CEH Notes 04 Flashcards

1
Q

Quiz 2: Which component is NOT a part of a Snort rule?
A. source-ip
B. source-port
C. file-extension
D. dest-port

A

Answer: Option C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Quiz 3: In a Snort rule, what does the ‘msg’ keyword represent?
A. A specific port number
B. A custom message related to the rule
C. A particular IP address
D. The protocol being used

A

Answer: Option B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Quiz 1: What is the purpose of Multi-Homing?
A. To increase the speed of the internet connection
B. To put network devices on two different networks for increased security and management
C. To connect multiple devices to a single network interface
D. To create a redundant power supply for network devices

A

Answer: Option B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Quiz 2: What is another term for Multi-Homing?
A. In-Band management
B. Tri-Homing
C. Single-Homing
D. Dual-Homing

A

Answer: Option D.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Quiz 3: In a Multi-Homing setup, what is the purpose of having a separate management network?
A. To allow faster data transfer between devices
B. To enable admins to remotely administer devices without exposing them to the production network
C. To provide a backup network in case the primary network fails
D. To monitor network traffic more efficiently

A

Answer: Option B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Quiz 1: Which of the following is NOT a type of firewall?
A. Packet filtering
B. Circuit-level gateways
C. Application level proxies
D. Malware scanner

A

Answer: Option D.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Quiz 2: Which layer(s) do Packet Filters inspect?
A. Layer 1 & 2
B. Layer 3 & 4
C. Layer 5 & 6
D. Layer 7

A

Answer: Option B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Quiz 3: What is the key capability of Application level firewalls?
A. Inspecting the payload and filtering out specific content
B. Managing network connections
C. Monitoring network traffic speed
D. Encrypting data

A

Answer: Option A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Quiz 4: What is the primary function of Stateful firewalls?
A. To filter out specific keywords and URLs
B. To inspect the Layer 3 & 4 headers
C. To allow incoming traffic only if it is part of an existing conversation
D. To act as a gateway between networks

A

Answer: Option C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Quiz 1: What is the primary purpose of a DMZ?
A. To allow outsiders to access public company resources while maintaining security
B. To create a high-security network with no outside access
C. To store sensitive company data
D. To act as a backup network in case of a failure

A

Answer: Option A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Quiz 2: What is Split-DNS?
A. A technique to monitor network traffic
B. A method to split network bandwidth evenly among users
C. A configuration where internal and external DNS servers are used for resource lookup
D. A type of malware that affects DNS servers

A

Answer: Option C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Quiz 3: What is the main function of a Honeypot?
A. To increase the speed of network connections
B. To lure-in attackers and observe their actions while protecting the network
C. To act as a backup server for critical data
D. To manage network resources

A

Answer: Option B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Quiz 4: What is Honeyd?
A. A firewall application
B. A type of malware
C. A widely used honeypot daemon
D. A network monitoring tool

A

Answer: Option C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Quiz 5: How can you detect a Honeyd daemon?
A. By observing the number of SYN/ACK re-sends
B. By checking the DNS records
C. By monitoring the network traffic
D. By analyzing the payload data

A

Answer: Option A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Quiz 1: What is the primary purpose of DNS Tunneling?
A. To improve network performance
B. To evade firewall detection by disguising traffic as DNS
C. To encrypt data for secure transmission
D. To manage DNS records

A

Answer: Option B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Quiz 2: What is the main goal of HTTP Tunneling?
A. To increase network speed
B. To disguise traffic as a different protocol by changing port numbers
C. To protect sensitive data from unauthorized access
D. To monitor network traffic

A

Answer: Option B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Quiz 3: Which technique is used to evade detection by signature-based engines?
A. IP Fragmentation / Session Splicing
B. DNS Tunneling
C. HTTP Tunneling
D. Obfuscation

A

Answer: Option A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Quiz 4: What is Whisker?
A. A network monitoring tool
B. A vulnerability scanner that uses fragmentation techniques for stealth
C. A type of malware
D. A honeypot daemon

