CEH Notes 06 Flashcards
In SQL injection, what does the term ‘UNION’ signify?
A. Combining the results of two SELECT statements
B. Merging two database tables
C. Connecting to multiple databases simultaneously
D. Inserting data into multiple tables at once
Answer: A. Combining the results of two SELECT statements
Which of the following is NOT an attribute of a secure password?
A. Length
B. Complexity
C. Predictability
D. Unpredictability
Answer: C. Predictability
What is the purpose of using a rainbow table in password cracking?
A. To store precomputed hash values for a large set of possible passwords
B. To create a colorful visualization of password patterns
C. To encrypt password hashes for secure storage
D. To identify weak passwords through color-coded strength indicators
Answer: A. To store precomputed hash values for a large set of possible passwords
Which of the following is a well-known vulnerability scanner?
A. Nmap
B. Nessus
C. Metasploit
D. Hydra
Answer: B. Nessus
What is the primary purpose of a Public Key Infrastructure (PKI)?
A. To facilitate secure communication and data exchange
B. To manage user authentication on a network
C. To monitor network traffic for potential threats
D. To store sensitive data in an encrypted format
Answer: A. To facilitate secure communication and data exchange
Which of the following encryption algorithms is considered symmetric?
A. RSA
B. Diffie-Hellman
C. AES
D. ECC
Answer: C. AES
Which of the following is an example of a Man-in-the-Middle (MITM) attack?
A. ARP spoofing
B. SQL injection
C. Cross-Site Scripting (XSS)
D. Denial of Service (DoS)
Answer: A. ARP spoofing
What does the “traceroute” command do?
A. Determines the route taken by packets across a network
B. Tracks the amount of time a packet takes to reach its destination
C. Lists all devices connected to a network
D. Measures the strength of a wireless signal
Answer: A. Determines the route taken by packets across a network
What is the main function of the Border Gateway Protocol (BGP)?
A. To route traffic between autonomous systems on the Internet
B. To control access to a network based on IP addresses
C. To manage the allocation of IP addresses within a network
D. To encrypt data transmitted between different networks
Answer: A. To route traffic between autonomous systems on the Internet
What is steganography?
A. The practice of hiding data within other data
B. The process of encrypting data to protect its confidentiality
C. The technique of breaking encryption algorithms
D. The study of secure communication methods
Answer: A. The practice of hiding data within other data
Which of the following is an Intrusion Detection System (IDS)?
A. Snort
B. Nmap
C. Nessus
D. Metasploit
Answer: A. Snort
Which of the following wireless security protocols is considered the most secure?
A. WEP
B. WPA
C. WPA2
D. WPA3
Answer: D. WPA3
What is the purpose of a digital signature?
A. To verify the integrity and authenticity of a message or document
B. To encrypt data for secure storage
C. To authenticate a user or system during a login process
D. To generate a random number for use in cryptographic algorithms
Answer: A. To verify the integrity and authenticity of a message or document
Which of the following CVSS v3.0 Base Score ranges indicates a Critical severity rating?
A. 0.0
B. 0.1-3.9
C. 4.0-6.9
D. 9.0-10.0
Answer: D. 9.0-10.0
Which of the following CVSS v3.0 Base Score ranges indicates a Medium severity rating?
A. 0.0
B. 0.1-3.9
C. 4.0-6.9
D. 9.0-10.0
Answer: C. 4.0-6.9