Certified Ethical Hacker (CEH v10) Quiz Questions and Answers

Which of the following statements regarding ethical hacking is incorrect?

Answer :
  • Ethical hackers should never use tools or methods that have the potential of exploiting vulnerabilities in an organization’s systems.

Explanation :

Ethical hackers should never use tools or methods that have the potential of exploiting vulnerabilities in an organization’s systems.

Precomputed hashes that are intended to contain every possible combination of characters for the purpose of comparing them against a captured password are known as which of the following?

Answer :
  • Rainbow Table

Explanation :

Precomputed hashes that are intended to contain every possible combination of characters is rainbow table.

Sophia travels a lot and worries that her laptop containing confidential documents might be stolen. What is the best protection that will work for her?

Answer :
  • Disk encryption

Explanation :

Ask the employer for authorization to perform the work outside the company.

Graphical version of metasploit in kali linux is known as-----?

Answer :
  • Armitage

Explanation :

Graphical version of metasploit in kali linux is known as Armitage.

In wan network data travels in what form.

Answer :
  • Packet

Explanation :

In wan network data travels in packet form.

What would you type on the Windows command line in order to launch the Computer Management Console, provided that you are logged in as an admin?

Answer :
  • compmgmt.msc

Explanation :

Analysis of interrupts within the software