A

Answer: Option B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Quiz 5: What is the purpose of Obfuscating as an IDS evasion technique?
A. To increase the speed of network connections
B. To encode attack packets in a way that IDS cannot decode but the target can
C. To split malicious payloads into fragments
D. To disguise traffic as a different protocol

A

Answer: Option B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Quiz 1: What is the primary purpose of web server fingerprinting?
A. To check the server’s response time
B. To transfer data between devices
C. To identify the server’s software and version
D. To test the server’s security settings

A

Answer: Option C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Quiz 2: Which tools can be used for web server fingerprinting?
A. Wireshark and Nmap
B. Telnet and Netcat
C. Ping and Traceroute
D. SSH and SCP

A

Answer: Option B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Quiz 3: What is Netcat often referred to as?
A. The “Swiss Army Knife” of networking tools
B. The “Network Detective”
C. The “Security Scanner”
D. The “Port Mapper”

A

Answer: Option A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Quiz 3: What is Netcat often referred to as?
A. The “Swiss Army Knife” of networking tools
B. The “Network Detective”
C. The “Security Scanner”
D. The “Port Mapper”

A

Answer: Option A.

Quiz 4: How can Netcat be used in the context of web server fingerprinting?
A. By scanning the server’s open ports
B. By duplicating Telnet functionality for fingerprinting a server
C. By testing the server’s response to different types of data
D. By monitoring the network traffic to and from the server

Answer: Option B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A hacker is attempting to gain unauthorized access to files and executables on a server that should not be accessible by the general public. Which technique is the hacker most likely using?
A. SQL Injection
B. Cross-site Scripting
C. Directory Traversal
D. Buffer Overflow

A

Answer: Option C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An attacker is exploiting a web application vulnerability that allows them to navigate the server’s directory structure using strings like “../../”. What type of attack is being conducted?
A. SQL Injection
B. Cross-site Scripting
C. Directory Traversal
D. Buffer Overflow

A

Answer: Option C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

An attacker is trying to exploit a web server by taking advantage of its settings. They are targeting configuration files such as php.ini and httpd.conf to obtain verbose error messages and server banner information. What type of vulnerability is the attacker exploiting?
A. Insecure Direct Object References
B. Webserver Misconfiguration
C. Broken Authentication and Session Management
D. Cross-site Request Forgery

A

Answer: Option B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

An attacker exploits a vulnerability in a public web server to send crafted requests to internal or back-end servers that are protected by a firewall. What type of attack is being conducted?
A. Cross-Site Scripting (XSS)
B. SQL Injection
C. Server-Side Request Forgery (SSRF)
D. Distributed Denial of Service (DDoS)

A

Answer: Option C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What does the robots.txt file on a web server typically contain?
A. Usernames and passwords for site administrators
B. List of web server directories, files, and information to hide from web crawlers
C. Server configuration settings
D. Encrypted data for secure transmission

A

Answer: Option B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the primary goal of website mirroring in the context of web server attack methodology?
A. To create a backup of the target website
B. To explore the site’s files, read the HTML source code, and gather valuable information
C. To deface the target website with altered content
D. To generate a high volume of traffic to overwhelm the target website

A

Answer: Option B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which tool is commonly used as a DoS attack tool against web servers?
A. Nmap
B. Netcat
C. Hulk
D. Wireshark

A

Answer: Option C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the primary purpose of ISAPI filters on a Microsoft IIS webserver?
A. To perform data sanitization and other functions
B. To manage user authentication and access control
C. To monitor network traffic for potential attacks
D. To encrypt data for secure transmission

A

Answer: Option A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the primary goal of patch management in relation to web server security?
A. To monitor network traffic for potential attacks
B. To fix known vulnerabilities by ensuring the appropriate patches are installed
C. To manage user authentication and access control
D. To encrypt data for secure transmission

