没有合适的资源?快使用搜索试试~ 我知道了~
认证道德黑客考试312-50v11CertifiedEthicalHackerv11Exam_CEH V11 test
需积分: 11 4 下载量 130 浏览量
2023-03-17
11:30:16
上传
评论 1
收藏 158KB DOCX 举报
温馨提示
试读
179页
V11版本,共收录453题。其中部分答案需要自己辨别真假。312-50v11CertifiedEthicalHackerv11Exam_CEH V11
资源推荐
资源详情
资源评论
CEH V11 test
題目:1-(uid:1)
While performing online banking using a Web browser, a user receives an email that contains
a link to an interesting Web site. When the user clicks on the link, another Web browser
session starts and displays a video of cats playing a piano. The next business day, the user
receives what looks like an email from his bank, indicating that his bank account has been
accessed from a foreign country. The email asks the user to call his bank and verify the
authorization of a funds transfer that took place. What Web browser-based security
vulnerability was exploited to compromise the user?
• A. Clickjacking
• B. Cross-Site Scripting
• C. Cross-Site Request Forgery
• D. Web form input validation
正確答案: C
題目:2-(uid:2)
Which service in a PKI will vouch for the identity of an individual or company?
• A. KDC
• B. CR
• C. CBC
• D. CA
正確答案: D
題目:3-(uid:3)
Identify the web application attack where the attackers exploit vulnerabilities in dynamically
generated web pages to inject client-side script into web pages viewed by other users.
• A. LDAP Injection attack
• B. Cross-Site Scripting (XSS)
• C. SQL injection attack
• D. Cross-Site Request Forgery (CSRF)
正確答案: B
題目:4-(uid:4)
User A is writing a sensitive email message to user B outside the local network. User A has
chosen to use PKI to secure his message and ensure only user B can read the sensitive email.
At what layer of the OSI layer does the encryption and decryption of the message take place?
• A. Application
• B. Transport
• C. Session
• D. Presentation
正確答案: D
OSI 模型的 Presentation 層或第 6 層通常負責加密和解密
題目:5-(uid:5)
A new wireless client is configured to join a 802.11 network. This client uses the same
hardware and software as many of the other clients on the network. The client can see the
network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point
(WAP) is not responding to the association requests being sent by the wireless client. What is
a possible source of this problem?
• A. The WAP does not recognize the client's MAC address
• B. The client cannot see the SSID of the wireless network
• C. Client is configured for the wrong channel
• D. The wireless client is not configured to use DHCP
正確答案: A
題目:6-(uid:6)
If you want to only scan fewer ports than the default scan using Nmap tool, which option
would you use?
• A. -r
• B. -F
• C. -P
• D. -sP
正確答案: B
題目:7-(uid:7)
Which of the following is the structure designed to verify and authenticate the identity of
individuals within the enterprise taking part in a data exchange?
• A. SOA
• B. biometrics
• C. single sign on
• D. PKI
正確答案: D
題目:8-(uid:8)
You are tasked to perform a penetration test. While you are performing information gathering,
you find an employee list in Google. You find the receptionist's email, and you send her an
email changing the source email to her boss's email (boss@company). In this email, you ask
for a pdf with information. She reads your email and sends back a pdf with links. You exchange
the pdf links with your malicious links (these links contain malware) and send back the
modified pdf, saying that the links don't work. She reads your email, opens the links, and her
machine gets infected. You now have access to the company network. What testing method
did you use?
• A. Social engineering
• B. Piggybacking
• C. Tailgating
• D. Eavesdropping
正確答案: A
題目:9-(uid:9)
If a tester is attempting to ping a target that exists but receives no response or a response
that states the destination is unreachable, ICMP may be disabled and the network may be
using TCP. Which other option could the tester use to get a response from a host using TCP?
• A. Traceroute
• B. Hping
• C. TCP ping
• D. Broadcast ping
正確答案: B
題目:10-(uid:10)
Which is the first step followed by Vulnerability Scanners for scanning a network?
• A. OS Detection
• B. Firewall detection
• C. TCP/UDP Port scanning
• D. Checking if the remote host is alive
正確答案: D
題目:11-(uid:11)
Which of the following programs is usually targeted at Microsoft Office products?
• A. Polymorphic virus
• B. Multipart virus
• C. Macro virus
• D. Stealth virus
正確答案: C
Macro virus 巨集病毒 Stealth virus 隱形病毒
題目:12-(uid:12)
In an internal security audit, the white hat hacker gains control over a user account and
attempts to acquire access to another account's confidential files and information. How can
he achieve this?
• A. Privilege Escalation
• B. Shoulder-Surfing
• C. Hacking Active Directory
• D. Port Scanning
正確答案: A
題目:13-(uid:13)
A technician is resolving an issue where a computer is unable to connect to the Internet using
a wireless access point. The computer is able to transfer files locally to other machines, but
cannot successfully reach the Internet. When the technician examines the IP address and
default gateway they are both on the
192.168.1.0/24. Which of the following has occurred?
• A. The computer is not using a private IP address.
• B. The gateway is not routing to a public IP address.
• C. The gateway and the computer are not on the same network.
• D. The computer is using an invalid IP address.
正確答案: B
題目:14-(uid:14)
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of
剩余178页未读,继续阅读
资源评论
敲程序员的小代码
- 粉丝: 9
- 资源: 4
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功