CEH Study

5 cards   |   Total Attempts: 182
  

Cards In This Set

Front Back
A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer’s software and hardware without the owner’s permission.Their intention can either be to simply gain knowledge or to illegally make changes.Which of the following class of hacker refers to an individual who works both offensively and defensively at various times? A. White HatB. Suicide HackerC. Gray HatD. Black Hat
C. Gray Hat
Websites and web portals that provide web services commonly use the Simple Object Access Protocol (SOAP). Which of the following is an incorrect definition orcharacteristics of the protocol? A. Based on XMLB. Only compatible with the application protocol HTTPC. Exchanges data between web servicesD. Provides a structured model for messaging
B. Only compatible with the application protocol HTTP
You have gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unableto guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change any user’s password or activate disabledWindows accounts? A. John the RipperB. SETC. CHNTPWD. Cain & Abel
C. CHNTPW
What type of vulnerability/attack is it when the malicious person forces the user’s browser to send an authenticated request to a server? A. Cross-site request forgeryB. Cross-site scriptingC. Session hijackingD. Server side request forgery
A. Cross-site request forgery
Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access. A camera captures people walking and identifies the individuals using Steve’s approach. After that, people must approximate their RFID badges. Both the identifications are required to open the door. In this case, we can say: A. Although the approach has two phases, it actually implements just one authentication factorB. The solution implements the two authentication factors: physical object and physical characteristicC. The solution will have a high level of false positivesD. Biological motion cannot be used to identify people
B. The solution implements the two authentication factors: physical object and physical characteristic