Certified Ethical Hacker Practice Exam 2 CEH (312-50)

Certified Ethical Hacker Practice Exam 2 CEH (312-50)


A rootkit is _________________________________

 

 

 

 

_________________ is a technique that’s used to attack an Ethernet network and that may letan attacker sniff data frames on a switched LAN or stop the traffic altogether.

 

 

 

 

The _______________ bindsa legitimate file to the Trojan file. Both the legitimate software and the Trojan are combinedinto a single executable file and installed when the program is run.

 

 

 

 

The attacker makes a full TCP connection to the target system. The most reliable scan type but also the most detectable. Open ports reply with a SYN/ACK while closed ports reply with a RST/ACK.

 

 

 

 

_____________ involves taking the information discovered during reconnaissance and using it to examine the network.

 

 

 

 

_________________ is used as to detect steganography tools on a system

 

 

 

 

_________________ is a nontechnical method of breaking into a system or network. It’s the process of deceiving users of a system and convincing them to perform acts useful to the hacker, such as giving out information that can be used to defeat or bypass security mechanisms.

 

 

 

 

The TCP RST command is used to ________

 

 

 

 

______________ is similar to a virus in many ways but does not need a carrier program. It can self-replicate and move from infected host to another host. It spreads from system to system automatically without the help of other programs.

 

 

 

 

___________ is a class of programs that are used to enable remote control on the compromised device.

 

 

 

 


Question 1 of 10