Cristian Osvaldo Gómez
Quiz by , created more than 1 year ago

ceh

724
0
0
Cristian Osvaldo Gómez
Created by Cristian Osvaldo Gómez about 2 years ago
Close

Test CEH 3

Question 1 of 20

1

Abel, a security professional, conducts penetration testing in his client organization to check for any security loopholes. He launched an attack on the DHCP servers by broadcasting forged DHCP requests and leased all the DHCP addresses available in the DHCP scope until the server could not issue any more IP addresses. This led to a DoS attack, and as a result, legitimate employees were unable to access the client's network. Which of the following attacks did Abel perform in the above scenario?

Select one of the following:

  • DHCP starvation

  • VLAN hopping

  • Rogue DHCP server attack

  • STP attack

Explanation

Question 2 of 20

1

What is the file that determines the basic configuration (Specifically activities, services, broadcast receivers, etc..) in an Android application?

Select one of the following:

  • resources.asrc

  • classes.dex

  • Androidmanifest.xml

  • APK.info

Explanation

Question 3 of 20

1

Which of the following protocols can be used to secure an LDAP service against anonymous queries?

Select one of the following:

  • RADIUS

  • SSO

  • NTLM

  • WPA

Explanation

Question 4 of 20

1

When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's Computer to update the router configuration. What type of an alert is this?

Select one of the following:

  • False negative

  • True negative

  • False positive

  • True positive

Explanation

Question 5 of 20

1

Suppose that you test an application for the SQL injection vulnerability. You know that the backend database is based on Microsoft SQL Server. In the login/password form. you enter the following credentials:
Username: attack' or 1-1 --
Password: 123456
Based on the above credentials, which of the following SQL commands are you expecting to be executed by the server, if there is indeed an SQL injection vulnerability?

Select one of the following:

  • select * from Users where UserName = 'attack’ or 1=1--’ and UserPassword=’123456’

  • select from Users where UserName = 'attack or 1-1 - and UserPassword = '123456

  • select from Users where UserName = 'attack or 1=1 -- and UserPassword = '123456"

  • select from Users where UserName = 'attack" or 1=1 -- and UserPassword = '123456"

Explanation

Question 6 of 20

1

Jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However, Jane has a long, complex password on her router. What attack has likely occurred?

Select one of the following:

  • Evil twin

  • Wardriving

  • Piggybacking

  • Wireless sniffing

Explanation

Question 7 of 20

1

The network users are complaining because their systems are slowing down. Further every time they attempt to go to a website, they receive a series of pop-ups with advertisements. What type of malware have the systems been infected with?

Select one of the following:

  • Spyware

  • Virus

  • Adware

  • Spyware.

Explanation

Question 8 of 20

1

Ralph, a professional hacker, targeted Jane, who had recently bought new systems for her company. After a few days, Ralph contacted Jane while masquerading as a legitimate customer support executive, informing that her systems need to be serviced for proper functioning and that customer support will send a computer technician. Jane promptly replied positively. Ralph entered Jane's company using this opportunity and gathered sensitive information by scanning terminals for passwords, searching for important documents in desks, and rummaging bins.
What is the type of attack technique Ralph used on Jane?

Select one of the following:

  • Shoulder surfing

  • Impersonation

  • Eavesdropping

  • Dumpster diving

Explanation

Question 9 of 20

1

Susan, a software developer, wants her web API to update other applications with the latest information. For this purpose, she uses a user-defined HTTP callback or push APIs that are raised based on trigger events; when invoked, this feature supplies data to other applications so that users can instantly receive real-time information. Which of the following techniques is employed by Susan?

Select one of the following:

  • Web shells

  • SOAP API

  • Webhooks

  • REST API

Explanation

Question 10 of 20

1

If you send a TCP ACK segment to a known closed port on a firewall but it does not
respond with an RST, what do you know about the firewall you are scanning?

Select one of the following:

  • This event does notell you anything about the firewall

  • There is no firewall in place

  • It is a non-stateful firewall

  • It is a stateful firewall

Explanation

Question 11 of 20

1

There are multiple cloud deployment options depending on how isolated a customer's resources are from those of other customers. Shared environments share the costs and allow each customer to enjoy lower operations expenses. One solution is for a customer to join with a group of users or organizations to share a cloud environment. What is this cloud deployment option called?

Select one of the following:

  • Public

  • Private

  • Hybrid

  • Community

Explanation

Question 12 of 20

1

In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?

Select one of the following:

  • IDEA

  • MD5 encryption algorithm

  • Triple Data Encryption Standard

  • AES

Explanation

Question 13 of 20

1

Larry, a security professional in an organization, has noticed some abnormalities in the user accounts on a web server. To thwart evolving attacks, he decided to harden the security of the web server by adopting a few countermeasures to secure the accounts on the web server.
Which of the following countermeasures must Larry implement to secure the user accounts on the web server?

Select one of the following:

  • Limit the administrator or root-level access to the minimum number of users

  • Enable unused default user accounts created during the installation of an OS

  • Enable all non-interactive accounts that should exist but do not require interactive login

  • Retain all unused modules and application extensions

Explanation

Question 14 of 20

1

A post-breach forensic investigation revealed that a known vulnerability in Apache Struts was to blame for the Equifax data breach that affected 143 million customers. A fix was available from the software vendor for several months prior to the intrusion. This is likely a failure in which of the following security processes?

Select one of the following:

  • Security awareness training

  • Vendor risk management

  • Secure development lifecycle

  • Patch management

Explanation

Question 15 of 20

1

Harry, a professional hacker, targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection.
What is the APT lifecycle phase that Harry is currently executing?

Select one of the following:

  • Preparation

  • Persistence

  • Initial intrusion

  • Cleanup

Explanation

Question 16 of 20

1

This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve.
Which is this wireless security protocol?

Select one of the following:

  • WPA2-Personal

  • WPA3-Enterprise

  • WPA2-Enterprise

  • WPA3-Personal

Explanation

Question 17 of 20

1

Which of the following information security controls creates an appealing isolated
environment for hackers to prevent them from compromising critical targets while
simultaneously gathering information about the hacker?

Select one of the following:

  • Honeypot

  • Intrusion detection system

  • Botnet

  • Firewall

Explanation

Question 18 of 20

1

What would be the fastest way to perform content enumeration on a given web server by using the Gobuster tool?

Select one of the following:

  • Skipping SSL certificate verification

  • Performing content enumeration using the bruteforce mode and random file extensions

  • Performing content enumeration using the bruteforce mode and 10 threads

  • Performing content enumeration using a wordlist

Explanation

Question 19 of 20

1

Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed. What is the port scanning technique used by Sam to discover open ports?

Select one of the following:

  • IDLE/IPID header scan

  • TCP Maimon scan

  • ACK flag probe scan

  • Xmas scan

Explanation

Question 20 of 20

1

There have been concerns in your network that the wireless network component is not sufficiently secure. You perform a vulnerability scan of the wireless network and find that it is using an old encryption protocol that was designed to mimic wired encryption. What encryption protocol is being used?

Select one of the following:

  • WPA1

  • RADIUS

  • WEP

  • WPA3

Explanation