Home
Flashcards
Preview
CEH 1 -25.txt
Home
Get App
Take Quiz
Create
What is the difference between an ethical hacker and a cracker
An ethical hacker is a person who has the authorization and permission to probe a target. A cracker does not.
RIPE and ARIN are examples of what
Regional Internet Registries
What is dumpster diving
Looking through trash for confidential information
What information will you find when running a Whois lookup
A Whois lookup reveals contact information
What is the IP address of the following hex: 0xde.0xad.0xbe.0xef
222.173.190.239
What is the next step you would perform after footprinting
Scanning
What is the tool NSlookup used for
Domain lookup
What port number does DNS use
53
What port number does HTTP use
80
What port number does TFTP use
69
What port number does FTP use
21
What port number does POP use
110
What is meant by the term "hacktivism"
Hacktivism means hacking for a cause.
What port number does SMTP use
25
What port number does LDAP use
389
If a router blocks ICMP
what message is usually sent out
What is Nessus
An open source vulnerability scanning program
What is GFI LANguard
A Windows-based vulnerability assessment tool
What is the fastest scan you can conduct if stealth is not an issue
TCP connect
In an XMAS scan
what flag do you set to probe the target
What is war dialing
Using a modem to scan for phone connections in auto-answer mode
True or false: It is necessary to spoof an IP address in order to perform a port-scan
True
False
False. You do not need to spoof your IP address in order to perform a port scan.
What is the switch for an Nmap ping scan
-SP
Where do you search for information that can be used for hacking
Whois lookups
What switch is used in Nmap to detect the OS
-0
Author
FDNY366
ID
262681
Card Set
CEH 1 -25.txt
Description
ceh quiz
Updated
2014-02-19T01:29:25Z
Show Answers
Home
Flashcards
Preview