CEH Notes 04 Flashcards
Quiz 2: Which component is NOT a part of a Snort rule?
A. source-ip
B. source-port
C. file-extension
D. dest-port
Answer: Option C.
Quiz 3: In a Snort rule, what does the ‘msg’ keyword represent?
A. A specific port number
B. A custom message related to the rule
C. A particular IP address
D. The protocol being used
Answer: Option B.
Quiz 1: What is the purpose of Multi-Homing?
A. To increase the speed of the internet connection
B. To put network devices on two different networks for increased security and management
C. To connect multiple devices to a single network interface
D. To create a redundant power supply for network devices
Answer: Option B.
Quiz 2: What is another term for Multi-Homing?
A. In-Band management
B. Tri-Homing
C. Single-Homing
D. Dual-Homing
Answer: Option D.
Quiz 3: In a Multi-Homing setup, what is the purpose of having a separate management network?
A. To allow faster data transfer between devices
B. To enable admins to remotely administer devices without exposing them to the production network
C. To provide a backup network in case the primary network fails
D. To monitor network traffic more efficiently
Answer: Option B.
Quiz 1: Which of the following is NOT a type of firewall?
A. Packet filtering
B. Circuit-level gateways
C. Application level proxies
D. Malware scanner
Answer: Option D.
Quiz 2: Which layer(s) do Packet Filters inspect?
A. Layer 1 & 2
B. Layer 3 & 4
C. Layer 5 & 6
D. Layer 7
Answer: Option B.
Quiz 3: What is the key capability of Application level firewalls?
A. Inspecting the payload and filtering out specific content
B. Managing network connections
C. Monitoring network traffic speed
D. Encrypting data
Answer: Option A.
Quiz 4: What is the primary function of Stateful firewalls?
A. To filter out specific keywords and URLs
B. To inspect the Layer 3 & 4 headers
C. To allow incoming traffic only if it is part of an existing conversation
D. To act as a gateway between networks
Answer: Option C.
Quiz 1: What is the primary purpose of a DMZ?
A. To allow outsiders to access public company resources while maintaining security
B. To create a high-security network with no outside access
C. To store sensitive company data
D. To act as a backup network in case of a failure
Answer: Option A.
Quiz 2: What is Split-DNS?
A. A technique to monitor network traffic
B. A method to split network bandwidth evenly among users
C. A configuration where internal and external DNS servers are used for resource lookup
D. A type of malware that affects DNS servers
Answer: Option C.
Quiz 3: What is the main function of a Honeypot?
A. To increase the speed of network connections
B. To lure-in attackers and observe their actions while protecting the network
C. To act as a backup server for critical data
D. To manage network resources
Answer: Option B.
Quiz 4: What is Honeyd?
A. A firewall application
B. A type of malware
C. A widely used honeypot daemon
D. A network monitoring tool
Answer: Option C.
Quiz 5: How can you detect a Honeyd daemon?
A. By observing the number of SYN/ACK re-sends
B. By checking the DNS records
C. By monitoring the network traffic
D. By analyzing the payload data
Answer: Option A.
Quiz 1: What is the primary purpose of DNS Tunneling?
A. To improve network performance
B. To evade firewall detection by disguising traffic as DNS
C. To encrypt data for secure transmission
D. To manage DNS records
Answer: Option B.
Quiz 2: What is the main goal of HTTP Tunneling?
A. To increase network speed
B. To disguise traffic as a different protocol by changing port numbers
C. To protect sensitive data from unauthorized access
D. To monitor network traffic
Answer: Option B.
Quiz 3: Which technique is used to evade detection by signature-based engines?
A. IP Fragmentation / Session Splicing
B. DNS Tunneling
C. HTTP Tunneling
D. Obfuscation
Answer: Option A.
Quiz 4: What is Whisker?
A. A network monitoring tool
B. A vulnerability scanner that uses fragmentation techniques for stealth
C. A type of malware
D. A honeypot daemon
Answer: Option B.
Quiz 5: What is the purpose of Obfuscating as an IDS evasion technique?
A. To increase the speed of network connections
B. To encode attack packets in a way that IDS cannot decode but the target can
C. To split malicious payloads into fragments
D. To disguise traffic as a different protocol
Answer: Option B.
Quiz 1: What is the primary purpose of web server fingerprinting?
A. To check the server’s response time
B. To transfer data between devices
C. To identify the server’s software and version
D. To test the server’s security settings
Answer: Option C.
Quiz 2: Which tools can be used for web server fingerprinting?
