CEH Notes 03 Flashcards
Quiz: Which of the following is a type of Trojan that allows a hacker to remotely control a victim’s computer?
A. Wrapper/Binder Program
B. RAT
C. Botnet Trojan
D. Virus
Answer: B. RAT
Quiz: Which of the following is a type of Trojan that takes over a machine and allows it to be remote-controlled as part of a botnet?
A. Wrapper/Binder Program
B. RAT
C. Botnet Trojan
D. Virus
Answer: C. Botnet Trojan
Quiz: Which of the following is a type of malware that attaches to other programs and files and requires a host application to replicate?
A. Wrapper/Binder Program
B. RAT
C. Botnet Trojan
D. Virus
Answer: D. Virus
Quiz: Which of the following self-replicates by attaching to another program, boot sector of the HDD, or document?
A. Wrapper/Binder Program
B. RAT
C. Botnet Trojan
D. Virus
Answer: D. Virus
Quiz: Which type of virus inserts itself into the “white-space” of programs to avoid detection?
A. Multipartite virus
B. Macro virus
C. Encryption virus
D. Cavity virus
Answer: D. Cavity virus
Quiz: Which type of virus actively alters and corrupts service call interrupts to disguise itself from the OS and from signature-based detection?
A. Boot Sector Virus
B. Stealth/Tunneling virus
C. Polymorphic/Metamorphic virus
D. Macro virus
Answer: B. Stealth/Tunneling virus
Quiz: Which type of virus uses two or more methods to spread, such as infecting both files and the boot sector?
A. Multipartite virus
B. Encryption virus
C. Cavity virus
D. Polymorphic/Metamorphic virus
Answer: A. Multipartite virus
Quiz: Which type of virus attaches to Microsoft Office documents and other programs in the form of macros?
A. Multipartite virus
B. Macro virus
C. Boot Sector Virus
D. Encryption virus
Answer: B. Macro virus
Quiz: Which type of virus can change its own code and cipher itself many times as it replicates, using a different key for encryption for each infected file?
A. Boot Sector Virus
B. Encryption virus
C. Cavity virus
D. Polymorphic/Metamorphic virus
Answer: B. Encryption virus
Quiz: What is a worm?
A. Malware that encrypts your files and holds them for ransom
B. Malware that scares the victim into installing software or performing some action
C. Automated malware that can spread through your network by taking advantage of network vulnerabilities
D. An attack technique that uses existing, built-in OS tools and utilities to launch attacks
Answer: C. Automated malware that can spread through your network by taking advantage of network vulnerabilities
Quiz: What is Ransomware?
A. Malware that encrypts your files and holds them for ransom
B. Malware that scares the victim into installing software or performing some action
C. Automated malware that can spread through your network by taking advantage of network vulnerabilities
D. An attack technique that uses existing, built-in OS tools and utilities to launch attacks
Answer: A. Malware that encrypts your files and holds them for ransom
Quiz: What is Scareware?
A. Malware that encrypts your files and holds them for ransom
B. Malware that scares the victim into installing software or performing some action
C. Automated malware that can spread through your network by taking advantage of network vulnerabilities
D. An attack technique that uses existing, built-in OS tools and utilities to launch attacks
Answer: B. Malware that scares the victim into installing software or performing some action
Quiz: What is File-less malware?
A. Malware that encrypts your files and holds them for ransom
B. Malware that scares the victim into installing software or performing some action
C. Automated malware that can spread through your network by taking advantage of network vulnerabilities
D. An attack technique that uses existing, built-in OS tools and utilities to launch attacks
Answer: D. An attack technique that uses existing, built-in OS tools and utilities to launch attacks
Quiz: What is VirusTotal?
A. A cloud-based malware detection service
B. A behavior-based malware detection technique
C. A signature-based malware detection technique
D. An on-premises malware detection service
Answer: A. A cloud-based malware detection service
Quiz: What is a Signature-based malware detection technique?
A. A malware detection technique that sends the files to be scanned up to a cloud-based scanning service
B. A malware detection technique that analyzes the behavior of a program to determine if it is malicious
C. A malware detection technique that looks for known patterns of code or data within a file to identify it as malicious
D. A malware detection technique that relies on the user to report suspicious files or activities
Answer: C. A malware detection technique that looks for known patterns of code or data within a file to identify it as malicious
Quiz: What is Packet sniffing?
A. A technique to capture and analyze network traffic
B. A way to hide network traffic from attackers
C. A way to filter network traffic based on its source or destination
D. A way to block network traffic from specific IP addresses
Answer: A. A technique to capture and analyze network traffic
Quiz: What is the difference between active and passive sniffing?
A. Passive sniffing requires you to actively do something to get copies of other people’s packets, while active sniffing does not require any action.
B. Active sniffing requires you to actively do something to get copies of other people’s packets, while passive sniffing does not require any action.
C. Passive sniffing is only possible on switches, while active sniffing is only possible on hubs.
D. Active sniffing is more reliable than passive sniffing.
Answer: B. Active sniffing requires you to actively do something to get copies of other people’s packets, while passive sniffing does not require any action.
Quiz: What is Promiscuous mode?
A. A mode that blocks network traffic from specific IP addresses
B. A mode that filters network traffic based on its source or destination
C. A mode that ignores other people’s traffic unless you put your NIC into it
D. A mode that hides your network traffic from attackers
Answer: C. A mode that ignores other people’s traffic unless you put your NIC into it
Quiz 1: What is the difference between a hub and a switch when it comes to sniffing traffic?
A. A hub requires active sniffing, while a switch requires passive sniffing.
B. A switch requires active sniffing, while a hub requires passive sniffing.
C. Both a hub and a switch require active sniffing to capture traffic.
D. Both a hub and a switch require passive sniffing to capture traffic.
Answer: B. A switch requires active sniffing, while a hub requires passive sniffing.
Quiz 2: What is a SPAN/Mirrored port?
A. A device that is used to connect multiple hubs together in a network.
B. A port on a switch that is used to monitor all network traffic.
C. A tool that is used to detect and prevent MAC flooding attacks.
D. A method for spoofing your IP address to appear like another device.
Answer: B. A port on a switch that is used to monitor all network traffic.
Quiz 3: What is MAC flooding?
A. A method for spoofing your IP address to appear like another device.
B. A tool that is used to detect and prevent ARP poisoning attacks.
C. A technique for filling up a switch’s CAM (MAC address) table with fake MAC addresses.
D. A method for monitoring all network traffic using a mirrored port.
Answer: C. A technique for filling up a switch’s CAM (MAC address) table with fake MAC addresses.
Quiz 4: What is ARP poisoning?
A. A technique for filling up a switch’s CAM (MAC address) table with fake MAC addresses.
B. A tool that is used to detect and prevent MAC flooding attacks.
C. A method for spoofing your IP address to appear like another device.
D. A method for monitoring all network traffic using a mirrored port.
Answer: C. A method for spoofing your IP address to appear like another device.
Quiz 1: What is the Rogue router attack?
A. A technique for configuring the “priority” value on a switch to become the “Root Bridge”
B. A technique for forging many DHCP requests to use up all the valid IP’s
C. A technique for placing a rogue router on the network and convincing other routers to send traffic through
Answer: C. A technique for placing a rogue router on the network and convincing other routers to send traffic through
Quiz 2: What is the DHCP Starvation attack?
A. A technique for configuring the “priority” value on a switch to become the “Root Bridge”
B. A technique for forging many DHCP requests to use up all the valid IP’s
C. A technique for placing a rogue router on the network and convincing other routers to send traffic through
Answer: B. A technique for forging many DHCP requests to use up all the valid IP’s