[go: up one dir, main page]

0% found this document useful (0 votes)
7 views6 pages

CEH Module8 Sniffing

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views6 pages

CEH Module8 Sniffing

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

ceh-v13 prep questions. Jorge - www.youtube.

com/@itbestpractice2741

CEH v13 Practice Questions – Module 8:


Sniffing
1. What is the primary goal of sniffing in cybersecurity?

• A. To scan for open ports


• B. To capture and analyze network traffic
• C. To brute-force passwords
• D. To disable firewalls

Answer: B

2. Which tool is commonly used for packet sniffing?

• A. Nessus
• B. Nmap
• C. Wireshark
• D. Nikto

Answer: C

3. Which network mode must a network interface be in to perform sniffing?

• A. Managed mode
• B. Broadcast mode
• C. Promiscuous mode
• D. Passive mode

Answer: C

4. Which of the following is a method used to sniff traffic on a switched network?

• A. SYN flood
• B. MAC flooding
• C. Port scanning
• D. DNS spoofing

Answer: B

5. Which protocol is most vulnerable to sniffing attacks if not encrypted?


ceh-v13 prep questions. Jorge - www.youtube.com/@itbestpractice2741

• A. HTTPS
• B. SSH
• C. Telnet
• D. FTPS

Answer: C

6. Which of the following attacks involves spoofing ARP messages to redirect traffic?

• A. DNS poisoning
• B. ARP spoofing
• C. TCP hijacking
• D. DHCP starvation

Answer: B

7. What type of attack does a switch CAM table overflow help enable?

• A. Man-in-the-middle attack
• B. DDoS attack
• C. Email spoofing attack
• D. SQL injection

Answer: A

8. What does the term 'MITM' stand for in the context of sniffing?

• A. Middle Intrusion Tactic Method


• B. Message Interference Technical Malware
• C. Man-in-the-Middle
• D. Monitoring Internal Transmission Model

Answer: C

9. Which tool is used for ARP poisoning on local networks?

• A. sqlmap
• B. ettercap
• C. netcat
• D. dig

Answer: B
ceh-v13 prep questions. Jorge - www.youtube.com/@itbestpractice2741

10. What is the function of a packet sniffer?

• A. Encrypt data in transit


• B. Detect SQL injection
• C. Capture and analyze network traffic
• D. Filter out malicious emails

Answer: C

11. Which protocol does not use encryption and is commonly captured during sniffing
attacks?

• A. FTP
• B. SFTP
• C. HTTPS
• D. SCP

Answer: A

12. What is the primary weakness of Telnet in terms of sniffing?

• A. Port 80 is used for Telnet


• B. It tunnels data over SSL
• C. Data is transmitted in plaintext
• D. It only allows administrator access

Answer: C

13. Which of the following tools supports DNS spoofing and sniffing?

• A. Nmap
• B. Hydra
• C. Cain & Abel
• D. Sqlmap

Answer: C

14. Which command can be used in Linux to capture network packets?

• A. netstat
• B. tcpdump
• C. ifconfig
• D. ping
ceh-v13 prep questions. Jorge - www.youtube.com/@itbestpractice2741

Answer: B

15. What is the default port for unencrypted HTTP traffic, which may be captured by
sniffers?

• A. 443
• B. 20
• C. 22
• D. 80

Answer: D

16. Which protocol is most commonly used in sniffing for session hijacking?

• A. ICMP
• B. TCP
• C. UDP
• D. ARP

Answer: B

17. Which countermeasure helps prevent packet sniffing on a network?

• A. Enable port forwarding


• B. Use HTTPS and SSH protocols
• C. Use plain-text authentication
• D. Implement hub-based networking

Answer: B

18. Which attack sends a continuous flood of ARP requests to a switch?

• A. MAC flooding
• B. DNS poisoning
• C. SYN flood
• D. Smurf attack

Answer: A

19. Which method is effective in detecting sniffers on the same network segment?

• A. Send a malformed DNS request


ceh-v13 prep questions. Jorge - www.youtube.com/@itbestpractice2741

• B. Use anti-virus software


• C. Broadcast a fake ARP request and analyze responses
• D. Perform OSINT on public records

Answer: C

20. What type of attack occurs when a sniffer modifies the traffic in real time?

• A. Passive sniffing
• B. Active sniffing
• C. Port mirroring
• D. Traffic shaping

Answer: B

21. Which sniffing tool is primarily used in GUI-based packet inspection?

• A. Netcat
• B. Wireshark
• C. hping3
• D. curl

Answer: B

22. Which of the following describes sniffing encrypted traffic over HTTPS?

• A. It reveals usernames and passwords in plaintext


• B. Only IP headers can be viewed, not payloads
• C. It reveals session cookies easily
• D. Full decryption is automatic

Answer: B

23. Which attack involves intercepting a communication between two systems and injecting
data?

• A. Passive sniffing
• B. Packet fragmentation
• C. Man-in-the-middle attack
• D. Spoofed DNS request

Answer: C
ceh-v13 prep questions. Jorge - www.youtube.com/@itbestpractice2741

24. Which of the following makes sniffing on wireless networks easier for attackers?

• A. Use of WPA2 encryption


• B. Broadcasting SSIDs
• C. Disabling DHCP
• D. Segmenting traffic with VLANs

Answer: B

You might also like