0% found this document useful (0 votes)
30 views5 pages

Cceh Test (10-12)

The document is a test covering various topics in cybersecurity, including VPNs, hacking techniques, network protocols, and ethical hacking concepts. It consists of multiple-choice questions, short answer questions, and detailed explanations on subjects like viruses, ransomware, and user authentication. The test assesses knowledge on both theoretical and practical aspects of ethical hacking and network security.

Uploaded by

mansidayal654
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views5 pages

Cceh Test (10-12)

The document is a test covering various topics in cybersecurity, including VPNs, hacking techniques, network protocols, and ethical hacking concepts. It consists of multiple-choice questions, short answer questions, and detailed explanations on subjects like viruses, ransomware, and user authentication. The test assesses knowledge on both theoretical and practical aspects of ethical hacking and network security.

Uploaded by

mansidayal654
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

CCEH TEST

==================================================================================

Q1 Virtual Private Network and proxy servers?(Advantage and Disadvantage) 5marks

Q2 Vpn and its protocols describe in brief? 5marks

Q3 Types of area networks & there examples? 3marks

Q4 Hypothetically, you are supposed to hack a system, how would you do it? 5marks

Q5 How can you manage your digital footprint? 2marks

Q6 What do you understand by footprinting in ethical hacking? What are the techniques utilized for

foot printing? 3marks

Q7 What do you mean by Trojan and explain its types? 5marks

Q8 What is enumeration in ethical hacking & What are the different enumerations available in
ethical hacking? 5marks

Q9 Can you protect yourself from being hacked? How? 2marks

Q10 What is the LOOPBACK address? 1marks

Q11 What is used of Tracert? 1marks

Q12 What protocol is used by PING? 1marks

Q13 What do you mean by IP address , Mac address and ARP? Explain in detail. 3marks

Q14 What is the name of the technique that “Search Engines” use to retrieve this information about

websites? 1marks

Q15 What is an example of the type of contents that could be gathered from a website? 1marks

Q16 Where would “robots.txt” be located on the domain “ablog.com” 1marks

Q17 If a website was to have a sitemap, where would that be located? 1marks

Q18 How would we only allow “Bingbot” to index the website? 1marks

Q19 How would we prevent a “Crawler” from indexing the directory “/dont-index-me/”?1marks

Q20 What is Wireshark? How would you setup wireshark to monitor packets passing through an
internet router 5marks

Q21 How do you deal with “Man In The Middle” attacks? 5marks

Q22 Name the three means of user authentication. 3marks


Q23 Explain these virus in detail :- 9marks

1 boot sector virus

2 file virus

3 macro virus

4 cluster virus

5 stealth virus

6 logic bomb

7 encryption virus

8 metamorphic virus

9 shell virus

Q24 Explain Ransomwares and Prevention Approach? 2marks

Q25 What is the importance of using Meterpreter instead of a standard command line shell?
5marks

Q26 What is msfvenom? What is its purpose? 5marks

Q27 What’s the difference between an exploit and auxiliary module? 2marks

Q28 What is sql injection and types and steps to do it? 5marks

Q28 What is xss ? types ? steps to do it ? explain javascript? 5marks

MCQ Each Carrying 1 Mark

1. Which wireless mode connects machines directly to one another, without the
use of an access point?

A. Point to point
B. Infrastructure
C. Ad hoc
D. BSS
2. What is the preferred communications method used with systems on a bot-
net?
A. IRC
B. E-mail
C. ICMP
D. TFTP
3 ____is the art of exploiting the human elements to gain access to un-
authorized resources

A. Organization
B. Social Engineering

C. Hacking

D. Reverse Engineering

4. What does the TCP RST command do?


A. Restores the connection to a previous state
B. Finishes TCP connections
C. Resets the TCP connection
D. Starts a TCP connection

5 A packet with all flags set is which type of scan?

A. Full Open
B. XMAS
C. TCP connect
D. Syn scan

6 Which tool can be used to perform a DNS zone transfer on Windows?

A. DNS lookup
B. nslookup
C. whois
D. ipconfig

7 What does the term "Ethical Hacking" mean?

A. Someone who is using his/her skills for defensive purposes.


B. Someone who is hacking for ethical reasons
C. Someone who is using his/her skills for ethical reasons.
D. Someone who is using his/her skills for offensive purposes

8 Which character is typically used first by the penetration tester?

A. Semicolon
B. Dollar sign
C. Single quote
D. None of the above
9 At which layer of the OSI communication model dose bridge operate?
A. Transport
B. Datalink
C. Network
D. Physica

10 The First Computer Virus is _____________

1. Sasser
2. Creeper
3. Blaster
4. I Love You

11 What is the Maximum character Linux supports in its filenames?

1. 8
2. 128
3. 256
4. Unlimited

12 A DNS translates a domain name into what ?

1. Binary
2. Hex
3. IP
4. URL

13 Data ________is used to ensure confidentiality.

1. Encryption
2. Locking
3. Deleting
4. Backup

14 ________ is one of the most secured Linux OS that provides anonymity and
incognito option for securing its user data.

1. Fedora
2. Tails
3. Ubuntu
4. OpenSUSE

15 Which of the following OS does not comes under a secured Linux OS list ?

1. Qubes OS
2. Tails
3. Tin Hat
4. Ubuntu

16 From where the term ‘hacker’ first cam to existence ?

1. MIT
2. Stanford University
3. California
4. Bell’s Lab

17 ___________ has now evolved to be one of the most popular automated tools
for unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
18 An unauthorized individual enters a building following an employee through the
employee entrance after the lunch rush. What type of breach has the individual just
performed?

A. Reverse Social Engineering


B. Tailgating
C. Piggybacking
D. Announced

19 Which of the following is the best countermeasure to encrypting ransomwares?

A. Use multiple antivirus softwares


B. Keep some generation of off-line backup
C. Analyze the ransomware to get decryption key of encrypted data
D. Pay a ransom

20 What is the purpose of a demilitarized zone on a network?

A. To scan all traffic coming through the DMZ to the internal network
B. To only provide direct access to the nodes within the DMZ and protect the network behind
it
C. To provide a place to put the honeypot
D. To contain the network devices you wish to protect

You might also like