A

Answer: Option B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which organization is known for providing resources such as Webgoat, ZAP, and the Top-10 list of web application vulnerabilities?
A. SANS Institute
B. OWASP
C. NIST
D. ISC²

A

Answer: Option B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

According to the OWASP Top-10, what is the #1 web application vulnerability?
A. Cross-Site Scripting (XSS)
B. Broken Authentication
C. Injection Flaws
D. XML External Entity (XXE)

A

Answer: Option C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What type of attack involves uploading malware or injecting malicious scripts into a website frequently visited by the target victims?
A. Watering Hole Attack
B. Cross-Site Scripting (XSS)
C. Man-in-the-Middle Attack
D. Phishing

A

Answer: Option A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What type of attack involves tricking a user into clicking on a malicious link by using invisible HTML objects such as iFrames?
A. Clickjacking
B. Cross-Site Scripting (XSS)
C. Phishing
D. Man-in-the-Middle Attack

A

Answer: Option A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which attack involves sending a request to a server that the victim did not intend to send, often achieved via Clickjacking attacks?
A. Cross-Site Scripting (XSS)
B. Cross-Site Request Forgery (CSRF or XSRF)
C. SQL Injection
D. Directory Traversal

A

Answer: Option B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What tool scans websites for interesting URIs by brute-forcing using wordlists?
A. Nmap
B. Burp Suite
C. Gobuster
D. Wireshark

A

Answer: Option C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which tool allows you to intercept, test, and analyze web traffic between a browser and a web server?
A. Wireshark
B. Gobuster
C. Burp Suite
D. Nmap

A

Answer: Option C.

40
Q

What type of attack involves manipulating parameters passed from a web browser to a web application?
A. Parameter Tampering
B. Cross-Site Scripting (XSS)
C. SQL Injection
D. Directory Traversal

A

Answer: Option A.

41
Q

What is the technique called where unauthorized parameters are injected into a connection string using semicolons as separators?
A. SQL Injection
B. Connection String Parameter Pollution (CSPP)
C. Cross-Site Scripting (XSS)
D. Parameter Tampering

A

Answer: Option B.

42
Q

What is SOAP in the context of web services?
A. A security protocol for encrypting web traffic
B. A protocol used to transfer data between the service provider and the requester
C. An API for connecting web applications
D. A tool for scanning web services for vulnerabilities

A

Answer: Option B.

43
Q

What are webhooks in the context of web services?
A. A security protocol for encrypting web traffic
B. User-defined HTTP callbacks based on triggered events
C. An API for connecting web applications
D. A tool for scanning web services for vulnerabilities

A

Answer: Option B.

44
Q

What is the process of sending random characters or numbers to a program in an attempt to crash it?
A. Fuzzing
B. Brute-forcing
C. Buffer Overflow
D. SQL Injection

A

Answer: Option A.

45
Q

Which term refers to challenges hosted by companies for ethical hackers to find and report vulnerabilities in their systems?
A. Penetration Testing
B. Red Teaming
C. Bug Bounty Programs
D. Vulnerability Assessments

A

Answer: Option C.

46
Q

What is the purpose of a Web Application Firewall (WAF)?
A. To filter out web application attacks such as SQL injection, XSS, and CSRF
B. To monitor network traffic and detect intrusions
C. To block access to malicious websites
D. To encrypt web traffic between a browser and a web server

A

Answer: Option A.

47
Q

Which Linux tool is used for retrieving files and information from websites and can be used to clone them?
A. curl
B. wget
C. Nmap
D. Gobuster

A

Answer: Option B.

48
Q

What is the primary function of Syhunt and Netsparker tools?
A. Network scanning
B. Web application vulnerability scanning
C. Brute-forcing passwords
D. Intercepting and modifying web traffic

A

Answer: Option B.

49
Q

hat does the presence of .stm files on a server indicate, and what type of attack might the server be vulnerable to?
A. The server is using Server-Side Includes (SSI) and might be vulnerable to SSI attacks
B. The server is using PHP and might be vulnerable to SQL injection attacks
C. The server is using JavaServer Pages (JSP) and might be vulnerable to Java deserialization attacks
D. The server is using Active Server Pages (ASP) and might be vulnerable to XSS attacks

A

Answer: Option A.

