Cehv12 MCQ 3
Cehv12 MCQ 3
choice questions in the format similar to the CEHv12 exam, focusing on network scanning
countermeasures and related cybersecurity topics:
1. **Which of the following is the best practice to secure a system or network against port scanning?**
- Ensure that the versions of services running on the ports are non-vulnerable.
- Allow unwanted services running on the ports and update the service versions.
- Ensure that firewall and routers do not block source routing techniques.
- Do not configure firewall and IDS rules to detect and block probes.
3. **Which of the following tools provides complete visibility, real-time detection, and intelligent
response to malicious network scanning attempts?**
- WinHex
- Orbot
- ExtraHop
- CyberGhost VPN
4. **Which of the following practices helps security professionals defend a network or service against
port scanning attempts?**
- Never configure firewall and intrusion detection system (IDS) rules to block probes.
- Never use a custom rule set to lock down the network and block unwanted ports at the firewall.
- Ensure that TCP wrappers limit access to the network based on domain names or IP addresses.
5. **Which of the following practices can make the organization’s network susceptible to port scanning
attempts?**
- Configure commercial firewalls to protect the network against fast port scans and SYN floods.
- Block inbound ICMP message types and all outbound ICMP type-3 unreachable messages at border
routers arranged in front of the company’s main firewall.
- Test how the network firewall and IDS manages fragmented packets using fragtest and fragroute.
6. **What is a common technique used to obscure the real IP address of an attacker during a port scan?
**
- IP Spoofing
- Packet Fragmentation
- SYN Flooding
- Banner Grabbing
7. **Which of the following is an effective way to detect and prevent unauthorized port scanning on a
network?**
8. **Why is it important to update service versions regularly as a countermeasure against port scanning?
**
10. **Which of the following describes a technique used by attackers to evade IDS detection during a
port scan?**
11. **How does disabling ICMP traffic help in preventing network scanning?**
13. **Which of the following measures can help in mitigating the risk of SYN flood attacks?**
15. **Which of the following can be a consequence of not updating firewall rules regularly?**
17. **Which tool is commonly used for network mapping and port scanning?**
- Nmap
- WinZip
- Wireshark
- Photoshop
19. **Which of the following actions can lead to a successful man-in-the-middle attack?**
20. **Why should security professionals use encryption on all sensitive data transmissions?**
22. **Which of the following best describes the purpose of a DMZ (Demilitarized Zone) in network
security?**
23. **Which method can be used to limit the information available to attackers through DNS queries?**
- Implementing DNSSEC.
- Disabling DNS services.
25. **How can regularly updating and patching systems help in securing a network?**
- To control incoming and outgoing network traffic based on predetermined security rules.
- To host websites.
27. **Why is it recommended to use secure protocols such as HTTPS instead of HTTP?**
- To encrypt data transmitted between the client and server, ensuring privacy and integrity.
Sure, here are 30 more challenging and tricky multiple-choice questions focusing on advanced network
scanning countermeasures and related cybersecurity topics:
1. **Which of the following techniques involves disguising the source of network traffic to avoid
detection during a port scan?**
- Proxy bouncing
- VPN tunneling
- IP fragmentation
- MAC spoofing
2. **In a TCP/IP stack fingerprinting attack, which protocol behavior differences are typically exploited by
the attacker?**
3. **What is the primary advantage of using an anomaly-based intrusion detection system (IDS) over a
signature-based IDS for detecting port scans?**
- Easier configuration
4. **Which method can be used to obscure the true nature of a port scan by spreading it over an
extended period?**
- Stealth scanning
- Slow scanning
- Fragmented scanning
- Distributed scanning
5. **Which of the following actions can inadvertently expose a network to increased risk from port
scanning?**
6. **What is the primary function of the "TCP Reset" (RST) flag in the context of network scanning
countermeasures?**
7. **Which of the following practices can help in identifying and mitigating the risk of TCP/IP stack
fingerprinting attacks?**
- Implementing honeypots
9. **Which countermeasure is most effective against advanced evasion techniques used in port
scanning?**
10. **How can the use of rate limiting help defend against network scanning attempts?**
- By reducing the number of packets an attacker can send in a given time frame.
11. **What is the significance of detecting a high volume of ICMP Type 8 messages in a network?**
- It indicates potential brute force attacks.
13. **What is the primary risk associated with using outdated IDS/IPS signatures?**
14. **Which of the following techniques can help detect covert timing channels used in network
scanning?**
15. **Why is it crucial to monitor DNS traffic as part of network security measures?**
17. **How can Network Behavior Anomaly Detection (NBAD) assist in identifying stealthy port scans?**
18. **What role does the Time-to-Live (TTL) value play in detecting network reconnaissance activities?**
19. **Which of the following methods is effective in concealing the presence of a honeypot?**
20. **Why is session management critical in protecting against session hijacking during network scans?
