CEH Flashcards
What protocol does traceroute use by default when sending a test message to a target host on Unix/Linux systems?
UDP is used in a traceroute request on Unix/Linux systems while ICMP is used in a tracert command on Windows systems.
Wireless standard 802.11a has an operating speed of how many Mbps?
54Mbps
Wireless standard 802.11g has an operating speed of how many Mbps?
54Mbps
Wireless standard 802.11a has a maximum range of how many feet indoors?
75 feet
Wireless standard 802.11b has an operating speed of how many Mbps?
11Mbps
Which wireless standard has a range of 25 to 75 feet indoors?
802.11a
Which 802.11 wireless standards use the OFDM modulation type?
802.11a, 802.11g, and 802.11n wireless standards use the OFDM modulation type.
The wireless standards 802.11b and 802.11g both use what wireless frequency?
2.4GHz
The wireless standard 802.11n has a range of how many feet indoors?
175+ feet
What is the correct order of scanning methodology?
Check for live systems, check for open ports, scan beyond IDS, perform banner grabbing, scan for vulnerabilities, draw network diagrams, prepare proxies
What are the steps in the vulnerability life cycle according to ECC?
Creating a baseline, vulnerability assessment, risk assessment, remediation, verification, monitor
Fingerprinting VPN firewalls is possible with which of the following tools?
Ike-scan
What is a client-server tool utilized to evade firewall inspection?
tcp-over-dns
Pentest results indicate that voice over IP traffic is traversing a network. Which tool will decode a packet capture and extract the voice conversations?
Cain
A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?
BBProxy
Which protocol and port number might be needed in order to send log messages to a log analysis tool that resides behind a firewall?
UDP 514
Which Windows system tool checks integrity of critical files that has been digitally signed by Microsoft?
sigverif.exe
What tool can crack Windows SMB passwords simply by listening to network traffic?
L0phtcrack. This is possible with a SMB packet capture module for L0phtcrack and a known weaknesses in the LM hash algorithm.
What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?
All are DDOS tools.
Jacob would like your advice on using a wireless hacking tool that can save him time and get him better results with lesser packets. You would like to recommend a tool that uses KoreK’s implementation. Which tool would you recommend from the list below?
Aircrack. Implementing KoreK’s attacks as well as improved FMS, aircrack provides the fastest and most effective statistical attacks available.
What is the tool Firewalk used for?
To determine what rules are in place for a firewall. Firewalk is an active reconnaissance network security tool that attempts to determine what layer 4 protocols a given IP forwarding device “firewall” will pass. Firewalk works by sending out TCP or UDP packets with a TTL one greater than the targeted gateway. If the gateway allows the traffic, it will forward the packets to the next hop where they will expire and elicit an ICMP_TIME_EXCEEDED message. If the gateway host does not allow the traffic, it will likely drop the packets and no response will be returned.
You gained a copy of both the plain-text and corresponding cipher-text messages and want to use this information to figure out the key that has been used. What kind of cryptographic attack are you conducting?
Known plain-text attack. In a known plain-text attack, you use a copy of both the plain-text and corresponding cipher-text messages and want to use this information to figure out the key that has been used.
You decide to conduct a chosen cipher attack. How would you go about conducting this attack?
Choose a cipher-text message and use comparative analysis with multiple keys and a plain-text version to figure out the correct key. In a chosen cipher attack, an attacker would typically choose a single cipher-text message and then use comparative analysis with multiple keys and a plain-text version of the chosen message. The overall goal is to use comparative analysis on these two versions of the message, along with multiple keys, to discover the correct key.
You are on a pen test assignment and just launched a chosen plain-text attack and gained access to the key. What did you do during this attack to gain the key?
Encrypted various plain-text copies yourself. During a chosen plain-text attack, an attacker encrypts various plain-text copies on their own in order to gain a key.