02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Review Questions 389<br />

Review Questions<br />

1. An HIDS is used to monitor activity on which of the following?<br />

A. Network<br />

B. Application<br />

C. Log file<br />

D. Host<br />

2. Which of the following can be used to identify a firewall?<br />

A. Search engines<br />

B. E-mail<br />

C. Port scanning<br />

D. Google hacking<br />

3. An NIDS is based on technology similar to which of the following:<br />

A. Packet sniffing<br />

B. Privilege escalation<br />

C. Enumeration<br />

D. Backdoor<br />

4. Which of the following can be used to evade an IDS?<br />

A. Packet sniffing<br />

B. Port scanning<br />

C. Enumeration<br />

D. Encryption<br />

5. Altering a checksum of a packet can be used to do what?<br />

A. Send an RST<br />

B. Send a URG<br />

C. Reset a connection<br />

D. Evade an NIDS<br />

6. Firewalking is done to accomplish which of the following?<br />

A. Find the configuration of an NIDS<br />

B. Find the configuration of an HIDS<br />

C. Uncover a honeypot<br />

D. Analyze a firewall

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!