Skip survey header

CEH Practice Quiz 1

CEH Practice Quiz 1

Enjoy the following 15 questions from McGraw-Hill. At the conclusion of the quiz you will get a score with explanations for any missed questions.
1. Scanning is performed in which phase of a pen test?
Hint: Pen-test steps are different from the five hacking steps.
2. What will an open port return from an ACK scan?
Hint: Scan types return different things for open and closed ports.
3. Your target system is behind a firewall. Using hping2, you craft SYN packets to send with a hop count capable of reaching the host. You then send these packets out with port numbers from 1 to 1024. What action are you performing?
Hint: Be familiar with the definitions of these terms.

4. What is the preferred communications method used with systems on a bot-net?
Hint: What would be a good way to instantaneously contact a whole bunch of clients at once?

5. Which of the following best describes a distributed denial-of-service attack?
Hint: This term is closely associated with bot-nets.

6. What does the program EliteWrap do?
Hint: Knowledge of tools in every facet of pen testing is vital
7. What is the attack called “evil twin”?
Hint: Wireless attacks are pretty simple.
8. Which of the following is a passive wireless discovery tool?
Hint: Again, knowing the tools is key for this exam.

9. What is TKIP and how does it make WPA-2 a better security choice for your wireless network?
Hint: The name should give it away.

10. Which of the following is true regarding WEP cracking?
Hint: Considering the efforts needed to crack something, only one of these answers makes sense.
11. What is another term for turning off the SSID broadcast?
Hint: Another wireless definition term to memorize
12. What is the maximum length of an SSID?
Hint: SSID basic knowledge
13. Which wireless mode connects machines directly to one another, without the use of an access point?
Hint: The wording here gives the answer away
14. Which wireless standard can operate at speeds of 100+ Mbps and uses the 2.4GHz to 5GHz range?
Hint: The 802.11 standards are relatively easy to remember.
15. You are assigned to begin testing on a particular subnet. On examination of the segment, you notice the network is fully switched. Which of the following would allow you to begin sniffing traffic to or from devices on the subnet?
Hint: The key to this question lies with the ‘fully switched’ designator.