CEH 312-50 v9

Exit

Question 1 of 1

  Time Left


0 [{"id":184933,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:35:02","updated_at":"2017-04-01 19:00:58","questionName":"What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the received response?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184930,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:29:26","updated_at":"2017-04-01 19:00:58","questionName":"The following is a sample of output from a penetration tester's machine targeting a machine with the IP address of 192.168.1.106: What is most likely taking place?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":"uploads\/ceh-312-50-v9\/q12.jpg","position":11,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184918,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:12:59","updated_at":"2017-04-01 19:00:58","questionName":"Which of the following is a hardware requirement that either an IDS\/IPS system or a proxy server must have in order to properly function?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":"Answer: B Explanation: Dual-homed or dual-homing can refer to either an Ethernet device that has more than one network interface, for redundancy purposes, or in firewall technology, dual-homed is one of the firewall architectures, such as an IDS\/IPS syste","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184925,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:23:47","updated_at":"2017-04-01 19:00:58","questionName":"Which of the following programs is usually targeted at Microsoft Office products?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":"A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications). Some applications, such as Microsoft Office, allow macro programs to","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184921,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:20:08","updated_at":"2017-04-01 19:00:58","questionName":"A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":"Answer: B Explanation: Blackberry users warned of hacking tool threat. Users have been warned that the security of Blackberry wireless e-mail devices is at risk due to the availability this week of a new hacking tool. Secure Computing Corporation said b","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184929,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:26:50","updated_at":"2017-04-01 19:00:58","questionName":"How can rainbow tables be defeated?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184928,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:26:14","updated_at":"2017-04-01 19:00:58","questionName":"Passive reconnaissance involves collecting information through which of the following?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184931,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:32:05","updated_at":"2017-04-01 19:00:58","questionName":"An NMAP scan of a server shows port 25 is open. What risk could this pose?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184927,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:25:24","updated_at":"2017-04-01 19:00:58","questionName":"In order to show improvement of security over time, what must be developed?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":"Today, management demands metrics to get a clearer view of security. Metrics that measure participation, effectiveness, and window of exposure, however, offer information the organization can use to make plans and improve programs. ","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184932,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:34:31","updated_at":"2017-04-01 19:00:58","questionName":"A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the Operating System (OS) version installed. Considering the NMAP result below, which of the following is likely to be installed on the target machine by the OS? Starting NMAP 5.21 at 2011-03-15 11:06 NMAP scan report for 172.16.40.65 Host is up (1.00s latency). Not shown: 993 closed ports PORT STATE SERVICE 21\/tcp open ftp 23\/tcp open telnet 80\/tcp open http 139\/tcp open netbios-ssn 515\/tcp open 631\/tcp open ipp 9100\/tcp open MAC Address: 00:00:48:0D:EE:89 ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184922,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:20:50","updated_at":"2017-04-01 19:00:58","questionName":"Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":"Answer: B Explanation: A full restore is required.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184924,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:22:48","updated_at":"2017-04-01 19:00:58","questionName":"Which statement is TRUE regarding network firewalls preventing Web Application attacks?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":"Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP\/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set. To prevent Web Application attacks an Applic","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184926,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:24:44","updated_at":"2017-04-01 19:00:58","questionName":"Bluetooth uses which digital modulation technique to exchange information between paired devices?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":"Phase shift keying is the form of Bluetooth modulation used to enable the higher data rates achievable with Bluetooth 2 EDR (Enhanced Data Rate). Two forms of PSK are used: \/4 DQPSK, and 8DPSK. ","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184923,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:22:02","updated_at":"2017-04-01 19:00:58","questionName":" Which of the following describes the characteristics of a Boot Sector Virus?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":"Answer: B Explanation: A boot sector virus is a computer virus that infects a storage device's master boot record (MBR). The virus moves the boot sector to another location on the hard drive. ","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":184920,"quiz_id":"11200","answer_id":null,"answerType_id":"0","created_at":"2017-04-01 14:19:21","updated_at":"2017-04-01 19:00:58","questionName":"Which of the following is an application that requires a host application for replication?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":"Answer: D Explanation: Computer viruses infect a variety of different subsystems on their hosts. A computer virus is a malware that, when executed, replicates by reproducing it self or infecting other programs by modifying them. Infecting computer program","question_score_id":null,"lang":null,"questionAudioPath":null}]
184933
0
120
block

What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the received response?

Select the Correct Answers  

(0/0)












184930
0
120
none
184918
0
120
none
184925
0
120
none
184921
0
120
none
184929
0
120
none
184928
0
120
none
184931
0
120
none
184927
0
120
none
184932
0
120
none
184922
0
120
none
184924
0
120
none
184926
0
120
none
184923
0
120
none
184920
0
120
none