CEH Round 2 Flashcards
What cryptography attack is usually performed without the use of a computer?
Rubber hose attack
Attacker sniffs encrypted traffic from the network and is able to decrypt it. What cryptanalytic technique can the attacker use now to discover the encryption key?
chosen ciphertext attack
Attacker has captured a target file that is encrypted with public key cryptography. What attack is likely to be used to crack the target file?
chosen plain text attack
What cryptanalysis is applicable to symmetric key algorithms?
Differential cryptanalysis
In what attack, can an attacker obtain ciphertexts encrypted under two different keys and gather plaintext and matching ciphertext?
Related-key attack
Attacker breaks an n bit key cipher into 2 n/2 number of operations in order to recover the key. What is the cryptography attack?
Chosen-key attack
What is a physical attack that is performed on a cryptographic device/cryptosystem to gain sensitive information?
Side channel attack
What attack mainly affects any hardware/software using an ANSI X9.31 random number generator (RNG)?
DUHK attack
What cryptographic algorithm uses multiple keys for encryption?
Meet-in-the-middle Attack
What contains a public key and the identity of the owner and the corresponding private key
Signed certificates
A person wants to send encrypted email from home and not pay any license fees. What should you recommend?
Pretty Good Privacy (PGP)
What element of PKI verifies the applicant?
Registration Authority
SDLC, Binary Analysis, Scanners, Web App Firewalls, Transactional Sec - are all at what layer of the cloud security control model?
Application
NIDS/NIPS, firewalls, DPI, Anti-DDoS, QoS, DNSSEC, and OAuth are at what layer of the cloud security control model?
Network Layer
DLP, CMF, Database activity monitoring and encryption are at what layer of cloud security control?
Information Layer
What mechanism should be incorporated into cloud services to facilitate networks and resources to improve the response time of a job with maximum throughput?
Load Balancing
What categories of security controls strengthens the system against incidents by minimizing or eliminating vulnerabilities?
Preventative Controls
What is an example of a detective security control?
Employing IDS and IPS
What cloud security control layer does DNSSEC, OAuth operate?
Network Layers
What is not a legitimate cloud computing attack?
Port Scanning
What is it called when an attacker try to control operations of other cloud customers to gain illegal access to the data?
Isolation Failure
What threat occurs when an attacker creates anonymous access to the cloud services to carry out various attacks such as password and key cracking, hosting malicious data, and DDoS attack?
Abuse and nefarious use of cloud services
What weakness is caused when a mistake in the access allocation system causes a customer third party, or employee to get more access rights than needed?
privilege escalation
What attack occurs when an attacker steals a CSP’s or client’s credentials by methods such as phishing, pharming, social engineering, and exploitation of software vulnerabilites?
Service Hijacking Using Social Engineering Attacks