Ujian Certified Ethical Hacker (CEH) – Chapter 5 SCANNING

Certified Ethical Hacker (CEH) adalah seorang profesional terampil yang memahami dan mengetahui cara mencari kelemahan dan kerentanan dalam sistem target dan menggunakan pengetahuan dan tool yang sama seperti peretas jahat, tetapi dengan cara yang sah dan sah untuk menilai postur keamanan sistem target. Kredensial CEH mensertifikasi individu dalam disiplin keamanan jaringan khusus Peretasan Etis dari perspektif netral vendor.

Tentang Ujian –

Jumlah Pertanyaan: Hanya 125
Durasi Ujian: 4 Jam
Format Tes: Pertanyaan Pilihan Ganda
Pengiriman Tes: UJIAN ECC, VUE
Awalan Ujian: 312-50 (UJIAN ECC), 312-50 (VUE)

  1. Which of the following is used for banner grabbing?
    A) Telnet
    B) FTP
    C) SSH
    D) Wireshark
  2. Which of the following is used for identifying a web server OS?
    A) Telnet
    B) Netcraft
    C) Fragroute
    D) Wireshark
  3. Which of the following is used to perform customized network scans?
    A) Nessus
    B) Wireshark
    C) AirPcap
    D) nmap
  4. Which of the following is not a flag on a packet?
    A) URG
    B) PSH
    C) RST
    D) END
  5. An SYN attack uses which protocol?
    A) TCP
    B) UDP
    C) HTTP
    D) Telnet
  6. Which of the following types of attack has no flags set?
    A) SYN
    B) NULL
    C) Xmas tree
    D) FIN
  7. What is missing from a half-open scan?
    A) SYN
    B) ACK
    C) SYN-ACK
    D) FIN
  8. During an FIN scan, what indicates that a port is closed?
    A) No return response
    B) RST
    C) ACK
    D) SYN
  9. During a Xmas tree scan what indicates a port is closed?
    A) No return response
    B) RST
    C) ACK
    D) SYN
  10. What is the three-way handshake?
    A) The opening sequence of a TCP connection
    B) A type of half-open scan
    C) A Xmas tree scan
    D) Part of a UDP scan
  11. A full-open scan means that the three-way handshake has been completed. What is the difference between this and a half-open scan?
    A) A half-open uses TCP.
    B) A half-open uses UDP.
    C) A half-open does not include the final ACK.
    D) A half-open includes the final ACK.
  12. What is the sequence of the three-way handshake?
    A) SYN, SYN-ACK, ACK
    B) SYN, SYN-ACK
    C) SYN, ACK, SYN-ACK
    D) SYN, ACK, ACK
  13. What is an ICMP echo scan?
    A) A ping sweep
    B) A SYN scan
    C) A Xmas tree scan
    D) Part of a UDP scan
  14. Which best describes a vulnerability scan?
    A) A way to find open ports
    B) A way to diagram a network
    C) A proxy attack
    D) A way to automate the discovery of vulnerabilities
  15. What is the purpose of a proxy?
    A) To assist in scanning
    B) To perform a scan
    C) To keep a scan hidden
    D) To automate the discovery of vulnerabilities
  16. What is Tor used for?
    A) To hide web browsing
    B) To hide the process of scanning
    C) To automate scanning
    D) To hide the banner on a system
  17. Why would you need to use a proxy to perform scanning?
    A) To enhance anonymity
    B) To fool firewalls
    C) Perform half-open scans
    D) To perform full-open scans
  18. A vulnerability scan is a good way to do what?
    A) Find open ports
    B) Find weaknesses
    C) Find operating systems
    D) Identify hardware
  19. A banner can do what?
    A) Identify an OS
    B) Help during scanning
    C) Identify weaknesses
    D) Identify a service
  20. Nmap is required to perform what type of scan?
    A) Port scan
    B) Vulnerability scan
    C) Service scan
    D) Threat scan
Jawab
  1. 1. A
  2. 2. B
  3. 3. D
  4. 4. D
  5. 5. A
  6. 6. B
  7. 7. B
  8. 8. B
  9. 9. B
  10. 10. A
  11. 11. C
  12. 12. A
  13. 13. A
  14. 14. D
  15. 15. C
  16. 16. B
  17. 17. A
  18. 18. A
  19. 19. D
  20. 20. A

Leave a ReplyCancel reply