CEH Flashcards

1
Q

What protocol does traceroute use by default when sending a test message to a target host on Unix/Linux systems?

A

UDP is used in a traceroute request on Unix/Linux systems while ICMP is used in a tracert command on Windows systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless standard 802.11a has an operating speed of how many Mbps?

A

54Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wireless standard 802.11g has an operating speed of how many Mbps?

A

54Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wireless standard 802.11a has a maximum range of how many feet indoors?

A

75 feet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless standard 802.11b has an operating speed of how many Mbps?

A

11Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which wireless standard has a range of 25 to 75 feet indoors?

A

802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which 802.11 wireless standards use the OFDM modulation type?

A

802.11a, 802.11g, and 802.11n wireless standards use the OFDM modulation type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The wireless standards 802.11b and 802.11g both use what wireless frequency?

A

2.4GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The wireless standard 802.11n has a range of how many feet indoors?

A

175+ feet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the correct order of scanning methodology?

A

Check for live systems, check for open ports, scan beyond IDS, perform banner grabbing, scan for vulnerabilities, draw network diagrams, prepare proxies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the steps in the vulnerability life cycle according to ECC?

A

Creating a baseline, vulnerability assessment, risk assessment, remediation, verification, monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fingerprinting VPN firewalls is possible with which of the following tools?

A

Ike-scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a client-server tool utilized to evade firewall inspection?

A

tcp-over-dns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pentest results indicate that voice over IP traffic is traversing a network. Which tool will decode a packet capture and extract the voice conversations?

A

Cain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?

A

BBProxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which protocol and port number might be needed in order to send log messages to a log analysis tool that resides behind a firewall?

A

UDP 514

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which Windows system tool checks integrity of critical files that has been digitally signed by Microsoft?

A

sigverif.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What tool can crack Windows SMB passwords simply by listening to network traffic?

A

L0phtcrack. This is possible with a SMB packet capture module for L0phtcrack and a known weaknesses in the LM hash algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?

A

All are DDOS tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Jacob would like your advice on using a wireless hacking tool that can save him time and get him better results with lesser packets. You would like to recommend a tool that uses KoreK’s implementation. Which tool would you recommend from the list below?

A

Aircrack. Implementing KoreK’s attacks as well as improved FMS, aircrack provides the fastest and most effective statistical attacks available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the tool Firewalk used for?

A

To determine what rules are in place for a firewall. Firewalk is an active reconnaissance network security tool that attempts to determine what layer 4 protocols a given IP forwarding device “firewall” will pass. Firewalk works by sending out TCP or UDP packets with a TTL one greater than the targeted gateway. If the gateway allows the traffic, it will forward the packets to the next hop where they will expire and elicit an ICMP_TIME_EXCEEDED message. If the gateway host does not allow the traffic, it will likely drop the packets and no response will be returned.

22
Q

You gained a copy of both the plain-text and corresponding cipher-text messages and want to use this information to figure out the key that has been used. What kind of cryptographic attack are you conducting?

A

Known plain-text attack. In a known plain-text attack, you use a copy of both the plain-text and corresponding cipher-text messages and want to use this information to figure out the key that has been used.

23
Q

You decide to conduct a chosen cipher attack. How would you go about conducting this attack?

A

Choose a cipher-text message and use comparative analysis with multiple keys and a plain-text version to figure out the correct key. In a chosen cipher attack, an attacker would typically choose a single cipher-text message and then use comparative analysis with multiple keys and a plain-text version of the chosen message. The overall goal is to use comparative analysis on these two versions of the message, along with multiple keys, to discover the correct key.

24
Q

You are on a pen test assignment and just launched a chosen plain-text attack and gained access to the key. What did you do during this attack to gain the key?

A

Encrypted various plain-text copies yourself. During a chosen plain-text attack, an attacker encrypts various plain-text copies on their own in order to gain a key.

