CCEH TEST
==================================================================================
Q1 Virtual Private Network and proxy servers?(Advantage and Disadvantage) 5marks
Q2 Vpn and its protocols describe in brief? 5marks
Q3 Types of area networks & there examples? 3marks
Q4 Hypothetically, you are supposed to hack a system, how would you do it? 5marks
Q5 How can you manage your digital footprint? 2marks
Q6 What do you understand by footprinting in ethical hacking? What are the techniques utilized for
foot printing? 3marks
Q7 What do you mean by Trojan and explain its types? 5marks
Q8 What is enumeration in ethical hacking & What are the different enumerations available in
ethical hacking? 5marks
Q9 Can you protect yourself from being hacked? How? 2marks
Q10 What is the LOOPBACK address? 1marks
Q11 What is used of Tracert? 1marks
Q12 What protocol is used by PING? 1marks
Q13 What do you mean by IP address , Mac address and ARP? Explain in detail. 3marks
Q14 What is the name of the technique that “Search Engines” use to retrieve this information about
websites? 1marks
Q15 What is an example of the type of contents that could be gathered from a website? 1marks
Q16 Where would “robots.txt” be located on the domain “ablog.com” 1marks
Q17 If a website was to have a sitemap, where would that be located? 1marks
Q18 How would we only allow “Bingbot” to index the website? 1marks
Q19 How would we prevent a “Crawler” from indexing the directory “/dont-index-me/”?1marks
Q20 What is Wireshark? How would you setup wireshark to monitor packets passing through an
internet router 5marks
Q21 How do you deal with “Man In The Middle” attacks? 5marks
Q22 Name the three means of user authentication. 3marks
Q23 Explain these virus in detail :- 9marks
1 boot sector virus
2 file virus
3 macro virus
4 cluster virus
5 stealth virus
6 logic bomb
7 encryption virus
8 metamorphic virus
9 shell virus
Q24 Explain Ransomwares and Prevention Approach? 2marks
Q25 What is the importance of using Meterpreter instead of a standard command line shell?
5marks
Q26 What is msfvenom? What is its purpose? 5marks
Q27 What’s the difference between an exploit and auxiliary module? 2marks
Q28 What is sql injection and types and steps to do it? 5marks
Q28 What is xss ? types ? steps to do it ? explain javascript? 5marks
MCQ Each Carrying 1 Mark
1. Which wireless mode connects machines directly to one another, without the
use of an access point?
A. Point to point
B. Infrastructure
C. Ad hoc
D. BSS
2. What is the preferred communications method used with systems on a bot-
net?
A. IRC
B. E-mail
C. ICMP
D. TFTP
3 ____is the art of exploiting the human elements to gain access to un-
authorized resources
A. Organization
B. Social Engineering
C. Hacking
D. Reverse Engineering
4. What does the TCP RST command do?
A. Restores the connection to a previous state
B. Finishes TCP connections
C. Resets the TCP connection
D. Starts a TCP connection
5 A packet with all flags set is which type of scan?
A. Full Open
B. XMAS
C. TCP connect
D. Syn scan
6 Which tool can be used to perform a DNS zone transfer on Windows?
A. DNS lookup
B. nslookup
C. whois
D. ipconfig
7 What does the term "Ethical Hacking" mean?
A. Someone who is using his/her skills for defensive purposes.
B. Someone who is hacking for ethical reasons
C. Someone who is using his/her skills for ethical reasons.
D. Someone who is using his/her skills for offensive purposes
8 Which character is typically used first by the penetration tester?
A. Semicolon
B. Dollar sign
C. Single quote
D. None of the above
9 At which layer of the OSI communication model dose bridge operate?
A. Transport
B. Datalink
C. Network
D. Physica
10 The First Computer Virus is _____________
1. Sasser
2. Creeper
3. Blaster
4. I Love You
11 What is the Maximum character Linux supports in its filenames?
1. 8
2. 128
3. 256
4. Unlimited
12 A DNS translates a domain name into what ?
1. Binary
2. Hex
3. IP
4. URL
13 Data ________is used to ensure confidentiality.
1. Encryption
2. Locking
3. Deleting
4. Backup
14 ________ is one of the most secured Linux OS that provides anonymity and
incognito option for securing its user data.
1. Fedora
2. Tails
3. Ubuntu
4. OpenSUSE
15 Which of the following OS does not comes under a secured Linux OS list ?
1. Qubes OS
2. Tails
3. Tin Hat
4. Ubuntu
16 From where the term ‘hacker’ first cam to existence ?
1. MIT
2. Stanford University
3. California
4. Bell’s Lab
17 ___________ has now evolved to be one of the most popular automated tools
for unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
18 An unauthorized individual enters a building following an employee through the
employee entrance after the lunch rush. What type of breach has the individual just
performed?
A. Reverse Social Engineering
B. Tailgating
C. Piggybacking
D. Announced
19 Which of the following is the best countermeasure to encrypting ransomwares?
A. Use multiple antivirus softwares
B. Keep some generation of off-line backup
C. Analyze the ransomware to get decryption key of encrypted data
D. Pay a ransom
20 What is the purpose of a demilitarized zone on a network?
A. To scan all traffic coming through the DMZ to the internal network
B. To only provide direct access to the nodes within the DMZ and protect the network behind
it
C. To provide a place to put the honeypot
D. To contain the network devices you wish to protect