**
21. **How does enabling reverse path forwarding (RPF) help mitigate the risk of spoofed IP addresses in
network scans?**
22. **Which of the following practices can help in detecting DNS tunneling used for data exfiltration?**
- Disabling DNSSEC.
23. **What is the main advantage of using flow-based monitoring tools for detecting network scans?**
25. **How can using IPv6 instead of IPv4 impact network scanning defenses?**
- It increases the address space, making exhaustive scans more difficult.
26. **Which technique involves sending packets with deliberately fragmented payloads to evade IDS/IPS
detection?**
- Packet fragmentation
- IP spoofing
- SYN flooding
- Port knocking
27. **Why is it important to use both active and passive scanning techniques in network security
assessments?**
- Active scanning identifies live hosts and open ports, while passive scanning detects traffic patterns
and anomalies without alerting the target.
28. **How does the use of a Security Information and Event Management (SIEM) system aid in
identifying and mitigating port scanning attempts?**
- By correlating and analyzing data from multiple sources to detect patterns indicative of scanning
activities.
29. **What is the benefit of using a stateful firewall over a stateless firewall in defending against
network scans?**
- Stateful firewalls track the state of active connections and can make more informed decisions about
allowing or blocking traffic.
30. **Which of the following countermeasures can help detect and prevent the use of rootkits by
attackers?**
- Conducting regular system integrity checks and monitoring for unusual system behavior.
These questions are designed to be more complex and require a deeper understanding of network
security concepts and countermeasures.
Certainly! Here are 30 advanced and challenging multiple-choice questions focused on network scanning
countermeasures and related advanced cybersecurity topics:
2. **Which advanced technique involves modifying packet payloads to evade detection by IDS/IPS
systems?**
- Traffic morphing
- Packet spoofing
- Traffic shaping
- Packet obfuscation
3. **How does the use of polymorphic code in malware complicate network scanning defenses?**
4. **What is the main challenge in detecting Advanced Persistent Threats (APTs) through traditional
network scanning methods?**
5. **Why is behavioral analysis critical in detecting zero-day exploits during network scanning?**
7. **Which technique uses time-based patterns to detect anomalies in network traffic and identify
potential threats?**
- Temporal correlation
- Spatial correlation
- Frequency analysis
- Context-aware analysis
9. **How does the use of elliptic curve cryptography (ECC) enhance the security of data transmitted over
the network?**
- It provides stronger security with smaller key sizes compared to other cryptographic methods.
10. **What is the role of a Security Orchestration, Automation, and Response (SOAR) platform in
defending against network scanning?**
11. **Which advanced method can be used to detect encrypted malicious traffic without decrypting it?
**
12. **How does the use of quantum key distribution (QKD) improve network security?**
- To enforce security policies at a granular level and limit the impact of breaches
14. **Which of the following describes the use of honeytokens in network security?**
15. **What is the primary advantage of using machine learning algorithms in network threat detection?
**
- They can identify new and evolving threats without relying on signatures.
16. **Which technique is used to ensure the integrity and authenticity of software updates in a
networked environment?**
- Code signing
- Packet filtering
- Traffic shaping
- Network segmentation
17. **How does the concept of zero trust enhance network security?**
- By requiring continuous verification of all devices and users, regardless of their location
18. **Which method involves creating multiple decoy environments to detect and respond to attacks in
real time?**
- Deception technology
- Traffic analysis
- Signature-based detection
- Network isolation
19. **Why is threat intelligence sharing important in defending against network scanning attempts?**
20. **Which of the following best describes the purpose of a security operations center (SOC)?**
- By breaking down the attack lifecycle into stages to identify and disrupt malicious activities
22. **Which technique involves monitoring network traffic for anomalies that may indicate the presence
of malware command-and-control (C2) communications?**
- Signature-based detection
- Traffic shaping
23. **How does the implementation of a data loss prevention (DLP) solution help in securing sensitive
information?**
- By monitoring and controlling data transfer to prevent unauthorized access and exfiltration
25. **Which method involves analyzing the behavior of applications to detect deviations from normal
activity?**
- Traffic filtering
- Network segmentation
26. **How does the use of blockchain technology enhance the security of supply chain networks?**
27. **Which technique is used to protect against advanced malware that exploits zero-day
vulnerabilities?**
- Traffic shaping
- Network segmentation
28. **How does implementing an endpoint detection and response (EDR) solution improve network
security?**
29. **Which advanced technique involves using AI-driven algorithms to predict and prevent potential
security breaches?**
- Signature-based detection
- Traffic analysis
30. **What is the primary benefit of using a threat hunting approach in cybersecurity?**
- Proactively searching for and identifying potential threats before they can cause harm
These questions are designed to be particularly challenging, requiring a deep understanding of advanced
cybersecurity concepts, techniques, and strategies.