Certified Ethical Hacker, CEH Practice Test - Results (Solomon) Flashcards
Which security standard was created by a council concerned with the protection of credit card data? A.PCI DSS B.TCSEC C.OSSTMM D.HIPAA
A.PCI DSS
Explanation
Correct Answer: The Payment Card Industry Data Security Standard (PCI DSS) is a security standard created by the Payment Card Industry Security Standards Council (PCI SSC). It’s designed to protect consumer credit card data in transit and in storage. PCI DSS consists of 12 requirements: for example, Requirement 1 compels the use of firewalls to protect data, Requirement 4 necessitates encryption for data in transit, and Requirement 11 mandates quarterly external vulnerability scans and annual penetration tests.
Incorrect Answers: HIPAA deals with the protection of private health information.
Trusted Computer System Evaluation Criteria (TCSEC) was created by the DoD (and is also known as the Orange Book).
OSSTMM (Open Source Security Testing Methodology Manual) is a peer-reviewed manual of penetration and security testing and analysis.
Which of the following is a legitimate use for tcp-over-dns? A.Packet crafting B.Firewall evasion C.Network Sniffing D.OS Fingerprint
B.Firewall evasion
Explanation
Correct Answer: Tunneling through a firewall is a great evasion technique, and the tcp-over-dns tool accomplishes this by tunneling over the Domain Name System (DNS). Port 53 is usually open on firewalls because…well, everything uses and needs DNS. The tcp-over-dns tool takes advantage of that. As an aside, it also requires Java runtime environment 6.0 or later and is supported on Windows, Linux, and Solaris.
Incorrect Answers: These are not uses for the tcp-over-dns tool.
What is the primary difference between PGP and S/MIME?
A.PGP uses SHA-1 for integrity
B.S/MIME uses RSA for digital signatures
C.S/MIME can encrypt email, but PGP cant
D.PGP can be used to encrypt hard drives, but S/MIME cannot
D.PGP can be used to encrypt hard drives, but S/MIME cannot
Explanation
Correct Answer: Pretty Good Privacy (PGP) can handle a lot more than e-mail, and that is one of the primary differences between it and S/MIME (Secure/Multipurpose Internet Mail Extensions). PGP is an application, whereas S/MIME is a protocol.
Incorrect Answers: The remaining choices are not true regarding either PGP or S/MIME.
Which nmap script can be used to show potentially risky HTTP methods? A.http-risk B.http-headers C.http-get D.http-methods
D.http-methods
Explanation
Correct Answer: Per nmap’s site (https://nmap.org/nsedoc/scripts/http-methods.html), the http-methods script “finds out what options are supported by an HTTP server by sending an OPTIONS request and lists potentially risky methods. Any output other than 501/405 suggests that the method is if not in the range 400 to 600. If the response falls under that range then it is compared to the response from a randomly generated method. In this script, ‘potentially risky’ methods are anything except GET, HEAD, POST, and OPTIONS.”
Incorrect Answers: These are not valid nmap scripts.
An attacker installs malicious software on a Blackberry device without the user's knowledge, and then leverages the Blackberry as a proxy into the private network. Which of the following attacks matches this description? A.Bluejacking B.Bluesmacking C.Bluescarfing D.Bluejacking
A.Bluejacking
Explanation
Correct Answer: Blackjacking involves leveraging a user’s Blackberry device as a proxy, allowing the attacker to come in from the Internet and gain access into the internal, private network. This attack can be carried out using a tool called BBProxy, which is included in the Blackberry Attack Toolkit (https://sourceforge.net/projects/bbat/).
Incorrect Answers: Bluejacking is an attack centering on Bluetooth vectors, bluesmacking is a DoS attack, and blackscarfing is not a real term.
Your team is testing a server that serves PHP pages for the Shellshock vulnerability. Which of the following actions should you take?
A.Send speciality created environment variables and trailing commands
B.Create special HTML entries for web forms
C.Modify the URL parameters
D.Craft specific SQL entries to attack the vulnerability
A.Send speciality created environment variables and trailing commands
Explanation
Correct Answer: Shellshock allows an attacker to add trailing information in environment variables.
Incorrect Answers: These answers do not match the Shellshock vulnerability.
Which character is the best choice to start a SQL injection attempt? A.Colon B.Double quote C.Single quote D.Semicolon
C.Single quote
Explanation
Correct Answer: The single quote starts many SQL attacks.
