Wednesday 13 December 2017

CEH Exam Questions (December 2017)

CEH (Latest Exam Questions)


For Full List Email us at moonintdubai@gmail.com

1.         It has been reported to you that someone has caused an information spillage on their computer. You go to the computer, disconnect it from the network, remove the keyboard and mouse, and power it down. What step in incident handling did you just complete?
A.    Discovery
B.     Recovery
C.     Containment
D.    Eradication
C
Internet Protocol Security IPSec is actually a suite of protocols. Each protocol within the suite provides different functionality. Collective IPSec does everything except.
A.    Authenticate
B.     Protect the payload and the headers
C.     Work at the Data Link Layer
D.    Encrypt
C
Which Intrusion Detection System is best applicable for large environments where critical assets on the network need extra scrutiny and is ideal for observing sensitive network segments?

A.    Network-based intrusion detection system (NIDS)

B.     Honeypots

C.     Host-based intrusion detection system (HIDS)

D.    Firewalls
A
When you are testing a web application, it is very useful to employ a proxy tool to save every request and response. You can manually test every request and analyze the response to find vulnerabilities. You can test parameter and headers manually to get more precise results than if using web vulnerability scanners.
What proxy tool will help you find web vulnerabilities?

A.    Dimitry

B.     Burpsuite

C.     Maskgen

D.    Proxychains
B
Which one of the following Google advanced search operators allows an attacker to restrict the results to those websites in the given domain?

A.    [link:]

B.     [site:]

C.     [cache:]

D.    [inurl:]
B


1 comment:

  1. Great Information sharing.I am very happy to read this article .. thanks for giving us go through info. Fantastic nice. I appreciate this post Cyber Monday Hosting Deals 2020

    ReplyDelete