Certified Ethical Hacker Exam V9 v7.0

Page:    1 / 9   
Exam contains 125 questions

Session splicing is an IDS evasiontechnique in which an attacker delivers data in multiple, smallsized packets to the target computer, making it very difficult for an IDS to detect the attack signatures.
Which tool can used to perform session splicing attacks?

  • A. Hydra
  • B. Burp
  • C. Whisker
  • D. Tcpsplice


Answer : C

To maintain compliance with regulatory requirements, a security audit of the systems on a network must be performed to determine their compliance with security policies. Which one of the following tools would most likely be used in such as audit?

  • A. Port scanner
  • B. Protocol analyzer
  • C. Vulnerability scanner
  • D. Intrusion Detection System


Answer : C

When you are collecting information to perform a dataanalysis, Google commands are very useful to find sensitive information and files. These files may contain information about passwords, system functions, or documentation.
What command will help you to search files using Google as a search engine?

  • A. site:target.com file:xls username password email
  • B. domain: target.com archive:xls username password email
  • C. site: target.com filetype:xls username password email
  • D. inurl: target.com filename:xls username password email


Answer : C

Which of the following is a design pattern based on distinct pieces ofsoftware providing application functionality as services to other applications?

  • A. Lean Coding
  • B. Service Oriented Architecture
  • C. Object Oriented Architecture
  • D. Agile Process


Answer : B

You just set up a security system in your network. In what kind of system would you find thefollowing string of characters used as a rule within its configuration? alert tcp any any ->192.168.100.0/24 21 (msg: "FTP on the network!";)

  • A. A firewall IPTable
  • B. A Router IPTable
  • C. An Intrusion Detection System
  • D. FTP Server rule


Answer : C

Which of the followingis the least-likely physical characteristic to be used in biometric control that supports a large company?

  • A. Iris patterns
  • B. Voice
  • C. Fingerprints
  • D. Height and Weight


Answer : D

What is the process of logging, recording, and resolving events that take place in an organization?

  • A. Metrics
  • B. Security Policy
  • C. Internal Procedure
  • D. Incident Management Process


Answer : D

Which of the following is an extremelycommon IDS evasion technique in the web world?

  • A. post knocking
  • B. subnetting
  • C. unicode characters
  • D. spyware


Answer : C

Jesse receives an email with an attachment labeled Court_Notice_21206.zip. Inside the zip file is a file named Court_Notice_21206.docx.exe disguised as a word document.Upon execution, a windows appears stating, This word document is corrupt. In the background, the file copies itself to Jesse APPDATA\local directory and begins to beacon to a C2 server to download additional malicious binaries. What type of malware has Jesse encountered?

  • A. Trojan
  • B. Worm
  • C. Key-Logger
  • D. Micro Virus


Answer : A

It isan entity or event with the potential to adversely impact a system through unauthorized access destruction disclosures denial of service or modification of data.
Which of the following terms best matches this definition?

  • A. Threat
  • B. Attack
  • C. Risk
  • D. Vulnerability


Answer : A

An attacker changes the profile information of a particular user on a target website (the victim). The attacker uses this string to update the victim's profile to a text file and then submit the data to the attackers database.
<frame src=http://www/vulnweb.com/updataif.php Style=display:none></iframe>
What is this type of attack (that can use either HTTP GET or HRRP POST) called?

  • A. Cross-Site Request Forgery
  • B. Cross-Site Scripting
  • C. SQL Injection
  • D. Browser Hacking


Answer : A

After trying multiple exploits, youve gained root access to a Centos 6 answer. To ensure you maintain access. What would you do first?

  • A. Disable IPTables
  • B. Create User Account
  • C. Downloadand Install Netcat
  • D. Disable Key Services


Answer : C

Which of the followingtypes of firewalls ensures that the packets are part of the established session?

  • A. Switch-level firewall
  • B. Stateful inspection firewall
  • C. Application-level firewall
  • D. Circuit-level firewall


Answer : B

You are usingNMAP to resolve domain names into IP addresses for a ping sweep later.
Which of the following commands looks for IP addresses?

  • A. >host –t ns hackeddomain.com
  • B. >host –t AXFR hackeddomain.com
  • C. >host –t soa hackeddomain.com
  • D. >host –t a hackeddomain.com


Answer : D

Your company performs penetration tests and security assessments for small and medium- sized business in the local area. During a routine security assessment, you discover information that suggests your client is involved with human trafficking.
What should you do?

  • A. Copy the data to removable media and keep it in case you need it.
  • B. Ignore the data and continue the assessment until completed as agreed.
  • C. Confront theclient on a respectful manner and ask her about the data.
  • D. Immediately stop work and contact the proper legal authorities.


Answer : D

Page:    1 / 9   
Exam contains 125 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy