Professional Documents
Culture Documents
Tableau de bord Mes cours Préparation à la certi�cation CEH DS 1 (07/04/2024 à 14:00) DS1
DS1
a. Promiscuous
b. share
c. Open
1 sur 13 07/04/2024, 14:13
DS1 : relecture de tentative https://fad.uvt.rnu.tn/mod/quiz/review.php?attempt=149706&cmid=1...
a. -D
b. -F
c. -O
a. Investigation of a target
b. Discovery of services
d. Enumeration of services
2 sur 13 07/04/2024, 14:13
DS1 : relecture de tentative https://fad.uvt.rnu.tn/mod/quiz/review.php?attempt=149706&cmid=1...
a. Nmap
b. RAT
c. LOKI
d. TCP
Bob is attempting to sni� a wired network in his �rst pen test contract. He sees only tra�c from the
segment he is connected to. What can Bob do to gather all switch tra�c?
a. MAC �ooding
b. DOS attack
c. MAC spoo�ng
d. IP spoo�ng
3 sur 13 07/04/2024, 14:13
DS1 : relecture de tentative https://fad.uvt.rnu.tn/mod/quiz/review.php?attempt=149706&cmid=1...
c. A worm is malware.
b. A Trojan that connects from the server to the client using HTTP
4 sur 13 07/04/2024, 14:13
DS1 : relecture de tentative https://fad.uvt.rnu.tn/mod/quiz/review.php?attempt=149706&cmid=1...
a. Di�cult to log
b. Easy to hide
c. Di�cult to detect
d. Di�cult to install
a. Rainbow attack
b. Hashing attack
c. Birthday attack
d. Cracking attack
5 sur 13 07/04/2024, 14:13
DS1 : relecture de tentative https://fad.uvt.rnu.tn/mod/quiz/review.php?attempt=149706&cmid=1...
a. Fingerprints
b. Password policy
c. Complex passwords
d. Use of NTLM
a. It uses the TTL value in an ICMP message to determine the number of hops from the sender to
the router.
b. It sends a specially crafted IP packet to a router to locate the number of hops from the sender to the
destination network
6 sur 13 07/04/2024, 14:13
DS1 : relecture de tentative https://fad.uvt.rnu.tn/mod/quiz/review.php?attempt=149706&cmid=1...
a. SYSKEY
b. NTLM
c. LM
d. SAM
Which of the following is a system, program, or network that is the subject of a security analysis?
a. Vulnerability
b. Owned system
c. Exploited system
d. Target of evaluation
7 sur 13 07/04/2024, 14:13
DS1 : relecture de tentative https://fad.uvt.rnu.tn/mod/quiz/review.php?attempt=149706&cmid=1...
a. FIN
b. ACK
c. SYN
d. SYN-ACK
Jason notices that he is receiving mail, phone calls, and other requests for information. He has also
noticed some problems with his credit checks such as bad debts and loans he did not participate
in. What type of attack did Jason become a victim of?
a. Identity theft
b. Social engineering
c. Bad luck
d. Phishing
8 sur 13 07/04/2024, 14:13
DS1 : relecture de tentative https://fad.uvt.rnu.tn/mod/quiz/review.php?attempt=149706&cmid=1...
What is enumeration?
a. Cracking passwords
a. Traceroute
b. Ping sweep
c. Whois search
9 sur 13 07/04/2024, 14:13
DS1 : relecture de tentative https://fad.uvt.rnu.tn/mod/quiz/review.php?attempt=149706&cmid=1...
a. Full Open
b. Syn scan
c. XMAS
10 sur 13 07/04/2024, 14:13
DS1 : relecture de tentative https://fad.uvt.rnu.tn/mod/quiz/review.php?attempt=149706&cmid=1...
a. Instant messaging
b. Viruses
c. Trojan horses
d. Mobile phones
a. Con�guration
b. Usernames
c. Passwords
d. IP ranges
Usernames
11 sur 13 07/04/2024, 14:13
DS1 : relecture de tentative https://fad.uvt.rnu.tn/mod/quiz/review.php?attempt=149706&cmid=1...
a. Google hacking
b. Email
c. Search engines
d. Port scanning
A security camera picks up someone who doesn’t work at the company following closely behind an
employee while they enter the building. What type of attack is taking place?
a. Gate running
b. Walking
c. Tailgating
d. Phishing
12 sur 13 07/04/2024, 14:13
DS1 : relecture de tentative https://fad.uvt.rnu.tn/mod/quiz/review.php?attempt=149706&cmid=1...
Jennifer is a system administrator who is researching a technology that will secure network tra�c
from potential sni�ng by unauthorized machines. Jennifer is not concerned with the future impact
on legitimate troubleshooting. What technology can Jennifer implement?
a. SNMP
b. LDAP
c. FTP
d. SSH
a. Transfer �les
b. Scanning
c. System hacking
d. Enumeration
13 sur 13 07/04/2024, 14:13