Exam Questions - Misc 2 Flashcards
Which of the following is considered as the method of transmitting radio signals by rapidly switching a carrier among many frequency channels?
- Orthogonal Frequency-division Multiplexing (OFDM)
- Multiple input, multiple output orthogonal frequency-division multiplexing (MIMO-OFDM)
- Direct-sequence Spread Spectrum (DSSS)
- Frequency-hopping Spread Spectrum (FHSS)
Frequency-hopping Spread Spectrum (FHSS)
- Direct-sequence spread spectrum (DSSS): DSSS is a spread spectrum technique that multiplies the original data signal with a pseudo-random noise-spreading code. Also referred to as a data transmission scheme or modulation scheme, the technique protects signals against interference or jamming
- An OFDM is a method of digital modulation of data in which a signal, at a chosen frequency, is split into multiple carrier frequencies that are orthogonal (occurring at right angles) to each other
- MIMO-OFDM influences the spectral efficiency of 4G and 5G wireless communication services. Adopting the MIMO-OFDM technique reduces interference and increases the channel robustness
Which of the following Encryption techniques is used in WEP?
- RC4
- TKIP
- AES
- DES
RC4
Which of the following communication protocols is a variant of the Wi-Fi standard that provides an extended range, making it useful for communications in rural areas, and offers low data rates?
- HaLow
- Z-Wave
- 6LoWPAN
- QUIC
HaLow
Z-Wave and 6LoWPAN are both short-range standards (z-wave for IoT and 6LoWPAN for Personal Area Networks). QUIC the UDP transport that underlies HTTP3.
Which of the following tools is utilized by an attacker to perform vulnerability assessment on a target IoT and ICS environment for obtaining the objective risk score and identifying all the IoT and ICS assets connected to the target network?
- Cydia
- CyberX
- Frida
- Foren6
CyberX
- Frida is a free dynamic instrumentation toolkit that enables software professionals to execute their own scripts in software that has traditionally been locked down; i.e. proprietary (such as Android applications)
- Foren6 is a diagnosis tool for 6LoWPAN
Given below are the different steps by which an attacker can reveal a hidden SSID using the aircrack-ng suite.
- Start airodump-ng to discover SSIDs on the interface
- Run airmon-ng in the monitor mode
- Switch to airodump to view the revealed SSID
- De-authenticate the client to reveal the hidden SSID using Aireplay-ng
What is the correct sequence of steps used for revealing a hidden SSID using the aircrack-ng suite?
- Run airmon-ng in the monitor mode
- Start airodump-ng to discover SSIDs on the interface
- De-authenticate the client to reveal the hidden SSID using Aireplay-ng
- Switch to airodump to view the revealed SSID
Which of the following techniques allows an attacker to view the individual data bytes of each packet passing through a network as well as capture a data packet, decode it, and analyze its content according to predetermined rules?
- Hardware protocol analyzer
- Switch port stealing
- SPAN port
- CAM table
Hardware protocol analyzers.
- Switch port stealing involves arp poisoning and doesn’t guarantee stealing all packets passing through the switch.
- SPAN Port: Switched Port Analyzer (SPAN) is a Cisco switch feature, also known as “port mirroring,” that monitors network traffic on one or more ports on the switch. A SPAN port is a port that is configured to receive a copy of every packet that passes through a switch. It helps to analyze and debug data, identify errors, and investigate unauthorized network access
- CAM table maps MACs to interfaces on the switch.
Given below are different phases involved in hacking a system or network.
- Scanning
- Reconnaissance
- Maintaining access
- Clearing tracks
- Gaining access
What is the correct sequence of steps involved in hacking a system?
Reconnaisance -> Scanning -> Gaining Access -> Maintaining Access -> Clearing Tracks
Which of the following types of software vulnerability occurs due to coding errors and allows attackers to gain access to the target system?
- Open services
- Unpatched servers
- Buffer overflow
- Misconfiguration
Buffer overflows, as these are coding errors.
The others are human error or just innate (like open services) to the system’s function.
Which of the following static malware analysis techniques provides information about the basic functionality of any program and is also used to determine the harmful actions that a program can perform?
- Identifying packing/obfuscation methods
- Strings search
- Finding information on portable executables (PE)
- Malware disassembly
Strings search, as string searches can reveal relevant URLs and IPs the program comunicates with, as well as internal and external functions it invokes.
Malware disassembly is used to break a malicious binaries behavior out in extreme detail, rather than basic functionality.
Clark, a professional hacker, has targeted Rick, a bank employee. Clark secretly installed a backdoor Trojan in Rick’s laptop to leverage it and access Rick’s files. After installing the Trojan, Clark obtained uninterrupted access to the target machine and used it for transferring and modifying files.
Which of the following types of Trojans did Clark install in the above scenario?
- Win32/Simile
- Zmist
- Dharma
- PoisonIvy
PoisonIvy.
- Zmist: Zmist is also known as Zombie. Mistfall was the first virus to use the technique called “code integration.” This code inserts itself into other code, regenerates the code, and rebuilds the executable.
- Win32/Similie: The intruder programs this virus in assembly language to target Microsoft Windows. This process is complicated and generates almost 90% of the virus code.
- Dharma is ransomware.
Which of the following types of jailbreaking uses a loophole in SecureROM to disable signature checks and thereby load patch NOR firmware?
- Userland exploit
- iBoot exploit
- Bootrom exploit
- Tethered jailbreaking
Bootrom exploit.
iBoot exploit can be semi-tethered if the device has a new bootrom. An iboot jailbreak allows user-level access and iboot-level access. This exploit takes advantage of a loophole in iBoot (iDevice’s third bootloader) to delink the code-signing appliance. Firmware updates can patch such exploits.
Which of the following Nmap commands is used by an attacker to perform an IP protocol ping scan on a target device?
nmap –sn –PS
nmap –sn –PA
nmap –sn –PO
nmap –sn –PP
nmap -sn -PO
-PS is SYN, -PA is ACK, -PP is ICMP ping.
What is a cloud broker?
A cloud broker is an entity that manages cloud services in terms of use, performance, and delivery, and maintains the relationship between cloud providers and consumers
What is a cloud auditor?
A party for making independent assessments of cloud service controls and taking an opinion thereon
Which of the following hping command performs UDP scan on port 80?
hping3 -2 –p 80
hping3 -1 –p 80
hping3 –A –p 80
hping3 –F –P –U –p 80
hping3 -2
-2 specifies UDP
- 1 specifies ICMP
- A specifies ACK
- F specifies FIN
- P specifies PSH
- U specifies URG