50
Q

Which SQL injection key-words should you be aware of when attempting to identify an attack?
A. Drop table, update table, insert into table, shutdown with nowait, ‘ or 1=1 –
B. Select, from, where, group by, having
C. Create table, alter table, delete table, truncate table
D. Insert, update, delete, merge

A

Answer: Option A.

51
Q

What is the primary purpose of the sqlmap tool?
A. To perform network scanning and enumeration
B. To perform automated SQL injection attacks
C. To intercept and modify web traffic between a browser and a web server
D. To brute force login credentials for a web application

A

Answer: Option B.

52
Q

What is a blind SQL injection attack?
A. An attack where the attacker receives error messages from the server
B. An attack where the attacker does not receive error messages and is working “blind”
C. An attack where the attacker uses SQL keywords to create new tables and modify existing ones
D. An attack where the attacker injects malicious code into a web application to compromise user data

A

Answer: Option B.

53
Q

In SQL injection attacks, what is the difference between an end-of-line comment and a middle-of-the-line comment?
A. End-of-line comment: –; Middle-of-the-line comment: /* text here /
B. End-of-line comment: / text here */; Middle-of-the-line comment: –
C. End-of-line comment: #; Middle-of-the-line comment: ;
D. End-of-line comment: ; Middle-of-the-line comment: #

A

Answer: Option A.

54
Q

Which of the following is the best solution to prevent web attacks and SQL injection attacks?
A. Strong authentication mechanisms
B. Frequent patch management
C. Input validation
D. Encrypting sensitive data

A

Answer: Option C.

55
Q

What is the purpose of whitelist validation in input validation?
A. To allow only specifically approved entries as input
B. To block a list of known malicious input patterns
C. To check if the input is encrypted
D. To ensure that the input matches a specific data format

A

Answer: Option A.

56
Q

Which of these is an evasion technique used to bypass IDS and WAF?
A. Password cracking
B. Brute force attacks
C. IP fragmentation
D. Social engineering

A

Answer: Option C.

57
Q

What is the primary goal of obfuscated code in an evasion technique?
A. To speed up the execution of the code
B. To make the code more readable for the developer
C. To hide the true purpose of the code from detection systems
D. To ensure compatibility between different programming languages

A

Answer: Option C.

58
Q

What is the primary purpose of wardriving?
A. To test the range of wireless networks
B. To find and map wireless networks in a specific area
C. To connect to multiple wireless networks for increased bandwidth
D. To physically locate wireless access points for maintenance purposes

A

Answer: Option B.

59
Q

Which wireless security protocol was designed as a replacement for WEP and did NOT require a hardware upgrade?
A. WPA
B. WPA2
C. WPA3
D. Zigbee

A

Answer: Option A.

60
Q

Which encryption standard does WPA2 use?
A. RC4/TKIP
B. AES-128/CCMP
C. GCMP-256
D. HMAC-SHA-384

A

Answer: Option B.

61
Q

What is the primary purpose of the Simultaneous Authentication of Equals (SAE) in WPA3?
A. To provide a more secure authentication method
B. To increase the range of wireless networks
C. To improve the speed of wireless networks
D. To enable backward compatibility with older devices

A

Answer: Option A.

62
Q

What is the purpose of an Evil Twin attack?
A. To disrupt a legitimate wireless network
B. To impersonate a legitimate wireless access point and trick users into connecting to it
C. To increase the range of a legitimate wireless network
D. To force users to connect to a network with lower security protocols

A

Answer: Option B.

63
Q

Which attack is specifically targeting WPA2?
A. Evil Twin
B. KRACK attack
C. Downgrade attack
D. aLTEr attack

A

Answer: Option B.

