CEH Notes 06 Flashcards

1
Q

In SQL injection, what does the term ‘UNION’ signify?
A. Combining the results of two SELECT statements
B. Merging two database tables
C. Connecting to multiple databases simultaneously
D. Inserting data into multiple tables at once

A

Answer: A. Combining the results of two SELECT statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is NOT an attribute of a secure password?
A. Length
B. Complexity
C. Predictability
D. Unpredictability

A

Answer: C. Predictability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of using a rainbow table in password cracking?
A. To store precomputed hash values for a large set of possible passwords
B. To create a colorful visualization of password patterns
C. To encrypt password hashes for secure storage
D. To identify weak passwords through color-coded strength indicators

A

Answer: A. To store precomputed hash values for a large set of possible passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is a well-known vulnerability scanner?
A. Nmap
B. Nessus
C. Metasploit
D. Hydra

A

Answer: B. Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary purpose of a Public Key Infrastructure (PKI)?
A. To facilitate secure communication and data exchange
B. To manage user authentication on a network
C. To monitor network traffic for potential threats
D. To store sensitive data in an encrypted format

A

Answer: A. To facilitate secure communication and data exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following encryption algorithms is considered symmetric?
A. RSA
B. Diffie-Hellman
C. AES
D. ECC

A

Answer: C. AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is an example of a Man-in-the-Middle (MITM) attack?
A. ARP spoofing
B. SQL injection
C. Cross-Site Scripting (XSS)
D. Denial of Service (DoS)

A

Answer: A. ARP spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the “traceroute” command do?
A. Determines the route taken by packets across a network
B. Tracks the amount of time a packet takes to reach its destination
C. Lists all devices connected to a network
D. Measures the strength of a wireless signal

A

Answer: A. Determines the route taken by packets across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the main function of the Border Gateway Protocol (BGP)?
A. To route traffic between autonomous systems on the Internet
B. To control access to a network based on IP addresses
C. To manage the allocation of IP addresses within a network
D. To encrypt data transmitted between different networks

A

Answer: A. To route traffic between autonomous systems on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is steganography?
A. The practice of hiding data within other data
B. The process of encrypting data to protect its confidentiality
C. The technique of breaking encryption algorithms
D. The study of secure communication methods

A

Answer: A. The practice of hiding data within other data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an Intrusion Detection System (IDS)?
A. Snort
B. Nmap
C. Nessus
D. Metasploit

A

Answer: A. Snort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following wireless security protocols is considered the most secure?
A. WEP
B. WPA
C. WPA2
D. WPA3

A

Answer: D. WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of a digital signature?
A. To verify the integrity and authenticity of a message or document
B. To encrypt data for secure storage
C. To authenticate a user or system during a login process
D. To generate a random number for use in cryptographic algorithms

A

Answer: A. To verify the integrity and authenticity of a message or document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following CVSS v3.0 Base Score ranges indicates a Critical severity rating?
A. 0.0
B. 0.1-3.9
C. 4.0-6.9
D. 9.0-10.0

A

Answer: D. 9.0-10.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following CVSS v3.0 Base Score ranges indicates a Medium severity rating?
A. 0.0
B. 0.1-3.9
C. 4.0-6.9
D. 9.0-10.0

A

Answer: C. 4.0-6.9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following CVSS v3.0 Base Score ranges indicates a Low severity rating?
A. 0.0
B. 0.1-3.9
C. 4.0-6.9
D. 9.0-10.0

A

Answer: B. 0.1-3.9

17
Q

A vulnerability has a CVSS v3.0 Base Score of 7.5. What severity rating does it have?
A. None
B. Low
C. Medium
D. High

A

Answer: D. High

18
Q

Which of the following CVSS v3.0 Base Score ranges indicates a severity rating of None?
A. 0.0
B. 0.1-3.9
C. 4.0-6.9
D. 9.0-10.0

A

Answer: A. 0.0

19
Q

A vulnerability has a CVSS v3.0 Base Score of 5.5. What severity rating does it have?
A. None
B. Low
C. Medium
D. High

A

Answer: C. Medium