25
A penetration tester is performing a vulnerability assessment. They started by building an inventory of protocols found in the system and have started to determine what services are attached to those parts. After finding those services, the pen tester will determine the vulnerabilities that most affect each machine in order to execute the relevant tests. This approach to vulnerability assessments is called what?
Inference-based assessment. Inference-based assessments start with the auditor investigating the system or network they are working on and scanning it to build an inventory of protocols used. From this information, they can determine what services are using the ports and what applications/functionality may be at work. After determining the services and applications, the pen tester can tailor the testing strategy to those specific items to ensure a more efficient assessment.
26
You just finished conducting your risk assessment. What is the next step that you would take in the vulnerability assessment life cycle?
Remediation. After conducting a risk assessment, you would typically begin to remediate vulnerabilities based on their severity.
27
Which vulnerability assessment would start by building on inventory of the protocols found and then develop a profile in order to execute only the relevant tests?
Inference-based. In an inference-based assessment, scanning begins with developing an inventory of protocols found on the machine. After locating the protocols, the scanning process begins to determine what ports are attached to the discovered services, such as whether it is a web, email, or database server. After isolating the services, it then selects the vulnerabilities on each machine and executes only the relevant tests.
28
Which is a U.S. government repository of standards based on vulnerability management data?
NVD. The National Vulnerability Database (NVD) is a repository owned by the U.S. government which houses standards-based vulnerability managment data represented using the Security Content Automation Protocol (SCAP). It provides an ability to automate vulnerability management, security measurement and compliance. It has troves of information in various databases such as security checklist references, software flaws, potential misconfigurations, produc names, and impact metrics.
29
Which of the following would not be in the post-assessment phase of the vulnerability managment life cycle.
Baseline. After completing the vulnerability assessment, it is important to properly analyze the results, remedy any discovered vulnerabilities appropriately, ensure they are resolved, and then continue to monitor. The post-assessment phase in the vulnerability management life cycle contain the following: - Risk Assessment - Remediation - Verification - Monitoring
30
What is an example of an application layer attack?
Slowloris. In a slowloris attack, the attacker sends a large number of partial HTTP requests to the target web server or application. In response, the target server opens up connections with each request, waiting for them to complete. However, the connections will never be complete and close, and therefore, the server will reach its maximum concurrent connection pool and additional attempts will be denied.
31
A malicious actor is looking to take down a competitor's website. He has attempted a ping of death attack on the server, and the web server has frozen. What would be the appropriate mitigation technique?
Add a check to the packet reassembly process to verify packet size is not over the maximum. A ping of death (PoD) attack is where an attacker sends an oversize pocket via the ping command. For example, if an attacker sends a packet with a size of 65,536 bytes, it might cause the system to crash during reassembly, since the packet size limit prescribed by RFC 791 IP states that packet sized should be 65,535 bytes. To mitigate this attack, an administrator would configure hosts to check the packet size before reassembly.
32
A pen tester is looking to verify that the firewalls of Acme Inc. can handle potential protocol-based DoS attacks directed at them and at other devices like load balancers and application servers. Which of the following would not be a protocol-based DoS attack that the tester would conduct?
ICMP flood. An ICMP flood is considered a volumetric attack that seeks to consume the bandwidth of the target network or service. In contrast, a protocol attack such as a SYN flood, ACK flood, or TCP state exhaustion look to consume other types of resources, such as connection state tables that are present in infrastructure components on the network, including firewalls, load balancers, and application servers.
33
A network administrator determines that the organization's public web store is receiving a slowloris attack, makint it unavailable to legitimate customers. Which of the following methods would be an appropriate mitigation technique?
Implement a timeout for open connections. In a slowloris attack, an attacker sends a multitude of HTTP requests to the target web server but never completes the connection. As the connection stays open, with the server awaiting communications, the attacker then sends another HTTP request and another. The server responds to each request by opening a connection, but since they are never being closed, the server reaches its concurrent connection limit and starts rejecting all connections.
34
How does a SYN flood work?
It utilizes a flaw in the TCP three-way hanshake. A SYN flood takes advantage of the way SYN commands are handled. When a computer recieves a SYN request, it must hold the connection in the "listen queue" for at least 75 seconds. So, if an attacker sends many SYN commands, the target's queue will be quickly filled up and thus, unable to make legitimate connections.
35
Which is the second leading IoT vulnerability according to OWASP?
Insufficient authentication authorization
36
What are the top 4 OWASP IoT vulnerabilities?
1. Insecure web interface 2. Insufficient authentication/authorization 3. Insecure network services 4. Lack of transport encryption/integrity verification
37
You want to launch attacks against a vulnerable IoT device. What is an example of a tool that would achieve this?
Firmalyzer. Firmalyzer is a useful tool that allows you to conduct active security assessments on IoT devices. A few other tools for launching attacks include KillerBee, JTAGulator, and Attify Zigbee Framework.
38
Clear-text credentials, third-party encryption, and encryption keys affect which IoT attack suface areas?
Device Memory
39
What are the layers in the IoT architecture according to the EC Council?
The Internet of Things (IoT) refers to the network of Internet-connected devices with embedded sensors and processors. The architecture on which they function typically consists of 5 layers according to the EC-Council: - Application Layer - Middleware Layer - Internet Layer - Access Gateway Layer - Edge Technology Layer
40
What are the IoT communication models as described by the EC-Council?
There are 4 typical IoT Communication Models: - Device-to-Device Model: An example would be a light switch being wirelessly connected with a WiFi light bulb. - Device-to-Cloud Model: An example could be a temperature sensor connected to an Application Service Provider's cloud. - Devide-to-Gateway Model: An example would be where an IoT device transfers the data to a gateway which may or may not communicate that data with a cloud for additional access - Back-end Data-Sharing Model: An example of this model would be where an IoT light sensor is connected to a readily available Application Service provider #1 who enables other service providers to access and utilize Application Service provider #1's data
41
A utility provider has a hardware sensor that detects humidity, temperature, and UV exposure for their own utility poles but they also allow this data to be accessed by third party service providers for their own purposes. This is an example of which IoT Communication model?
Back-end Data-Sharing model
42
Which Nmap switch performs an IP protocol scan?
-sO
43
What is the function of the Nmap command -Pn 10.0.0.8/24?
Tells Nmap to skip the discovery stage entirely and just test all IPs within 10.0.0.8/24 (i.e. no ping scan).
44
What is the function of the Nmap command -sn 10.0.0.8/24?
Runs a discovery scan and no port scan on the target network of 10.0.0.8/24.
45
Which Nmap switch is for NO ping?
-Pn
46
What is the correct switch for Nmap to perform a TCP NULL scan?
-sN
47
Which Nmap switch is for TCP SYN pinging?
-PS
48
What is the function of the command nmap-sL 10.0.0.8/24?
Runs a DNS scan on the target subnet 10.0.0.8/24.
49
Which Nmap switch performs a TCP ACK scan?
-sA
50
Which switch tells Nmap to perform a TCP FIN scan?
-sF
51
Which command line switch tells Nmap to perform a TCP XMAS scan?
-sX