Test CEH 3

Description

ceh
Cristian Osvaldo Gómez
Quiz by Cristian Osvaldo Gómez, updated more than 1 year ago
Cristian Osvaldo Gómez
Created by Cristian Osvaldo Gómez about 2 years ago
724
0

Resource summary

Question 1

Question
Abel, a security professional, conducts penetration testing in his client organization to check for any security loopholes. He launched an attack on the DHCP servers by broadcasting forged DHCP requests and leased all the DHCP addresses available in the DHCP scope until the server could not issue any more IP addresses. This led to a DoS attack, and as a result, legitimate employees were unable to access the client's network. Which of the following attacks did Abel perform in the above scenario?
Answer
  • DHCP starvation
  • VLAN hopping
  • Rogue DHCP server attack
  • STP attack

Question 2

Question
What is the file that determines the basic configuration (Specifically activities, services, broadcast receivers, etc..) in an Android application?
Answer
  • resources.asrc
  • classes.dex
  • Androidmanifest.xml
  • APK.info

Question 3

Question
Which of the following protocols can be used to secure an LDAP service against anonymous queries?
Answer
  • RADIUS
  • SSO
  • NTLM
  • WPA

Question 4

Question
When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's Computer to update the router configuration. What type of an alert is this?
Answer
  • False negative
  • True negative
  • False positive
  • True positive

Question 5

Question
Suppose that you test an application for the SQL injection vulnerability. You know that the backend database is based on Microsoft SQL Server. In the login/password form. you enter the following credentials: Username: attack' or 1-1 -- Password: 123456 Based on the above credentials, which of the following SQL commands are you expecting to be executed by the server, if there is indeed an SQL injection vulnerability?
Answer
  • select * from Users where UserName = 'attack’ or 1=1--’ and UserPassword=’123456’
  • select from Users where UserName = 'attack or 1-1 - and UserPassword = '123456
  • select from Users where UserName = 'attack or 1=1 -- and UserPassword = '123456"
  • select from Users where UserName = 'attack" or 1=1 -- and UserPassword = '123456"

Question 6

Question
Jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However, Jane has a long, complex password on her router. What attack has likely occurred?
Answer
  • Evil twin
  • Wardriving
  • Piggybacking
  • Wireless sniffing

Question 7

Question
The network users are complaining because their systems are slowing down. Further every time they attempt to go to a website, they receive a series of pop-ups with advertisements. What type of malware have the systems been infected with?
Answer
  • Spyware
  • Virus
  • Adware
  • Spyware.

Question 8

Question
Ralph, a professional hacker, targeted Jane, who had recently bought new systems for her company. After a few days, Ralph contacted Jane while masquerading as a legitimate customer support executive, informing that her systems need to be serviced for proper functioning and that customer support will send a computer technician. Jane promptly replied positively. Ralph entered Jane's company using this opportunity and gathered sensitive information by scanning terminals for passwords, searching for important documents in desks, and rummaging bins. What is the type of attack technique Ralph used on Jane?
Answer
  • Shoulder surfing
  • Impersonation
  • Eavesdropping
  • Dumpster diving

Question 9

Question
Susan, a software developer, wants her web API to update other applications with the latest information. For this purpose, she uses a user-defined HTTP callback or push APIs that are raised based on trigger events; when invoked, this feature supplies data to other applications so that users can instantly receive real-time information. Which of the following techniques is employed by Susan?
Answer
  • Web shells
  • SOAP API
  • Webhooks
  • REST API

Question 10

Question
If you send a TCP ACK segment to a known closed port on a firewall but it does not respond with an RST, what do you know about the firewall you are scanning?
Answer
  • This event does notell you anything about the firewall
  • There is no firewall in place
  • It is a non-stateful firewall
  • It is a stateful firewall

Question 11

Question
There are multiple cloud deployment options depending on how isolated a customer's resources are from those of other customers. Shared environments share the costs and allow each customer to enjoy lower operations expenses. One solution is for a customer to join with a group of users or organizations to share a cloud environment. What is this cloud deployment option called?
Answer
  • Public
  • Private
  • Hybrid
  • Community

Question 12

Question
In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?
Answer
  • IDEA
  • MD5 encryption algorithm
  • Triple Data Encryption Standard
  • AES

Question 13

Question
Larry, a security professional in an organization, has noticed some abnormalities in the user accounts on a web server. To thwart evolving attacks, he decided to harden the security of the web server by adopting a few countermeasures to secure the accounts on the web server. Which of the following countermeasures must Larry implement to secure the user accounts on the web server?
Answer
  • Limit the administrator or root-level access to the minimum number of users
  • Enable unused default user accounts created during the installation of an OS
  • Enable all non-interactive accounts that should exist but do not require interactive login
  • Retain all unused modules and application extensions

Question 14

Question
A post-breach forensic investigation revealed that a known vulnerability in Apache Struts was to blame for the Equifax data breach that affected 143 million customers. A fix was available from the software vendor for several months prior to the intrusion. This is likely a failure in which of the following security processes?
Answer
  • Security awareness training
  • Vendor risk management
  • Secure development lifecycle
  • Patch management

Question 15

Question
Harry, a professional hacker, targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection. What is the APT lifecycle phase that Harry is currently executing?
Answer
  • Preparation
  • Persistence
  • Initial intrusion
  • Cleanup

Question 16

Question
This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve. Which is this wireless security protocol?
Answer
  • WPA2-Personal
  • WPA3-Enterprise
  • WPA2-Enterprise
  • WPA3-Personal

Question 17

Question
Which of the following information security controls creates an appealing isolated environment for hackers to prevent them from compromising critical targets while simultaneously gathering information about the hacker?
Answer
  • Honeypot
  • Intrusion detection system
  • Botnet
  • Firewall

Question 18

Question
What would be the fastest way to perform content enumeration on a given web server by using the Gobuster tool?
Answer
  • Skipping SSL certificate verification
  • Performing content enumeration using the bruteforce mode and random file extensions
  • Performing content enumeration using the bruteforce mode and 10 threads
  • Performing content enumeration using a wordlist

Question 19

Question
Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed. What is the port scanning technique used by Sam to discover open ports?
Answer
  • IDLE/IPID header scan
  • TCP Maimon scan
  • ACK flag probe scan
  • Xmas scan

Question 20

Question
There have been concerns in your network that the wireless network component is not sufficiently secure. You perform a vulnerability scan of the wireless network and find that it is using an old encryption protocol that was designed to mimic wired encryption. What encryption protocol is being used?
Answer
  • WPA1
  • RADIUS
  • WEP
  • WPA3
Show full summary Hide full summary

Similar

Modulo 1 CEH
Pico Pico menoriko
Macbeth Scene Summaries
Ebony1023
OCR GCSE Latin Vocab flash cards - all
jess99
George- Of mice and men
Elinor Jones
Cold War Causes Revision
Tom Mitchell
AS Economics Key Terms
Fred Clayton
Biology B1.1 - Genes
raffia.khalid99
What are they doing?
Tamara Urzhumova