CEH Notes 01 Flashcards
Quiz 1: Which port number is used by HTTP?
A. 80
B. 443
C. 23
D. 161
Answer: A. 80
Quiz 2: Which port number is used by HTTPS?
A. 80
B. 443
C. 23
D. 161
Answer: B. 443
Quiz 3: Which port numbers are used by FTP?
A. 20, 21
B. 23, 25
C. 80, 443
D. 123, 456
Answer: A. 20, 21
Quiz 4: Which port number is used by Telnet?
A. 20
B. 21
C. 22
D. 23
Answer: D. 23
Quiz 5: Which port number is used by SSH?
A. 20
B. 21
C. 22
D. 23
Answer: C. 22
Quiz 6: Which port number is used by DNS for queries and replies?
A. 53
B. 123
C. 161
D. 389
Answer: A. 53
Quiz 7: Which port number is used by DNS for zone transfers?
A. 53
B. 80
C. 161
D. 389
Answer: A. 53
Quiz 8: Which port number is used by NTP?
A. 20
B. 21
C. 22
D. 123
Answer: D. 123
Quiz 9: Which port number is used by RDP?
A. 20
B. 21
C. 22
D. 3389
Answer: D. 3389
Quiz 10: Which port number is used by HP JetDirect?
A. 80
B. 443
C. 23
D. 9100
Answer: D. 9100
Quiz 11: Which port number is used by LDAP?
A. 389
B. 636
C. 161
D. 445
Answer: A. 389
Quiz 12: Which port number is used by LDAPS?
A. 636
B. 389
C. 161
D. 445
Answer: A. 636
Quiz 14: Which port number is used by SYSLOG?
A. 53
B. 161
C. 514
D. 3389
Answer: C. 514
Quiz 15: Which port numbers are used by MS SQL Server?
A. 80, 443
B. 123, 456
C. 1433, 1434
D. 3306, 3307
Answer: C. 1433, 1434
Quiz 16: Which port number is used by MySQL?
A. 3306
B. 389
C. 161
D. 445
Answer: A. 3306
Quiz 17: Which port number is used by Oracle DB?
A. 1521
B. 3306
C. 53
D. 3389
Answer: A. 1521
Quiz 18: Which port number is used by SMB?
A. 80
B. 443
C. 23
D. 445
Answer: D. 445
Quiz 19: Which port numbers are used by NetBIOS?
A. 20, 21, 22
B. 53, 161, 445
C. 137, 138, 139
D. 1433, 1434, 3306
Answer: C. 137, 138, 139
Quiz 1: Which phase of the Cyber Kill Chain involves collecting as much information as possible about the target?
A. Reconnaissance
B. Delivery
C. Exploitation
D. Command and Control
Answer: A. Reconnaissance
Quiz 2: Which phase of the Cyber Kill Chain involves selecting or creating a malicious payload or exploit?
A. Weaponization
B. Installation
C. Actions on Objectives
D. Delivery
Answer: A. Weaponization
Quiz 3: Which phase of the Cyber Kill Chain involves sending the weapon to the victim?
A. Reconnaissance
B. Installation
C. Delivery
D. Command and Control
Answer: C. Delivery
Quiz 4: Which phase of the Cyber Kill Chain involves exploiting a client-side vulnerability to gain remote access to the target system?
A. Exploitation
B. Installation
C. Reconnaissance
D. Command and Control
Answer: A. Exploitation
Quiz 5: Which phase of the Cyber Kill Chain involves downloading and installing more malware to create a backdoor?
A. Reconnaissance
B. Actions on Objectives
C. Installation
D. Delivery
Answer: C. Installation
Quiz 6: Which phase of the Cyber Kill Chain involves establishing a 2-way communication channel between the victim and attacker’s computers?
A. Delivery
B. Command and Control
C. Reconnaissance
D. Exploitation
Answer: B. Command and Control
Quiz 7: Which phase of the Cyber Kill Chain is the final objective of the attack?
A. Delivery
B. Installation
C. Actions on Objectives
D. Reconnaissance
Answer: C. Actions on Objectives
Quiz 1: Which class of hacker is an ethical hacker who tests systems with permission to find vulnerabilities and help fix them?
A. White Hat
B. Gray Hat
C. Black Hat
D. Script Kiddie
Answer: A. White Hat
Quiz 2: Which class of hacker falls between the white and black hat categories and may test systems without permission but may disclose vulnerabilities to the vendor?
A. White Hat
B. Gray Hat
C. Black Hat
D. Script Kiddie
Answer: B. Gray Hat
Quiz 3: Which class of hacker is an unethical hacker who uses his/her knowledge of security to break into systems and gain unauthorized access for personal gain?
A. White Hat
B. Gray Hat
C. Black Hat
D. Script Kiddie
Answer: C. Black Hat
Quiz 4: Which class of attacker is unskilled and uses pre-existing tools and scripts to perform attacks without understanding the underlying concepts?
A. White Hat
B. Gray Hat
C. Black Hat
D. Script Kiddie
Answer: D. Script Kiddie
Quiz 5: Which class of hacker is not related to the concept of hacker classification?
A. White Hat
B. Gray Hat
C. Black Hat
D. Red Hat
Answer: D. Red Hat
Quiz 1: In which phase of hacking is information about the target gathered through open source intelligence, scanning, and enumeration?
A. Gaining Access
B. Scanning
C. Clearing Tracks
D. Reconnaissance
Answer: D. Reconnaissance
Quiz 2: Which phase of hacking involves looking for vulnerabilities in the target network or system using tools and techniques such as port scanning, vulnerability scanning, and fingerprinting?
A. Clearing Tracks
B. Gaining Access
C. Scanning
D. Reconnaissance
Answer: C. Scanning
Quiz 3: In which phase of hacking does the attacker exploit vulnerabilities to gain unauthorized access to the target system or network?
A. Maintaining Access
B. Gaining Access
C. Scanning
D. Reconnaissance
Answer: B. Gaining Access
Quiz 3: In which phase of hacking does the attacker exploit vulnerabilities to gain unauthorized access to the target system or network?
A. Maintaining Access
B. Gaining Access
C. Scanning
D. Reconnaissance
Answer: B. Gaining Access
Quiz 5: What is the use of multiple layers of defense, such as firewalls, intrusion detection/prevention systems, and access controls, to protect against attacks and minimize the impact of any successful attacks?
A. Defense in Depth
B. Gaining Access
C. Scanning
D. Clearing Tracks
Answer: A. Defense in Depth
Quiz 6: What are the three levels of knowledge and access granted to the penetration tester during the testing process?
A. Red, Blue, Yellow
B. White, Gray, Black Box
C. Alpha, Beta, Gamma
D. A, B, C
Answer: B. White, Gray, Black Box
Quiz 1: What is the risk assessment approach that considers threats, defenses, and the likelihood and impact of an incident?
A. Quantitative risk assessment
B. Single Loss Expectancy
C. Qualitative assessment
D. Annual Loss Expectancy
Answer: C. Qualitative assessment
Quiz 2: What is the risk assessment approach where dollar values are assigned to assets in order to calculate the potential financial loss in the event of an incident?
A. Quantitative risk assessment
B. Single Loss Expectancy
C. Qualitative assessment
D. Annual Loss Expectancy
Answer: A. Quantitative risk assessment
Quiz 3: What calculation is used in quantitative risk assessments to determine the expected financial loss if a specific asset is lost?
A. Annual Loss Expectancy (ALE)
B. Single Loss Expectancy (SLE)
C. Exposure Factor (EF)
D. Asset Value (AV)
Answer: B. Single Loss Expectancy (SLE)