CEH Notes 03 Flashcards
Quiz: Which of the following is a type of Trojan that allows a hacker to remotely control a victim’s computer?
A. Wrapper/Binder Program
B. RAT
C. Botnet Trojan
D. Virus
Answer: B. RAT
Quiz: Which of the following is a type of Trojan that takes over a machine and allows it to be remote-controlled as part of a botnet?
A. Wrapper/Binder Program
B. RAT
C. Botnet Trojan
D. Virus
Answer: C. Botnet Trojan
Quiz: Which of the following is a type of malware that attaches to other programs and files and requires a host application to replicate?
A. Wrapper/Binder Program
B. RAT
C. Botnet Trojan
D. Virus
Answer: D. Virus
Quiz: Which of the following self-replicates by attaching to another program, boot sector of the HDD, or document?
A. Wrapper/Binder Program
B. RAT
C. Botnet Trojan
D. Virus
Answer: D. Virus
Quiz: Which type of virus inserts itself into the “white-space” of programs to avoid detection?
A. Multipartite virus
B. Macro virus
C. Encryption virus
D. Cavity virus
Answer: D. Cavity virus
Quiz: Which type of virus actively alters and corrupts service call interrupts to disguise itself from the OS and from signature-based detection?
A. Boot Sector Virus
B. Stealth/Tunneling virus
C. Polymorphic/Metamorphic virus
D. Macro virus
Answer: B. Stealth/Tunneling virus
Quiz: Which type of virus uses two or more methods to spread, such as infecting both files and the boot sector?
A. Multipartite virus
B. Encryption virus
C. Cavity virus
D. Polymorphic/Metamorphic virus
Answer: A. Multipartite virus
Quiz: Which type of virus attaches to Microsoft Office documents and other programs in the form of macros?
A. Multipartite virus
B. Macro virus
C. Boot Sector Virus
D. Encryption virus
Answer: B. Macro virus
Quiz: Which type of virus can change its own code and cipher itself many times as it replicates, using a different key for encryption for each infected file?
A. Boot Sector Virus
B. Encryption virus
C. Cavity virus
D. Polymorphic/Metamorphic virus
Answer: B. Encryption virus
Quiz: What is a worm?
A. Malware that encrypts your files and holds them for ransom
B. Malware that scares the victim into installing software or performing some action
C. Automated malware that can spread through your network by taking advantage of network vulnerabilities
D. An attack technique that uses existing, built-in OS tools and utilities to launch attacks
Answer: C. Automated malware that can spread through your network by taking advantage of network vulnerabilities
Quiz: What is Ransomware?
A. Malware that encrypts your files and holds them for ransom
B. Malware that scares the victim into installing software or performing some action
C. Automated malware that can spread through your network by taking advantage of network vulnerabilities
D. An attack technique that uses existing, built-in OS tools and utilities to launch attacks
Answer: A. Malware that encrypts your files and holds them for ransom
Quiz: What is Scareware?
A. Malware that encrypts your files and holds them for ransom
B. Malware that scares the victim into installing software or performing some action
C. Automated malware that can spread through your network by taking advantage of network vulnerabilities
D. An attack technique that uses existing, built-in OS tools and utilities to launch attacks
Answer: B. Malware that scares the victim into installing software or performing some action
Quiz: What is File-less malware?
A. Malware that encrypts your files and holds them for ransom
B. Malware that scares the victim into installing software or performing some action
C. Automated malware that can spread through your network by taking advantage of network vulnerabilities
D. An attack technique that uses existing, built-in OS tools and utilities to launch attacks
Answer: D. An attack technique that uses existing, built-in OS tools and utilities to launch attacks
Quiz: What is VirusTotal?
A. A cloud-based malware detection service
B. A behavior-based malware detection technique
C. A signature-based malware detection technique
D. An on-premises malware detection service
Answer: A. A cloud-based malware detection service
Quiz: What is a Signature-based malware detection technique?
A. A malware detection technique that sends the files to be scanned up to a cloud-based scanning service
B. A malware detection technique that analyzes the behavior of a program to determine if it is malicious
C. A malware detection technique that looks for known patterns of code or data within a file to identify it as malicious
D. A malware detection technique that relies on the user to report suspicious files or activities
Answer: C. A malware detection technique that looks for known patterns of code or data within a file to identify it as malicious
Quiz: What is Packet sniffing?