A. Wireshark and Nmap
B. Telnet and Netcat
C. Ping and Traceroute
D. SSH and SCP
Answer: Option B.
Quiz 3: What is Netcat often referred to as?
A. The “Swiss Army Knife” of networking tools
B. The “Network Detective”
C. The “Security Scanner”
D. The “Port Mapper”
Answer: Option A.
Quiz 3: What is Netcat often referred to as?
A. The “Swiss Army Knife” of networking tools
B. The “Network Detective”
C. The “Security Scanner”
D. The “Port Mapper”
Answer: Option A.
Quiz 4: How can Netcat be used in the context of web server fingerprinting?
A. By scanning the server’s open ports
B. By duplicating Telnet functionality for fingerprinting a server
C. By testing the server’s response to different types of data
D. By monitoring the network traffic to and from the server
Answer: Option B.
A hacker is attempting to gain unauthorized access to files and executables on a server that should not be accessible by the general public. Which technique is the hacker most likely using?
A. SQL Injection
B. Cross-site Scripting
C. Directory Traversal
D. Buffer Overflow
Answer: Option C.
An attacker is exploiting a web application vulnerability that allows them to navigate the server’s directory structure using strings like “../../”. What type of attack is being conducted?
A. SQL Injection
B. Cross-site Scripting
C. Directory Traversal
D. Buffer Overflow
Answer: Option C.
An attacker is trying to exploit a web server by taking advantage of its settings. They are targeting configuration files such as php.ini and httpd.conf to obtain verbose error messages and server banner information. What type of vulnerability is the attacker exploiting?
A. Insecure Direct Object References
B. Webserver Misconfiguration
C. Broken Authentication and Session Management
D. Cross-site Request Forgery
Answer: Option B.
An attacker exploits a vulnerability in a public web server to send crafted requests to internal or back-end servers that are protected by a firewall. What type of attack is being conducted?
A. Cross-Site Scripting (XSS)
B. SQL Injection
C. Server-Side Request Forgery (SSRF)
D. Distributed Denial of Service (DDoS)
Answer: Option C.
What does the robots.txt file on a web server typically contain?
A. Usernames and passwords for site administrators
B. List of web server directories, files, and information to hide from web crawlers
C. Server configuration settings
D. Encrypted data for secure transmission
Answer: Option B.
What is the primary goal of website mirroring in the context of web server attack methodology?
A. To create a backup of the target website
B. To explore the site’s files, read the HTML source code, and gather valuable information
C. To deface the target website with altered content
D. To generate a high volume of traffic to overwhelm the target website
Answer: Option B.
Which tool is commonly used as a DoS attack tool against web servers?
A. Nmap
B. Netcat
C. Hulk
D. Wireshark
Answer: Option C.
What is the primary purpose of ISAPI filters on a Microsoft IIS webserver?
A. To perform data sanitization and other functions
B. To manage user authentication and access control
C. To monitor network traffic for potential attacks
D. To encrypt data for secure transmission
Answer: Option A.
What is the primary goal of patch management in relation to web server security?
A. To monitor network traffic for potential attacks
B. To fix known vulnerabilities by ensuring the appropriate patches are installed
C. To manage user authentication and access control
D. To encrypt data for secure transmission
Answer: Option B.
Which organization is known for providing resources such as Webgoat, ZAP, and the Top-10 list of web application vulnerabilities?
A. SANS Institute
B. OWASP
C. NIST
D. ISC²
Answer: Option B.
According to the OWASP Top-10, what is the #1 web application vulnerability?
A. Cross-Site Scripting (XSS)
B. Broken Authentication
C. Injection Flaws
D. XML External Entity (XXE)
Answer: Option C.
What type of attack involves uploading malware or injecting malicious scripts into a website frequently visited by the target victims?
A. Watering Hole Attack
B. Cross-Site Scripting (XSS)
C. Man-in-the-Middle Attack
D. Phishing
Answer: Option A.
What type of attack involves tricking a user into clicking on a malicious link by using invisible HTML objects such as iFrames?
A. Clickjacking
B. Cross-Site Scripting (XSS)
C. Phishing
D. Man-in-the-Middle Attack
Answer: Option A.
Which attack involves sending a request to a server that the victim did not intend to send, often achieved via Clickjacking attacks?
A. Cross-Site Scripting (XSS)
B. Cross-Site Request Forgery (CSRF or XSRF)
C. SQL Injection
D. Directory Traversal
Answer: Option B.
What tool scans websites for interesting URIs by brute-forcing using wordlists?
A. Nmap
B. Burp Suite
C. Gobuster
D. Wireshark
Answer: Option C.