Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
7Activity
0 of .
Results for:
No results containing your search query
P. 1
CEHv5

CEHv5

Ratings: (0)|Views: 290|Likes:
Published by api-3699464

More info:

Published by: api-3699464 on Oct 15, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/18/2014

pdf

text

original

Do not distribute this document
Prepared by Chan Tseng Loo, Beijing China
CEHv5 Sample Exam Questions
1.
Which command in Linux produces IP address and MAC address output?
A. sudo nmap -sP 192.168.0.1/24

B. root nmap -sA 192.168.0.1/24
C. run nmap -TX 192.168.0.1/24
D. launch nmap -PP 192.168.0.1/24

Ans: a
2.
What filter in ethereal will you use to view hotmail messages?

a.(http contains "hotmail") && (http contains "Reply-To")
b.(http contains "e-mail") && (http contains "hotmail")
c.(http = "login.passport.com") && (http contains "SMTP")
d.(http = "login.passport.com") && (http contains "POP3")

Ans: a
3.
What does this command do?
for (( i = 0;i<11;i++ )); do
dd if=/dev/random of=/dev/hda && dd if=/dev/zero of=/dev/hda
done

a. He is making a bit stream copy of the entire hard disk for later download
b. He is deleting log files to remove his trace
c. He is wiping the contents of the hard with zeros
d. He is infecting the hard disk with random virus strings

And: c
4.
How would you permanently wipe the data in the hard disk?

a.$ wipe -fik /dev/hda1
b.$ erase -fik /dev/hda1
c.$ delete -fik /dev/hda1
d.$ secdel -fik /dev/hda1

Ans: a
5.
Which commands scans for rootkits?

a. $ sudo chrootkit
b. $ sudo avcheck
c. $ sudo runvirus
d. $ sudo rootvirus

Ans: a
6.
802.11a uses:
a. 5.15-5.825 GHz
b. 2.412-2.462 GHz
c. 2.323-2.462 GHz
d. 900MHz-2.462 GHz
Ans: a
7.
What commands will you use in google to view linked pages?
a. link:www.xsecurity.com
b. search?l:www.xsecurity.com
c. level1:www.xsecurity.com
d. pagerank:www.xsecurity.com
Ans: a
8.
What command you use to search groups in google?
a. Search in Google using the key search strings "the target company" and

"newsgroups"
b. Search for the target company name at http://groups.google.com
c. Use NNTP websites to search for these postings
d. Search in Google using the key search strings "the target company" and "forums"

Ans: b
9.
You want to search for the existence of a Novell BorderManager Proxy/Firewall servers
using Google.
What search string will you use?

a. intitle: "BorderManager information alert" b. insite: "BorderManager information alert" c. inweb: "BorderManager information alert" d. inpage: "BorderManager information alert"

Ans: a
10.
You would like to locate the presence of known vulnerable Web applications using
Google search. What is the correct format for the search string?

INURL:["parameter="] with FILETYPE:[ext] and INURL:[scriptname]
INPAGE:["scriptname ="] with STRING:[ext] and INURL:[parameter]
LINKS:["ext="] with EXTENSIONS:[parameter] and INPAGE:[scriptname]
INSITE:["parameter="] with FILETYPE:[ext] and INURL:[scriptname]

Ans: a

Activity (7)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
kijaksar liked this
Tom Doyle liked this
kanchanvs liked this
Basri Ikhtisyam liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->