CEH: Ch. 2

Exit

Question 1 of 1

  Time Left


0 [{"id":412339,"quiz_id":"20964","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 18:37:48","updated_at":"2018-03-21 18:38:42","questionName":"Which OS holds 90 percent of the desktop market and is one of our largest attack surfaces?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":2,"explanation":"Windows remains king for sheer volume and presence on desktop and servers.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412337,"quiz_id":"20964","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 18:37:48","updated_at":"2018-03-21 18:38:42","questionName":"At which layer of the OSI model does a proxy operate?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":0,"explanation":"Proxies operate at Layer 7, the Application layer of the OSI model. Proxies are capable of filtering network traffic based on content such as keywords and phrases. Because of this, a proxy digs down farther than a packet\u2019s header and reviews the data within the packet as well.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412342,"quiz_id":"20964","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 18:37:48","updated_at":"2018-03-21 18:38:42","questionName":"Which network topology uses a token-based access methodology?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":5,"explanation":"Token ring networks use a token-based access methodology. Each node connected to the network must wait for possession of the token before it can send traffic via the ring.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412351,"quiz_id":"20964","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 18:37:48","updated_at":"2018-03-21 18:38:42","questionName":"When scanning a network via a hardline connection to a wired-switch NIC in promiscuous mode, what would be the extent of network traffic you would expect to see?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":14,"explanation":"Because each switchport is its own collision domain, only nodes that reside on the same switchport will be seen during a scan.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412346,"quiz_id":"20964","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 18:37:48","updated_at":"2018-03-21 18:38:42","questionName":"A scan of a network client shows that port 23 is open; what protocol is this aligned with?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":9,"explanation":"Port 23 is used for Telnet traffic.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412343,"quiz_id":"20964","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 18:37:48","updated_at":"2018-03-21 18:38:42","questionName":"Hubs operate at what layer of the OSI model?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":6,"explanation":"Hubs operate at Layer 1, the Physical layer of the OSI model. Hubs simply forward the data they receive. There is no filtering or directing of traffic; thus, they are categorized at Layer 1.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412341,"quiz_id":"20964","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 18:37:48","updated_at":"2018-03-21 18:38:42","questionName":"What kind of domain resides on a single switchport?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":4,"explanation":"Each port on a switch represents a collision domain.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412348,"quiz_id":"20964","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 18:37:48","updated_at":"2018-03-21 18:38:42","questionName":"Which category of firewall filters is based on packet header data only?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":11,"explanation":"Packet-filtering firewalls inspect solely the packet header information.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412345,"quiz_id":"20964","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 18:37:48","updated_at":"2018-03-21 18:38:42","questionName":"Which of these protocols is a connection-oriented protocol?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":8,"explanation":"Transmission Control Protocol (TCP) is a connection-oriented protocol that uses the three-way-handshake to confirm that a connection is established. FTP and POP3 use connections, but they are not connection-oriented protocols.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412340,"quiz_id":"20964","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 18:37:48","updated_at":"2018-03-21 18:38:42","questionName":"Which port uses SSL to secure web traffic?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":3,"explanation":"Port 443 is used for HTTPS traffic, which is secured by SSL.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412338,"quiz_id":"20964","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 18:37:48","updated_at":"2018-03-21 18:38:42","questionName":"If a device is using node MAC addresses to funnel traffic, what layer of the OSI model is this device working in?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":1,"explanation":"A network device that uses MAC addresses for directing traffic resides on Layer 2 of the OSI model. Devices that direct traffic via IP addresses, such as routers, work at Layer 3.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412349,"quiz_id":"20964","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 18:37:48","updated_at":"2018-03-21 18:38:42","questionName":"An administrator has just been notified of irregular network activity; what appliance functions in this manner?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":12,"explanation":"Intrusion detection systems (IDSs) react to irregular network activity by notifying support staff of the incident; however, unlike IPSs, they do not proactively take steps to prevent further activity from occurring.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412347,"quiz_id":"20964","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 18:37:48","updated_at":"2018-03-21 18:38:42","questionName":"What port range is an obscure third-party application most likely to use?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":10,"explanation":"Ports 49152 to 65535 are known as the dynamic ports and are used by applications that are neither well known nor registered. The dynamic range is essentially reserved for those applications that are not what we would consider mainstream. Although obscure in terms of port usage, repeated showings of the same obscure port during pen testing or assessment may be indicative of something strange going on.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412344,"quiz_id":"20964","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 18:37:48","updated_at":"2018-03-21 18:38:42","questionName":"What is the proper sequence of the TCP three-way-handshake?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":7,"explanation":"Remember this three-way handshake sequence; you will see it quite a bit in packet captures when sniffing the network. Being able to identify the handshake process allows you to quickly find the beginning of a data transfer.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412350,"quiz_id":"20964","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 18:37:48","updated_at":"2018-03-21 18:38:42","questionName":"Which topology has built-in redundancy because of its many client connections?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":13,"explanation":"A true mesh topology creates a natural amount of redundancy due to the number of connections used to establish connectivity.","question_score_id":null,"lang":null,"questionAudioPath":null}]
412339
0
60
block

Which OS holds 90 percent of the desktop market and is one of our largest attack surfaces?

Select the Correct Answers  

(0/0)












412337
0
60
none
412342
0
60
none
412351
0
60
none
412346
0
60
none
412343
0
60
none
412341
0
60
none
412348
0
60
none
412345
0
60
none
412340
0
60
none
412338
0
60
none
412349
0
60
none
412347
0
60
none
412344
0
60
none
412350
0
60
none