Certified Ethical Hacker (CEHv10) Quiz Questions and Answers

First thing you do every office day is to check your email inbox. One morning, you received an email from your best friend and the subject line is quite strange. What should you do?

Answer :
  • Forward the message to your company’s security response team and permanently delete the message from your computer.

Which of the following techniques will identify if computer files have been changed?

Answer :
  • Integrity checking hashes

Which of the following is not a Bluetooth attack?

Answer :
  • Bluedriving

Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?

Answer :
  • PKI

What is correct about digital signatures?

Answer :
  • A digital signature cannot be moved from one signed document to another because it is the hash of the original document encrypted with the private key of the signing party.

You have gained physical access to a Windows 2008 R2 server with an accessible disc drive. When you try to boot the server and log in, you cannot guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change users' passwords or activate disabled Windows accounts?

Answer :
  • CHNTPW

Which of the following is considered an exploit framework and has the ability to perform automated attacks on services, ports, applications and unpatched security flaws in a computer system?

Answer :
  • Metasploit

You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly. What is the best Nmap command you will use?

Answer :
  • Nmap -T4 -F 10.10.0.0/24

As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing. What document describes the specifics of the testing, and the associated violations and essentially protects both the organization's interest and your liabilities as a tester?

Answer :
  • Rules of Engagement

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

Answer :
  • ESP tranport mode