these types of attacks? *
1 point
Q203: Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be monitoring the communication link and could inspect captured traffic. She would like to tunnel the information to the remote end but does not have VPN capabilities todo so. Which of the following tools can she use to protect the link? *
1 point
Q204: NTP allows you to set the clocks on your systems very accurately, to within 100ms and sometimes-even 10ms. Knowing the exact time is extremely important for enterprise security. Various security protocols depend on an accurate source of time information in order to prevent"playback" attacks. These protocols tag their communications with the current time, to prevent attackers from replaying the same communications, e.g., a login/password interaction or even an entire communication, at a later date. One can circumvent this tagging if the clock can be set back to the time the communication was recorded. An attacker attempts to try corrupting the clocks on devices on your network. You run Wireshark to detect the NTP traffic to see if there are any irregularities on the network. What port number you should enable in the Wireshark display filter to view NTP packets? *
1 point
Q205: Bill is a security analyst for his company. All the switches used in the company's office are Cisco switches. Bill wants to make sure all switches are safe from ARP poisoning. How can Billaccomplish this? *
1 point
Q206: *
1 point
Captionless Image
Q207: Which type of password cracking technique works like a dictionary attack but adds some numbers and symbols to the words from the dictionary and tries to crack the password? *
1 point
Q208: *
1 point
Captionless Image
Q209: What do you call a pre-computed hash? *
1 point
Q210: Why attackers use proxy servers? *
1 point
Next
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy