Certified Ethical Hacker Practice Exam - Part l
Version: 3.0
Sign in to Google to save your progress. Learn more
Email *
Write down your name. *
Write down your contact number. *
Q1: Which of the following countermeasure can specifically protect against both the MAC Flood andMAC Spoofing attacks? *
1 point
Q2: Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines to create or alter SQL commands to gain access to private data or execute commands in the database. What technique does Jimmy use to compromise a database? *
1 point
Q3: This IDS defeating technique works by splitting a datagram (or packet) into multiple fragments and the IDS will not spot the true nature of the fully assembled datagram. The datagram is not reassembled until it reaches its final destination. It would be a processor-intensive task for IDS to reassemble all fragments itself, and on a busy system, the packet will slip through the IDS onto the network. What is this technique called? *
1 point
Q4: *
1 point
Captionless Image
Q5: This type of Port Scanning technique splits the TCP header into several packets so that the packet filters are not able to detect what the packets intend to do. *
1 point
Q6: Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in order to find some information about the target they are attempting to penetrate. How would you call this type of activity? *
1 point
Q7: Anonymizer sites access the Internet on your behalf, protecting your personal information from disclosure. An anonymizer protects all of your computer's identifying information while it surfs for you, enabling you to remain at least one step removed from the sites you visit. You can visit Web sites without allowing anyone to gather information on sites visited by you. Services that provide anonymity disable pop-up windows and cookies and conceal visitor's IP addresses. These services typically use a proxy server to process each HTTP request. When the user requests a Web page by clicking a hyperlink or typing a URL into their browser, the service retrieves and displays the information using its own server. The remote server (where the requested Web page resides) receives information on the anonymous Web surfing service in place of your information. In which situations would you want to use an anonymizer? (Select 3 answers) *
1 point
Required
Q8: *
1 point
Captionless Image
Q9: Jack Hacker wants to break into Brown Co.'s computers and obtain their secret double fudge cookie recipe. Jack calls Jane, an accountant at Brown Co., pretending to be an administrator from Brown Co. Jack tells Jane that there has been a problem with some accounts and asks her to verify her password with him ''just to double-check our records.'' Jane does not suspect anything amiss, and parts with her password. Jack can now access Brown Co.'s computers with a valid user name and password, to steal the cookie recipe. What kind of attack is being illustrated here? *
1 point
Q10: How do you defend against ARP Spoofing? Select three. *
1 point
Required
Next
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy