CEH 312-50 v9

Exit

Question 1 of 1

  Time Left


0 [{"id":184928,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:26:14","updated_at":"2017-04-01 19:00:58","questionName":"Passive reconnaissance involves collecting information through which of the following?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184927,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:25:24","updated_at":"2017-04-01 19:00:58","questionName":"In order to show improvement of security over time, what must be developed?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":"Today, management demands metrics to get a clearer view of security. Metrics that measure participation, effectiveness, and window of exposure, however, offer information the organization can use to make plans and improve programs. ","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184931,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:32:05","updated_at":"2017-04-01 19:00:58","questionName":"An NMAP scan of a server shows port 25 is open. What risk could this pose?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184924,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:22:48","updated_at":"2017-04-01 19:00:58","questionName":"Which statement is TRUE regarding network firewalls preventing Web Application attacks?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":"Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP\/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set. To prevent Web Application attacks an Applic","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184920,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:19:21","updated_at":"2017-04-01 19:00:58","questionName":"Which of the following is an application that requires a host application for replication?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":"Answer: D Explanation: Computer viruses infect a variety of different subsystems on their hosts. A computer virus is a malware that, when executed, replicates by reproducing it self or infecting other programs by modifying them. Infecting computer program","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184922,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:20:50","updated_at":"2017-04-01 19:00:58","questionName":"Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":"Answer: B Explanation: A full restore is required.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184923,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:22:02","updated_at":"2017-04-01 19:00:58","questionName":" Which of the following describes the characteristics of a Boot Sector Virus?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":"Answer: B Explanation: A boot sector virus is a computer virus that infects a storage device's master boot record (MBR). The virus moves the boot sector to another location on the hard drive. ","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184926,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:24:44","updated_at":"2017-04-01 19:00:58","questionName":"Bluetooth uses which digital modulation technique to exchange information between paired devices?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":"Phase shift keying is the form of Bluetooth modulation used to enable the higher data rates achievable with Bluetooth 2 EDR (Enhanced Data Rate). Two forms of PSK are used: \/4 DQPSK, and 8DPSK. ","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184929,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:26:50","updated_at":"2017-04-01 19:00:58","questionName":"How can rainbow tables be defeated?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184932,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:34:31","updated_at":"2017-04-01 19:00:58","questionName":"A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the Operating System (OS) version installed. Considering the NMAP result below, which of the following is likely to be installed on the target machine by the OS? Starting NMAP 5.21 at 2011-03-15 11:06 NMAP scan report for 172.16.40.65 Host is up (1.00s latency). Not shown: 993 closed ports PORT STATE SERVICE 21\/tcp open ftp 23\/tcp open telnet 80\/tcp open http 139\/tcp open netbios-ssn 515\/tcp open 631\/tcp open ipp 9100\/tcp open MAC Address: 00:00:48:0D:EE:89 ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184933,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:35:02","updated_at":"2017-04-01 19:00:58","questionName":"What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the received response?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184921,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:20:08","updated_at":"2017-04-01 19:00:58","questionName":"A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":"Answer: B Explanation: Blackberry users warned of hacking tool threat. Users have been warned that the security of Blackberry wireless e-mail devices is at risk due to the availability this week of a new hacking tool. Secure Computing Corporation said b","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184930,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:29:26","updated_at":"2017-04-01 19:00:58","questionName":"The following is a sample of output from a penetration tester's machine targeting a machine with the IP address of 192.168.1.106: What is most likely taking place?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":"uploads\/ceh-312-50-v9\/q12.jpg","position":11,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184925,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:23:47","updated_at":"2017-04-01 19:00:58","questionName":"Which of the following programs is usually targeted at Microsoft Office products?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":"A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications). Some applications, such as Microsoft Office, allow macro programs to","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184918,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:12:59","updated_at":"2017-04-01 19:00:58","questionName":"Which of the following is a hardware requirement that either an IDS\/IPS system or a proxy server must have in order to properly function?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":"Answer: B Explanation: Dual-homed or dual-homing can refer to either an Ethernet device that has more than one network interface, for redundancy purposes, or in firewall technology, dual-homed is one of the firewall architectures, such as an IDS\/IPS syste","question_score_id":null,"lang":null,"questionAudioPath":null}]
184928
0
120
block

Passive reconnaissance involves collecting information through which of the following?

Select the correct answer(s).  

(0/0)












184927
0
120
none
184931
0
120
none
184924
0
120
none
184920
0
120
none
184922
0
120
none
184923
0
120
none
184926
0
120
none
184929
0
120
none
184932
0
120
none
184933
0
120
none
184921
0
120
none
184930
0
120
none
184925
0
120
none
184918
0
120
none