64
Q

What does a downgrade attack accomplish?
A. Forces users to use older, less secure protocols
B. Increases the range of wireless networks
C. Allows attackers to intercept encrypted traffic
D. Impersonates a legitimate wireless access point

A

Answer: Option A.

65
Q

Which of the following Bluetooth attacks is characterized by stealing someone’s information through Bluetooth vulnerabilities?
A. Bluejacking
B. Bluesnarfing
C. Bluesmacking
D. Bluedriving

A

Answer: Option B.

66
Q

Which of the following Bluetooth attacks involves sending unsolicited messages or spam to a Bluetooth-enabled device?
A. Bluejacking
B. Bluesnarfing
C. Bluesmacking
D. Bluedriving

A

Answer: Option A.

67
Q

Which Bluetooth attack is focused on exploiting vulnerabilities to steal data from Bluetooth-enabled devices?
A. Bluejacking
B. Bluesnarfing
C. Bluesmacking
D. Bluedriving

A

Answer: Option B.

68
Q

Which Bluetooth attack is characterized by launching a Denial of Service (DoS) attack on a Bluetooth-enabled device?
A. Bluejacking
B. Bluesnarfing
C. Bluesmacking
D. Bluedriving

A

Answer: Option C.

69
Q

Which of the following Bluetooth attacks involves searching for and mapping Bluetooth-enabled devices in a given area?
A. Bluejacking
B. Bluesnarfing
C. Bluesmacking
D. Bluedriving

A

Answer: Option D.

70
Q

Which Bluetooth utility can be used to sniff, jam, or hijack Bluetooth connections?
A. BtleSniffer
B. BlueSnarf
C. BtleJack
D. BlueJam

A

Answer: Option C.

71
Q

In the BtleJack utility, which flag is used to select a connected device?
A. -s
B. -d
C. -c
D. -t

A

Answer: Option B.

72
Q

Which flag in the BtleJack utility is used to sniff a connection?
A. -s
B. -d
C. -c
D. -t

A

Answer: Option A.

73
Q

In the BtleJack utility, which flag is used to find a new connection to sniff?
A. -s
B. -d
C. -c
D. -t

A

Answer: Option C.

74
Q

Which flag in the BtleJack utility allows you to hijack a Bluetooth connection?
A. -s
B. -d
C. -c
D. -t

A

Answer: Option D.

75
Q

Which of the following is NOT a best-practice for WiFi configuration?
A. Disable SSID broadcasts
B. Use Port-Security (MAC filtering)
C. Enable WPS for ease of use
D. Use 802.1x (port-authentication)

A

Answer: Option C.

76
Q

What does 802.1X provide in a network?
A. Port-Authentication
B. Signal boosting
C. WPS support
D. Wireless encryption

A

Answer: Option A.

77
Q

What is the primary function of a WIPS (Wireless IPS)?
A. Boosting WiFi signal strength
B. Locating rogue access points and detecting wireless threats
C. Enabling WPS functionality
D. Providing wireless network analytics

A

Answer: Option B.

78
Q

Which comprehensive suite of tools can be used for wireless Man in The Middle attacks and other useful tricks?
A. Wireshark
B. Nmap
C. Ettercap
D. Aircrack-ng

A

Answer: Option C.

79
Q

What is the primary purpose of the Wash utility?
A. Scan a network to find WPS-enabled APs
B. Boost WiFi signal strength
C. Analyze wireless network traffic
D. Perform a network vulnerability assessment

A

Answer: A. Scan a network to find WPS-enabled APs

80
Q

What is the main goal of the Agent Smith Attack?
A. Encrypt the victim’s device data
B. Take control of the victim’s device remotely
C. Replace legitimate apps with malicious ones and display irrelevant advertisements for financial gain
D. Disable the victim’s device

A

Answer: C. Replace legitimate apps with malicious ones and display irrelevant advertisements for financial gain

81
Q

What is the purpose of the AndroidManifest.xml file in Android applications?
A. Store the application’s source code
B. Manage the application’s dependencies
C. Describe essential information about the application
D. Provide a user interface for the application

