Wednesday 2 October 2019

CEH Exam Help

CEH Exam help


Hi everyone, are you looking to enhance your career in security and want to pass CEH Certification, than you have to come to the right place. 

We can help you pass your exam by providing 100% relevant exam material. Below are some sample questions for you. If you are looking for complete set of question drop an email on examdumps2019@yahoo.com.


SAMPLE CEH Questions



Question No. 1

The systems administrator for one of your clients has just called you, explaining that one of their critical servers has been breached. You let her know that your incident response team is on the way, and instruct her not to power off the compromised system at this time.

A.      Actually, the correct procedure in this case is to power off the server. This helps prevent the attacker from spreading deeper into the network.

B.      The incident response team needs to retrieve information stored in volatile memory such as RAM.

C.      The attacker may have placed a logic bomb, which will trigger when the shutdown command is issued.

D.      This will alert the attacker that they've been discovered, prompting them to delete data or install ransomware before their foothold in the network is severed.

Answer: B

Question No. 2

While scanning with Nmap, Patin found several hosts which have the IP ID sequence of incremental. He then decided to conduct: nmap -Pn -p- -sI kiosk.adobe.com www.riaa.com Whereas kiosk.adobe.com is the host with incremental IP ID sequence. What is the purpose of using "-sI" with Nmap?

A.      Conduct silent scan

A.

B.      Conduct stealth scan

B.

C.      Conduct ICMP scan

C.

D.      Conduct IDLE scan

D.

Answer: D

Question No. 3

Using spoofed IP address to generate port responses during a scan while using a SYN flag is a technique related to:

A.      IDLE (side-channel)

A.

B.      SYN

B.

C.      XMAS

C.

D.      FIN

D.

Answer: A

Question No 4

OpenSSL on Linux servers includes a command line tool for testing TLS.  What is the name of the tool and the correct syntax to connect to a web server?

A.      openssl_client -site www.website.com:443

A.

B.      openssl_client -connect www.website.com:443

B.

C.      openssl s_client -connect www.website.com:443

C.

D.      openssl s_client -site www.website.com:443

D.

Answer: C

Question No. 5

Nedved is an IT Security Manager of a Bank in his country. One day, he found out that there is a security breach to his company's email server based on analysis of a suspicious connection from the email server to an unknown IP Address.

What is the first thing that Nedved needs to do before contacting the incident response team?

A.      Leave it be and contacts the incident response team right away

A.

B.      Disconnects the email server from the network

B.

C.      Migrate the connection to the backup email server

C.

D.      Blocks the connection to the suspicious IP Address from the firewall

Answer: D