أرشيف أسئلة الاختبار
اختبار شهادة Certified Ethical Hacker (CEH) V13
هذه الصفحة مخصصة للأرشفة وتعرض جميع أسئلة الاختبار وروابط كل سؤال مع الخيارات والنقاشات.
تنبيه مهم
هذه الصفحة للأرشفة فقط. إذا كنت تريد التجربة الحقيقية للاختبار والدخول إلى واجهة الاختبار الأصلية فانتقل إلى صفحة الاختبار من الرابط التالي.
الانتقال إلى صفحة الاختبار الفعلية
الأسئلة
40 سؤال- Under what conditions does a secondary name server request a zone transfer from a primary name server?
- An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a web server in the external DMZ. ...
- The collection of potentially actionable, overt, and publicly available information is known as:
- Which of the following is a component of a risk assessment?
- Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?
- An attacker, using a rogue wireless AP, performed a MITM attack and injected HTML code to embed a malicious applet in all HTTP connections. When users accessed ...
- Eric used Dsniff tools to intercept communications between two entities, establishing credentials with both sides and relaying all traffic. Neither endpoint not ...
- While using your bank’s online services you see this URL: "http://www.MyPersonalBank.com/account?id=368940911028389&Damount=10980&Camount=21" You notice that if ...
- Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?
- What tool can crack Windows SMB passwords simply by listening to network traffic?
- Bob decides a DMZ is not needed if the firewall is configured to only allow access to specific Internet-facing servers/ports and block access to workstations. H ...
- Based on the following extract from the log of a compromised machine (showing access to "har.txt" in the repair context), what is the hacker really trying to st ...
- User A is sending a sensitive email to user B and chooses to use PKI to secure the message so only B can read it. At what OSI layer does the encryption and decr ...
- Bob is performing a password assessment and suspects weak passwords are common. He knows about password weaknesses and keyloggers. Which option best represents ...
- Bob is performing a password assessment and suspects weak passwords are common. He knows about password weaknesses and keyloggers. Which option best represents ...
- An incident investigator receives logs from firewalls, proxy servers, and IDS sensors after a possible breach. When correlating events, the sequences in differe ...
- The Heartbleed bug (CVE-2014-0160) affects OpenSSL’s implementation of TLS. What type of key does this bug potentially expose to the Internet, making exploitati ...
- What two conditions must a digital signature meet?
- What is NOT a PCI compliance recommendation?
- You have physical access to a Windows 2008 R2 server with an accessible disk drive but cannot guess the admin password. You boot an Ubuntu LiveCD. Which Linux-b ...
- Which of the following is a command-line packet analyzer similar to GUI-based Wireshark?
- Scenario: An attacker creates an attractive web page and overlays an invisible iframe on top of a button. The victim thinks they click the visible offer, but ac ...
- In the Mason Insurance scenario, internal users see the normal website while Internet users see a defaced website at www.masonins.com. Tripwire shows no changes ...
- A hacker studies a target company’s public information, email style, leadership names, and branding to craft realistic phishing emails. The time spent gathering ...
- DHCP snooping is enabled to prevent rogue DHCP servers. Which security feature on switches leverages the DHCP snooping database to help prevent man-in-the-middl ...
- Which type of physical security feature stops vehicles from crashing through the doors of a building?
- A user on your Windows 2000 network has discovered that he can use L0phtcrack to sniff the SMB exchanges which carry user logons. The user is plugged into a hub ...
- The establishment of a TCP connection involves a negotiation called the three-way handshake. What type of message does the client send to the server in order to ...
- “........ is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdro ...
- A company’s security policy states that all web browsers must automatically delete their HTTP browser cookies upon terminating. What sort of security breach is ...
- MX record priority increases as the number increases. (True/False.)
- A zone file consists of which of the following Resource Records (RRs)?
- Which of the following incident handling process phases is responsible for defining rules, coordinating people, creating a backup plan, and testing the plans fo ...
- The command `env x='(){ :;};echo exploit' bash -c 'cat /etc/passwd'` is used in the Shellshock bash vulnerability. What is it attempting to do on a vulnerable L ...
- You are tasked to perform a penetration test. During information gathering, you find an employee list and the receptionist’s email. You send her an email spoofe ...
- During a black-box penetration test, you attempt to pass IRC traffic over TCP port 80 from a compromised web-enabled host. The traffic is blocked, but normal ou ...
- Which of the following statements about a DNS zone transfer is correct? (Choose three.)
- Null sessions are unauthenticated connections (no username or password) to an NT or 2000 system. Which TCP ports must you filter to block/null-check these sessi ...
- An attacker has installed a RAT on a host and wants to ensure that when a user visits "www.MyPersonalBank.com" they are silently redirected to a phishing site. ...
- In Nmap, what does the `-oX` flag do during a scan?