Incorrect Answers: The other choices do not start SQL injection attacks.
Which of the following tools can be used for remote password cracking of web servers? (Choose two.) A.Brutus B.THC-Hydra C.Nikto D.BlackWidow
A.Brutus
B.THC-Hydra
Explanation
Correct Answer: Brutus is a fast, flexible remote password cracker. It was originally invented to help its creator check routers and network devices for default and common passwords, but has since grown and evolved into much more, and it’s among the more popular security tools available for remote password cracking. THC-Hydra is another remote password cracker. It’s a “parallelized login cracker” that provides the ability to attack over multiple protocols.
Incorrect Answers: Nikto is not a remote password cracker. It’s an open source web-server-centric vulnerability scanner that performs comprehensive tests against web servers for multiple items.
BlackWidow is a web cloning tool, allowing you to copy an entire website for later review.
An attacker calls the help desk and asks for a password reset on a user ID he has obtained information on. Which type of social engineering attack is this? A.Impersonation B.Reverse engineering C.Spoofing D.Technical support
D.Technical support
Explanation
Correct Answer: A technical support attack is one in which the attacker calls a support desk in an effort to gain a password reset or other useful information. This is a very valuable method because if you get the right help desk person (that is, someone susceptible to a smooth-talking social engineer), you can get the keys to the kingdom.
Incorrect Answers: Impersonation occurs when an attacker pretends to be a person of authority.
Reverse social engineering occurs when the user calls the attacker for assistance.
Spoofing is not a social engineering attack
What presents the highest risk to a target network or resource? A.A disgruntled employee B.Phishing C.Script kiddies D.A white-hat attacker
A.A disgruntled employee
Explanation
Correct Answer: Everyone recognizes insider threats as the worst type of threat, and a disgruntled employee on the inside is the single biggest threat for security professionals to plan for and deal with.
Incorrect Answers: Script kiddies usually don’t pose much threat–defenses are aligned against them.
Phishing is a definite threat, but again defenses are in place.
White-hat attackers are hired by the organization, so they’re not an intentional threat.
A user calls the help desk complaining about large amounts of unsolicited messages being received on her Bluetooth-enabled device. Which Bluetooth attack may be in play here? A.Bluesmacking B.Bluesniffing C.Bluejacking D.Bluescaffing
C.Bluejacking
Explanation
Correct Answer: Bluejacking is a Bluetooth attack where the attacker sends unsolicited messages to the target. In many cases, this is done as part of social engineering in an effort to get the user to do something beneficial for the attacker.
Incorrect Answers: Bluesmacking is a DoS attack.
Bluesniffing is an effort to sniff data from Bluetooth exchanges.
Bluescarfing is the actual theft of data from a Bluetooth device.
A standard ping sweep using ICMP over TCP attempts to identify live hosts on the network. Which of the following provides an explanation for no response from a ping request?
A.The hosts might be turned off or disconnected
B.TTL value is too low
C.The destination network might be down
D.All of the answers are correct
E.ICMP is being filtered
D.All of the answers are correct
Explanation
Correct Answer: Ping basically asks a host to return the packet sent. It’s used mainly to identify live hosts and to help in troubleshooting.
If the host isn’t available–because it’s turned off or ICMP is being filtered by an external (or internal) device–then it cannot respond (almost like yelling to your kids who can’t hear you due to the loud music in the room).
The TTL value tells the ping packet when to “die” and is decremented after passing through a router (hop). If it isn’t high enough to reach the host system, there will be no reply.
Incorrect Answers: Because all these are correct responses, “All of the answers are correct.” is the only appropriate choice.
Which of the following is defined as a process of evaluating assets to determine the amount of vulnerability each represents to the organization? A.Vulnerability scanning B.Pen test C.Security analysis D.Risk assessment
D.Risk assessment
Explanation
Correct Answer: A risk assessment, part of overall risk management, is an evaluation process whereby everything is looked at through the prism of “what vulnerabilities does this asset add to my environment?” Risk assessors should consider security and administrative safeguards in place and evaluate how likely each system is to be compromised. From this analysis, companies can decide to accept, mitigate, transfer, or avoid the risk.
Incorrect Answers: The remaining answers do not reflect the definition provided.
