Pre - Test Question

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

CERTIFIED ETHICAL HACKER TEST

1. There are different types of network architecture. A point-to-point link is where each device is A
to all others via a link. A dedicated circuit is established across a B is known as a C network and a
packet-switched network is where data is D called packets or messages based on the E strategy.

Kindly fill in the correct answers.

circuit-switched
store-and-forward
directly connected
set of links
split into blocks

2. Connecting between a router and a hub, a straight-through cable should be used.


A. True
B. False

3. What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the
“s”)?
A. That the site has special high definition
B. That the site has a new version installed
C. That information entered into the site is encrypted
D. None of the above

4. Which of the following four passwords is the most secure?


A. Admin1234
B. W!th0uTm3
C. QweRtY74
D. 18SeP93

5. Criminals access someone’s computer and encrypt the user’s personal files and data. The user is
unable to access this data unless they pay the criminals to decrypt the files. This practice is called
__________
A. Phishing
B. DDOS
C. Password Cracking
D. Ransomware

6. What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?
A. Keylogging
B. Phishing attacks
C. Packet sniffing
D. Not sure
7. You see a non-familiar face in the access-controlled areas of our office, the person does not have
the MGL ID/Visitor/Staff/Vendor tag with him. What would you do?
A. Ignore them as it is none of my business.
B. Be courteous. Ask if the person is lost and show the person around the premise.
C. Raise a security incident and go back doing your work
D. Escort the person to the security and raise a security incident

8. A vulnerability means an inherent weakness in the system. How have we reduced the
vulnerability of outside attacks to our network?
A. By using antivirus
B. By using firewalls
C. By implementing security policy
D. By installing a good router

9. Match the correct description of the different type of network.


Type Description

It connects and covers the whole city. E.g. TV Cable connection over
PAN (Personal Area
the city
Network)
It spans a large geographical area, often a country or continent. The
LAN (Local Area
Internet is the largest WAN
Network)
It is a privately owned network that operates within and nearby a
MAN (Metropolitan Area
single building like a home, office, or factory
Network)
Let devices connect and communicate over the range of a person.
WAN (Wide Area
E.g. connecting Bluetooth devices.
Network)

10. Match the correct description of the different type of network


NETWORK TOPOLOGY DESCRIPTION
Each node is connected to exactly two nodes forming a ring
structure. If one of the nodes are damaged, it will damage the
whole network. It is used very rarely as it is expensive and hard to
install and manage

All the nodes are connected using the central link. It is useful to
connect a smaller number of devices. If the main cable gets
damaged, it will damage the whole network.

All the nodes are connected to one single node known as the
central node. Easy to troubleshoot but if the central node fails the
complete network is damaged. Mainly used in home and office
networks.

Each node is connected to one or many nodes. It is robust as


failure in one link only disconnects that node. It is rarely used and
installation and management are difficult.

You might also like