FREE Certified Ethical Hacker Knowledge Questions and Answers

0%

Which of the following describes a network in which multiple computers (hosts) are connected through a central hub?

Correct! Wrong!

In computer networks, a star network is the implementation of a node–hub infrastructure. Each host in a star network is directly linked to a central device known as the hub. In its most basic form, a central hub serves as a route for the transmission and reception of communications. The star network is one of the most popular and widespread computer network architectures.

Which of the following is a network topology in which each node is connected to exactly two other nodes, creating a single path for signals through each node?

Correct! Wrong!

A ring network is a network topology in which each node, computer, or host links to precisely two other nodes, computers, or hosts, establishing a single continuous channel for signal transmission and reception across each node, i.e. a ring. Data is sent from node to node, with each node or computer along the path receiving and transferring each packet.

Which of the following is a local network topology in which infrastructure nodes (such as bridges, switches, and other infrastructure devices) are linked directly, dynamically, and non-hierarchically to as many other nodes as possible?

Correct! Wrong!

A mesh network, also called meshnet, is a local network topology in which the infrastructure nodes (bridges, hubs, switches, and other devices) connect directly, dynamically, and without a hierarchy to as many other nodes, computers, or other hosts as possible and talk to each other to route data from and to clients in a precise and effective way.

International standard organization (ISO) created a seven-layer model; the conceptual model that defines and standardizes the communication functions of a telecommunication or computing system is known as which of the following systems?

Correct! Wrong!

The Open Systems Interconnection model (OSI model) is a conceptual and theoretical model that specifies and standardizes the communication transmission and reception functions of telecommunication equipment or computer systems, no matter what kind of internal structure or technology is used. The International Organization for Standardization (ISO) designed, initiated, and published the OSI model in 1978.

Which of the following networks has nodes greater than around ten miles apart?

Correct! Wrong!

The definition of a Wide Area Network is a network whose nodes (computers or hosts) are more than 10 miles apart. Any ISP with access to the Internet's backbone would have a WAN. Additionally, corporations such as banks may have WANs with network connections that link their offices that are situated in separate locations.

What is the name of this global non-profit organization whose mission is to improve the security of software and to make software security accessible so that individuals and companies may make informed decisions on real software security risks?

Correct! Wrong!

The Open Online Application Security Project (OWASP) is an international non-profit organization concerned with the security of web applications. One of the organization's guiding principles is that all of its resources must be openly accessible and readily available on its website, allowing anybody to enhance online application security. Documentation, tools, movies, and forums are among the materials offered.

Cloud security is crucial from both the provider and subscriber perspectives. What cloud security tool gives servers in any combination of data centers, private clouds, and public clouds instant visibility and protection all the time?

Correct! Wrong!

A single cloud security platform called CloudPassage Halo automates security controls and compliance for cloud computing across servers, containers, and any public, private, hybrid, and multi-cloud environments.

Bluetooth is used to wirelessly link devices, often mobile phones, across a short distance. Since we save so much sensitive data in our Bluetooth-enabled gadgets, they are easy targets for hackers. What is this type of Bluetooth attack in which attackers steal data from a mobile device because of an open connection, like staying in discovery mode?

Correct! Wrong!

Bluesnarfing enables hackers to access information saved on a Bluetooth-enabled phone without informing the phone's owner of the connection. The phonebook, photos, and calendar are among the information that may be viewed.

Malware is software designed to damage or enter a computer system without the owner's permission. What is this form of malicious software, which is defined as a program that replicates itself by attaching copies of its code to other executable codes?

Correct! Wrong!

A virus is a harmful software program that is secretly installed on a computer and performs illegal actions. Viruses generate copies of themselves into other programs, which are then activated by a trigger event.

HyperText Transfer Protocol (HTTP) is a protocol of which of the following layers in the Open Systems Interconnection (OSI) model?

Correct! Wrong!

HyperText Transfer Protocol is an application layer protocol established within the context of the Internet Protocol Suite for the purpose of displaying web pages. It establishes the connections between the client and the server for resource management (pages, etc.).

Which 32-bit value masks an IP address and separates it into network and host addresses?

Correct! Wrong!

A Subnet mask is a 32-bit value that masks or conceals an IP address, as well as splits the IP address into two pieces, the network address and the host address. Creating a Subnet Mask involves setting all network bits to "1" and all host bits to "0."

Premium Tests $49/mo
FREE April-2024