A

Answer: C. Describe essential information about the application

82
Q

Which type of iOS jailbreak allows the device to boot on its own and automatically enables jailbreak functionality upon each bootup?
A. Tethered Jailbreak
B. Semi-Tethered Jailbreak
C. Semi-Untethered Jailbreak
D. Untethered Jailbreak

A

Answer: D. Untethered Jailbreak

83
Q

Which type of jailbreak requires the device to be connected to a computer for booting up?
A. Tethered Jailbreak
B. Semi-Tethered Jailbreak
C. Semi-Untethered Jailbreak
D. Untethered Jailbreak

A

Answer: A. Tethered Jailbreak

84
Q

Which type of jailbreak allows the device to boot on its own, but requires connecting to a computer to use jailbreak functionality?
A. Tethered Jailbreak
B. Semi-Tethered Jailbreak
C. Semi-Untethered Jailbreak
D. Untethered Jailbreak

A

Answer: B. Semi-Tethered Jailbreak

85
Q

Which type of jailbreak enables the device to boot independently and requires launching an app on the device to access jailbreak functionality?
A. Tethered Jailbreak
B. Semi-Tethered Jailbreak
C. Semi-Untethered Jailbreak
D. Untethered Jailbreak

A

Answer: C. Semi-Untethered Jailbreak

86
Q

Which type of jailbreak allows the device to boot independently without any restrictions and enables jailbreak functionality automatically upon bootup?
A. Tethered Jailbreak
B. Semi-Tethered Jailbreak
C. Semi-Untethered Jailbreak
D. Untethered Jailbreak

A

Answer: D. Untethered Jailbreak

87
Q

Which attack exploits the iTunes Wi-Fi Sync functionality between an iPhone and a computer?
A. iOS Trustjacking
B. Trident
C. Blackjacking
D. Spearphone attack

A

Answer: A. iOS Trustjacking

88
Q

Which spyware targets iPhones for the purpose of spying on the user?
A. iOS Trustjacking
B. Trident
C. Blackjacking
D. Spearphone attack

A

Answer: B. Trident

89
Q

Which attack is focused on hijacking someone’s Blackberry to gain access to their corporate network?
A. iOS Trustjacking
B. Trident
C. Blackjacking
D. Spearphone attack

A

Answer: C. Blackjacking

90
Q

What type of attack involves a malicious Android app that allows an attacker to eavesdrop on the phone’s speaker?
A. iOS Trustjacking
B. Trident
C. Blackjacking
D. Spearphone attack

A

Answer: D. Spearphone attack

91
Q

What technique involves disassembling and extracting the source code of an application to find vulnerabilities?
A. iOS Trustjacking
B. Trident
C. Blackjacking
D. Reverse Engineering

A

Answer: D. Reverse Engineering

92
Q

Which tool is commonly used in a Blackjacking attack?
A. Ettercap
B. BBProxy
C. sqlmap
D. Wash utility

A

Answer: B. BBProxy

93
Q

What type of radio is used to generate radio communications and process radio signals through software?
A. HMI Radio
B. SDR (Software Defined Radio)
C. OT Radio
D. FCC Radio

A

Answer: B. SDR (Software Defined Radio)

94
Q

What type of control system is commonly targeted by attackers in OT networks?
A. SDR systems
B. IoT devices
C. HMI (Human Machine Interface)
D. Power supply systems

A

Answer: C. HMI (Human Machine Interface)

95
Q

What type of attack involves injecting faults or glitches into the power supply and clock network of a chip?
A. Power/Clock/Reset Glitching
B. SDR-Based attacks
C. HMI-based attack
D. IoT hacking

A

Answer: A. Power/Clock/Reset Glitching

96
Q

Which port should be monitored to defend against IoT hacking, as it was used by the famous Mirai botnet to infect IoT devices in 2016?
A. 48101
B. 80
C. 443
D. 8080

A

Answer: A. 48101