yeahhub.com Open in urlscan Pro
2a02:4780:23:9e76:d35d:6d8f:a2dd:85c8  Public Scan

Submitted URL: http://yeahhub.com/cehv9-practice-exam-questions/chapter1-introduction.php
Effective URL: https://yeahhub.com/cehv9-practice-exam-questions/chapter1-introduction.php
Submission: On August 09 via manual from IN — Scanned from NL

Form analysis 0 forms found in the DOM

Text Content

INTRODUCTION

CEHv9 - Practice Exam Questions with Answers
 * Scroll More
 * Back to Main


CONTENTS

--------------------------------------------------------------------------------

 * Assessment Test
 * Introduction
 * System Fundamentals
 * Cryptography
 * Footprinting
 * Scanning
 * Enumeration
 * System Hacking
 * Malware
 * Sniffers
 * Social Engineering
 * Denial of Service
 * Session Hijacking
 * Web Servers & Applications
 * SQL Injection
 * Hacking Wi-Fi & Bluetooth
 * Mobile Device Security
 * Evasion
 * Cloud Technologies & Security
 * Physical Security



Total No. of Questions = 20

--------------------------------------------------------------------------------

1. If you have been contracted to perform an attack against a target system, you
are what type of hacker?

 * A) White hat
 * B) Gray hat
 * C) Black hat
 * D) Red hat


SHOW ANSWER

The Correct Answer is:- A

--------------------------------------------------------------------------------

2. Which of the following describes an attacker who goes after a target to draw
attention to a cause?

 * A) Terrorist
 * B) Criminal
 * C) Hacktivist
 * D) Script kiddie


SHOW ANSWER

The Correct Answer is:- C

--------------------------------------------------------------------------------

3. What level of knowledge about hacking does a script kiddie have?

 * A) Low
 * B) Average
 * C) High
 * D) Advanced


SHOW ANSWER

The Correct Answer is:- A

--------------------------------------------------------------------------------

4. Which of the following does an ethical hacker require to start evaluating a
system?

 * A) Training
 * B) Permission
 * C) Planning
 * D) Nothing


SHOW ANSWER

The Correct Answer is:- B

--------------------------------------------------------------------------------

5. A white-box test means the tester has which of the following?

 * A) No knowledge
 * B) Some knowledge
 * C) Complete knowledge
 * D) Permission


SHOW ANSWER

The Correct Answer is:- C

--------------------------------------------------------------------------------

6. Which of the following describes a hacker who attacks without regard for
being caught or punished?

 * A) Hacktivist
 * B) Terrorist
 * C) Criminal
 * D) Suicide hacker


SHOW ANSWER

The Correct Answer is:- D

--------------------------------------------------------------------------------

7. What is a code of ethics?

 * A) A law for expected behavior
 * B) A description of expected behavior
 * C) A corporate policy
 * D) A standard for civil conduct


SHOW ANSWER

The Correct Answer is:- B

--------------------------------------------------------------------------------

8. The group Anonymous is an example of what?

 * A) Terrorists
 * B) Script kiddies
 * C) Hacktivists
 * D) Grayware


SHOW ANSWER

The Correct Answer is:- C

--------------------------------------------------------------------------------

9. Companies may require a penetration test for which of the following reasons?

 * A) Legal reasons
 * B) Regulatory reasons
 * C) To perform an audit
 * D) To monitor network performance


SHOW ANSWER

The Correct Answer is:- A

--------------------------------------------------------------------------------

10. What should a pentester do prior to initiating a new penetration test?

 * A) Plan
 * B) Study the environment
 * C) Get permission
 * D) Study the code of ethics


SHOW ANSWER

The Correct Answer is:- C

--------------------------------------------------------------------------------

11. Which of the following best describes what a hacktivist does?

 * A) Defaces websites
 * B) Performs social engineering
 * C) Hacks for political reasons
 * D) Hacks with basic skills


SHOW ANSWER

The Correct Answer is:- C

--------------------------------------------------------------------------------

12. Which of the following best describes what a suicide hacker does?

 * A) Hacks with permission
 * B) Hacks without stealth
 * C) Hacks without permission
 * D) Hacks with stealth


SHOW ANSWER

The Correct Answer is:- B

--------------------------------------------------------------------------------

13. Which type of hacker may use their skills for both benign and malicious
goals at different times?

 * A) White hat
 * B) Gray hat
 * C) Black hat
 * D) Suicide hacker


SHOW ANSWER

The Correct Answer is:- B

--------------------------------------------------------------------------------

14. What separates a suicide hacker from other attackers?

 * A) A disregard for the law
 * B) A desire to be helpful
 * C) The intent to reform
 * D) A lack of fear of being caught


SHOW ANSWER

The Correct Answer is:- D

--------------------------------------------------------------------------------

15. Which of the following would most likely engage in the pursuit of
vulnerability research?

 * A) White hat
 * B) Gray hat
 * C) Black hat
 * D) Suicide hacker


SHOW ANSWER

The Correct Answer is:- A

--------------------------------------------------------------------------------

16. Vulnerability research deals with which of the following?

 * A) Actively uncovering vulnerabilities
 * B) Passively uncovering vulnerabilities
 * C) Testing theories
 * D) Applying security guidance


SHOW ANSWER

The Correct Answer is:- B

--------------------------------------------------------------------------------

17. How is black-box testing performed?

 * A) With no knowledge
 * B) With full knowledge
 * C) With partial knowledge
 * D) By a black hat


SHOW ANSWER

The Correct Answer is:- A

--------------------------------------------------------------------------------

18. A contract is important because it does what?

 * A) Gives permission
 * B) Gives test parameters
 * C) Gives proof
 * D) Gives a mission


SHOW ANSWER

The Correct Answer is:- C

--------------------------------------------------------------------------------

19. What does TOE stand for?

 * A) Target of evaluation
 * B) Time of evaluation
 * C) Type of evaluation
 * D) Term of evaluation


SHOW ANSWER

The Correct Answer is:- A

--------------------------------------------------------------------------------

20. Which of the following best describes a vulnerability?

 * A) A worm
 * B) A virus
 * C) A weakness
 * D) A rootkit


SHOW ANSWER

The Correct Answer is:- C

Copyright © 2017. All Rights Reserved | Developed by Yeah Hub Team Yeahhub