CEH Exam Part-1
CEH Exam Part-1
CEH Exam Part-1
CEH Page 1
CEH Page 2
B
CEH Page 3
The heartbleed bug was discovered in 2014 and a widely referred to under MITM common
vulnerabilities and Exposure (CVE) as CVE-2014-0160. The bug affected the openSSL implementation of
the Transport layer security(TLS) protocol defined in RFC6520.
A. Public
B. Private
C. Root
D. Shared
CEH Page 4
A
CEH Page 5
CEH Page 6
39. Risks = Threats x vulnerabilities is referred to as the:
A. Risk Equation
B. Threat Assessment
C. BIA equation
D. Disaster recovery Formula
40. Session splicing as an IDS evasion technique in which an attaker delivers multiple, smallsized
packets to the target computer, making it ery difficult for an IDS to detect the attack Signatures.
Which tool can be used to perform session splicing attacks?
A. Burp
B. tcpsplice
c. Hydra
D. Whisker
CEH Page 7
D
CEH Page 8
CEH Page 9
CEH Page 10
C
you are a Network Security Officer. you have two machines. the first machine (192.168.0.99) has snort
Installed and the second machine (192.168.0.150) has kiwi syslog installed you perform a scan in your
network, and you notice that Kiwi syslog is not recieving the alert message from snort. You decide to run
wireshark in the snort machine to check if the messages are going to the kiwi syslog machine.
What wireshark filter will show the connections from the snort machine to kiwi syslog machine?
CEH Page 11
C
CEH Page 12
B
CEH Page 13
D
CEH Page 14
A
CEH Page 15
A
CEH Page 16
A
105. jimmy is standing outside a secure entrance to a facility. He is pretending to have a tense
conversation on his cell phone as an authorized employee badges in. jimmy, while still on the
phone grabs the door as it begans to close
A. Piggybacking
CEH Page 17
A. Piggybacking
B. Whaling
C. Phishing
D. Masquerading
CEH Page 18
C
CEH Page 19