You have network anomaly-based IPS set up, along with multiple other tools for security controls. This morning on the way to work, you receive an e-mail alert on your phone regarding possible malicious traffic. In investigating, you see that the IPS saw the anomalous traffic coming into the network and leaving, with the alert based on the unexpected behavior. The traffic turned out to be a user coming into work very early to get a project finished. Which of the following best describes what the IPS noted? A.False positive B.True negative C.False negative D.True positive
A.False positive
Explanation
Correct Answer: The IPS saw the traffic, obviously, but made a decision it was bad traffic based on previous noted behavior, when it was, indeed, normal traffic (just at an abnormal time). The traffic was flagged as malicious even though it wasn’t, which is the definition of a false positive.
Incorrect Answers: A false negative occurs when the IPS sees traffic as good when it is actually malicious. The other two answers are distractors.
ICMP packets do not work in identifying targets on a particular subnet. Which of the following is the best option in this situation? A.TCP Ping B.Nslookup C.Traceroute D.Broadcast ping
A.TCP Ping
Explanation
Correct Answer: A single target not responding doesn’t necessarily means it’s not “awake”–there could be several reasons why it’s not providing any answer. If you suspect ICMP is blocked, try a TCP ping. The integrated Windows ping utility can’t ping over TCP, so you may have to use tcping.exe (or another comparable tool).
Incorrect Answers: Traceroute does use UDP packets (tracert, on the Windows side, uses TCP and the TTL count), so it wouldn’t be blocked. However, it’s designed to display path information, not to necessarily identify targets.
Nslookup might work in a zone transfer to tell you what systems DNS knows about, but it can’t tell you what’s necessarily alive.
A broadcast ping is simply ICMP sent to the broadcast address in the subnet.
Which of the following allow for Bluetooth device discovery? (Choose two.) A.BT Browser B.PhoneSnoop C.BBPRoxy D.BlueScanner
A.BT Browser
D.BlueScanner
Explanation
Correct Answer: BlueScanner (from SourceForge) does a great job of finding devices around you, and can also try to extract and display as much information as possible. BT Browser is another great, and well-known, tool for finding and enumerating nearby devices.
Incorrect Answers: BBProxy is a BlackBerry-centric tool that’s useful in an attack called blackjacking.
PhoneSnoop is good for spyware on a BlackBerry.
You are performing tests from a Cisco device. Which of the following commands should be used to help identify a packet's path to its destination? A.Ping B.Traceroute C.tracert D.ipconfig
B.Traceroute
Explanation
Correct Answer: Traceroute is a good tool to show a packet’s path to its destination. On a Windows machine, the command is tracert, and the tool uses TTL to map each hop along the way. On virtually everything else (including Linux and most Cisco devices), the command is traceroute, and the tool uses UDP instead.
Incorrect Answers: These are not the correct tools to use. Ping sends an echo request, and ipconfig displays NIC information.
Which of the following laws protects the confidentiality and integrity of personal information collected by financial institutions? A.PCI DSS B.GLBA C.HIPAA D.Sarbanes-Oxley
B.GLBA
Explanation
Correct Answer: The Gramm-Leach-Bliley Act (GLBA) requires financial institutions to take steps to protect customer information. It also forces them to provide their privacy practices to the public.
Incorrect Answers: HIPAA deals with the protection of personal data in the medical realm.
SOX deals with publicly traded companies, forcing them to allow independent audits and to post financial findings.
PCI DSS is in place to secure data used in credit card transactions and storage.
You are performing reconnaissance on a target and want to see domain name registration contact information. Which of the following is your best choice? A.Whois B.IETF C.CAPTCHA D.IANA
A.Whois
Explanation
Correct Answer: Whois provides all sorts of information on registrants–technical POCs, who registered the domain, contact numbers, and so on.
Incorrect Answers: CAPTCHA is a means to distinguish human from machine input, where a text entry or a picture identification requires a real human to click or enter it. IANA regulates IP allocation, and IETF is a standards organization.
Which of the following nmap scans would be the least likely to be detectable? A.nmap -sS -PT -PI -O -TI B.nmap -sF -P0 -O C.nmap -sF -PT -PI -O D.nmap -sO -PT -O -CS
A.nmap -sS -PT -PI -O -TI
Explanation
Correct Answer: The T1 switch slows the scan down tremendously.
Incorrect Answers: The remaining scans either have poor syntax (C5 switch) or do not address speed/stealth.