A. A technique to capture and analyze network traffic
B. A way to hide network traffic from attackers
C. A way to filter network traffic based on its source or destination
D. A way to block network traffic from specific IP addresses
Answer: A. A technique to capture and analyze network traffic
Quiz: What is the difference between active and passive sniffing?
A. Passive sniffing requires you to actively do something to get copies of other people’s packets, while active sniffing does not require any action.
B. Active sniffing requires you to actively do something to get copies of other people’s packets, while passive sniffing does not require any action.
C. Passive sniffing is only possible on switches, while active sniffing is only possible on hubs.
D. Active sniffing is more reliable than passive sniffing.
Answer: B. Active sniffing requires you to actively do something to get copies of other people’s packets, while passive sniffing does not require any action.
Quiz: What is Promiscuous mode?
A. A mode that blocks network traffic from specific IP addresses
B. A mode that filters network traffic based on its source or destination
C. A mode that ignores other people’s traffic unless you put your NIC into it
D. A mode that hides your network traffic from attackers
Answer: C. A mode that ignores other people’s traffic unless you put your NIC into it
Quiz 1: What is the difference between a hub and a switch when it comes to sniffing traffic?
A. A hub requires active sniffing, while a switch requires passive sniffing.
B. A switch requires active sniffing, while a hub requires passive sniffing.
C. Both a hub and a switch require active sniffing to capture traffic.
D. Both a hub and a switch require passive sniffing to capture traffic.
Answer: B. A switch requires active sniffing, while a hub requires passive sniffing.
Quiz 2: What is a SPAN/Mirrored port?
A. A device that is used to connect multiple hubs together in a network.
B. A port on a switch that is used to monitor all network traffic.
C. A tool that is used to detect and prevent MAC flooding attacks.
D. A method for spoofing your IP address to appear like another device.
Answer: B. A port on a switch that is used to monitor all network traffic.
Quiz 3: What is MAC flooding?
A. A method for spoofing your IP address to appear like another device.
B. A tool that is used to detect and prevent ARP poisoning attacks.
C. A technique for filling up a switch’s CAM (MAC address) table with fake MAC addresses.
D. A method for monitoring all network traffic using a mirrored port.
Answer: C. A technique for filling up a switch’s CAM (MAC address) table with fake MAC addresses.
Quiz 4: What is ARP poisoning?
A. A technique for filling up a switch’s CAM (MAC address) table with fake MAC addresses.
B. A tool that is used to detect and prevent MAC flooding attacks.
C. A method for spoofing your IP address to appear like another device.
D. A method for monitoring all network traffic using a mirrored port.
Answer: C. A method for spoofing your IP address to appear like another device.
Quiz 1: What is the Rogue router attack?
A. A technique for configuring the “priority” value on a switch to become the “Root Bridge”
B. A technique for forging many DHCP requests to use up all the valid IP’s
C. A technique for placing a rogue router on the network and convincing other routers to send traffic through
Answer: C. A technique for placing a rogue router on the network and convincing other routers to send traffic through
Quiz 2: What is the DHCP Starvation attack?
A. A technique for configuring the “priority” value on a switch to become the “Root Bridge”
B. A technique for forging many DHCP requests to use up all the valid IP’s
C. A technique for placing a rogue router on the network and convincing other routers to send traffic through
Answer: B. A technique for forging many DHCP requests to use up all the valid IP’s
Quiz 3: What is the defense mechanism against Rogue DHCP servers?
A. Port Security
B. DHCP Snooping
C. Firewall
Answer: B. DHCP Snooping
Quiz 1: What is Port Security?
A. A tool for filtering MAC addresses to prevent MAC spoofing
B. A tool for filtering IP addresses to prevent IP spoofing
C. A tool for filtering DNS requests to prevent DNS spoofing
D. A tool for filtering HTTP traffic to prevent HTTP spoofing
Answer: A. A tool for filtering MAC addresses to prevent MAC spoofing
Quiz 2: What is the difference between Sniffers and Protocol Analyzers?
A. Sniffers obtain network packets while Protocol Analyzers examine packets
B. Sniffers examine packets while Protocol Analyzers obtain network packets
C. Sniffers work at the Transport layer while Protocol Analyzers work at the Network layer
D. Sniffers work at the Data Link layer while Protocol Analyzers work at the Physical layer
Answer: A. Sniffers obtain network packets while Protocol Analyzers examine packets
Quiz 3: What is Tcpdump?
A. A wireless packet analyzer that runs on Linux
B. A packet analyzer that runs on Windows
C. A Linux command-line sniffer and protocol analyzer
D. A popular protocol analyzer for dissecting packets
Answer: C. A Linux command-line sniffer and protocol analyzer
Quiz 4: What is Wireshark?
A. A tool for filtering MAC addresses to prevent MAC spoofing
B. A tool for filtering IP addresses to prevent IP spoofing
C. A popular protocol analyzer for dissecting packets
D. A wireless packet analyzer that runs on Linux
Answer: C. A popular protocol analyzer for dissecting packets
Quiz 5: What is Kismet?
A. A tool for filtering MAC addresses to prevent MAC spoofing
B. A tool for filtering IP addresses to prevent IP spoofing
C. A packet analyzer that runs on Windows
D. A wireless packet analyzer that runs on Linux
Answer: D. A wireless packet analyzer that runs on Linux
Quiz 6: What is Netstumbler?
A. A tool for filtering MAC addresses to prevent MAC spoofing
B. A tool for filtering IP addresses to prevent IP spoofing
C. A packet analyzer that runs on Windows
D. A Linux command-line sniffer and protocol analyzer
Answer: C. A packet analyzer that runs on Windows
Quiz 7: What is TCPTrace?
A. A wireless packet analyzer that runs on Linux
B. A packet analyzer that can open packet capture files produced with other tools
C. A tool for filtering MAC addresses to prevent MAC spoofing
D. A popular protocol analyzer for dissecting packets
Answer: B. A packet analyzer that can open packet capture files produced with other tools
Quiz: What is phishing?
A. A social engineering technique that involves sending fraudulent emails to obtain sensitive information
B. A type of malware that spreads through human interaction
C. A technique used to sniff network traffic
D. A method to encrypt files and demand ransom
Answer: A. A social engineering technique that involves sending fraudulent emails to obtain sensitive information
Quiz: What is Tailgating in social engineering?
A. A technique to hack wireless networks
B. A method to crack passwords by guessing them
C. A social engineering technique where an attacker follows someone into a restricted area
D. A type of malware that spreads through the internet
Answer: C. A social engineering technique where an attacker follows someone into a restricted area
Quiz: What is E-mail masquerading?
A. A technique to hide your IP address when sending emails
B. A type of malware that spreads through email attachments
C. A social engineering technique to send emails that appear to be from someone else
D. A method to encrypt emails to ensure security
Answer: C. A social engineering technique to send emails that appear to be from someone else
Quiz: What is Evilginx?
A. A type of virus that spreads through email
B. A social engineering framework used to set up phishing and pharming pages
C. A network sniffer used to capture and analyze packets
D. A tool to prevent tailgating in a physical environment
Answer: B. A social engineering framework used to set up phishing and pharming pages
Quiz 1: What is phishing?
A. A technique for stealing physical documents from someone’s desk
B. A type of social engineering attack that uses fake emails or websites to trick victims into sharing sensitive information
C. A way of making money through the sale of fake goods or services
D. A technique for gaining unauthorized access to computer systems
Answer: B. A type of social engineering attack that uses fake emails or websites to trick victims into sharing sensitive information.
Quiz 2: What is spear-phishing?
A. A type of phishing attack that targets a specific individual or group
B. A type of social engineering attack that targets random individuals
C. A technique for manipulating search engine rankings
D. A type of denial-of-service attack
Answer: A. A type of phishing attack that targets a specific individual or group.
Quiz 3: What is whaling?
A. A type of spear-phishing attack that targets high-level executives or other high-value targets
B. A technique for exploiting weaknesses in wireless networks
C. A type of malware that uses encryption to hide its code
D. A type of social engineering attack that involves manipulating emotions to gain information
Answer: A. A type of spear-phishing attack that targets high-level executives or other high-value targets.
Quiz 4: What is vishing?
A. A type of social engineering attack that uses voice calls to trick victims into sharing sensitive information
B. A technique for exploiting vulnerabilities in web browsers
C. A type of phishing attack that targets users of virtual reality systems
D. A type of malware that spreads through USB drives
Answer: A. A type of social engineering attack that uses voice calls to trick victims into sharing sensitive information.