Hustle 5 Flashcards

1
Q

What type of a vulnerability/attack is it when the malicious person forces the user’s browser to send an authenticated request to a server?
A. Session hijacking
B. Server side request forgery
C. Cross-site request forgery
D. Cross-site scripting

A

C. Cross-site request forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Websites and web portals that provide web services commonly use the Simple Object Access Protocol (SOAP).
Which of the following is an incorrect definition or characteristics of the protocol?
A. Exchanges data between web services
B. Only compatible with the application protocol HTTP
C. Provides a structured model for messaging
D. Based on XML

A

B. Only compatible with the application protocol HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A Security Engineer at a medium-sized accounting firm has been tasked with discovering how much information can be obtained from the firm’s public facing web servers. The engineer decides to start by using netcat
to port 80.
The engineer receives this output:
HTTP/1.1 200 OK
Server: Microsoft-IIS/6
Expires: Tue, 17 Jan 2011 01:41:33 GMT
Date: Mon, 16 Jan 2011 01:41:33 GMT
Content-Type: text/html
Accept-Ranges: bytes
Last Modified: Wed, 28 Dec 2010 15:32:21 GMT
ETag:”b0aac0542e25c31:89d”
Content-Length: 7369
Which of the following is an example of what the engineer performed?
A. Banner grabbing
B. SQL injection
C. Whois database query
D. Cross-site scripting

A

A. Banner grabbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The network in PLUS company is using the network address 192.168.1.64 with mask 255.255.255.192.
In the network the servers are in the addresses 192.168.1.122, 192.168.1.123 and 192.168.1.124. An attacker is trying to find those servers but he cannot see them in his scanning. The command he is using is: nmap
192.168.1.64/28.
Why he cannot see the servers?
A. He needs to add the command ““ip address”” just before the IP address
B. He needs to change the address to 192.168.1.0 with the same mask
C. He is scanning from 192.168.1.64 to 192.168.1.78 because of the mask /28 and the servers are not in that range
D. The network must be dawn and the nmap command and IP address are ok

A

C. He is scanning from 192.168.1.64 to 192.168.1.78 because of the mask /28 and the servers are not in that range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victim’s profile to a text file and then submit the data to the attacker’s
database.
< iframe src=”“http://www.vulnweb.com/updateif.php”” style=”“display:none”” > < /iframe > What is this type of attack (that can use either HTTP GET or HTTP POST) called?
A. Browser Hacking
B. Cross-Site Scripting
C. SQL Injection
D. Cross-Site Request Forgery

A

D. Cross-Site Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Metasploit Framework tool can help penetration tester for evading Anti-virus Systems?
A. msfpayload
B. msfcli
C. msfd
D. msfencode

A

D. msfencode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When you are testing a web application, it is very useful to employ a proxy tool to save every request and response. You can manually test every request and analyze the response to find vulnerabilities.
You can test parameter and headers manually to get more precise results than if using web vulnerability scanners.
What proxy tool will help you find web vulnerabilities?
A. Maskgen
B. Dimitry
C. Burpsuite
D. Proxychains

A

C. Burpsuite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Nmap option would you use if you were not concerned about being detected and wanted to perform a very fast scan?
A. -T5
B. -O
C. -T0
D. -A

A

A. -T5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Geena, a cloud architect, uses a master component in the Kubernetes cluster architecture that scans newly generated pods and allocates a node to them. This component can also assign nodes based on factors such
as the overall resource requirement, data locality, software/hardware/policy restrictions, and internal workload interventions.
Which of the following master components is explained in the above scenario?
A. Kube-controller-manager
B. Kube-scheduler
C. Kube-apiserver
D. Etcd cluster

A

B. Kube-scheduler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_________ is a type of phishing that targets high-profile executives such as CEOs, CFOs, politicians, and celebrities who have access to confidential and highly valuable information.
A. Spear phishing
B. Whaling
C. Vishing
D. Phishing

A

B. Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Peter, a system administrator working at a reputed IT firm, decided to work from his home and login remotely. Later, he anticipated that the remote connection could be exposed to session hijacking. To curb this
possibility, he implemented a technique that creates a safe and encrypted tunnel over a public network to securely send and receive sensitive information and prevent hackers from decrypting the data flow between
the endpoints. What is the technique followed by
Peter to send files securely through a remote connection?
A. DMZ
B. SMB signing
C. VPN
D. Switch network

A

C. VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An attacker can employ many methods to perform social engineering against unsuspecting employees, including scareware.
What is the best example of a scareware attack?
A. A pop-up appears to a user stating, “You have won a free cruise! Click here to claim your prize!”
B. A banner appears to a user stating, “Your account has been locked. Click here to reset your password and unlock your account.”
C. A banner appears to a user stating, “Your Amazon order has been delayed. Click here to find out your new delivery date.”
D. A pop-up appears to a user stating, “Your computer may have been infected with spyware. Click here to install an anti-spyware tool to resolve this issue.”

A

D. A pop-up appears to a user stating, “Your computer may have been infected with spyware. Click here to install an anti-spyware tool to resolve this issue.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bill has been hired as a penetration tester and cyber security auditor for a major credit card company. Which information security standard is most applicable to his role?
A. FISMA
B. HITECH
C. PCI-DSS
D. Sarbanes-OxleyAct

A

C. PCI-DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tony wants to integrate a 128-bit symmetric block cipher with key sizes of 128,192, or 256 bits into a software program, which involves 32 rounds of computational operations that include substitution and
permutation operations on four 32- bit word blocks using 8-variable S-boxes with 4-bit entry and 4-bit exit. Which of the following algorithms includes all the above features and can be integrated by Tony into the
software program?
A. TEA
B. CAST-128
C. RC5
D. serpent

A

C. RC5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Morris, an attacker, wanted to check whether the target AP is in a locked state. He attempted using different utilities to identify WPS-enabled APs in the target wireless network. Ultimately, he succeeded with one
special command-line utility. Which of the following command-line utilities allowed Morris to discover the WPS-enabled APs?
A. wash
B. ntptrace
C. macof
D. net View

A

A. wash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of virus is most likely to remain undetected by antivirus software?
A. Cavity virus
B. Stealth virus
C. File-extension virus
D. Macro virus

A

B. Stealth virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ben purchased a new smartphone and received some updates on it through the OTA method. He received two messages: one with a PIN from the network operator and another asking him to enter the PIN received
from the operator. As soon as he entered the PIN, the smartphone started functioning in an abnormal manner. What is the type of attack performed on Ben in the above scenario?
A. Advanced SMS phishing
B. Bypass SSL pinning
C. Phishing
D. Tap ‘n ghost attack

A

A. Advanced SMS phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Jack, a professional hacker, targets an organization and performs vulnerability scanning on the target web server to identify any possible weaknesses, vulnerabilities, and misconfigurations. In this process, Jack uses
an automated tool that eases his work and performs vulnerability scanning to find hosts, services, and other vulnerabilities in the target server. Which of the following tools is used by Jack to perform vulnerability
scanning?
A. Infoga
B. WebCopier Pro
C. Netsparker
D. NCollector Studio

A

A. Infoga

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Stephen, an attacker, targeted the industrial control systems of an organization. He generated a fraudulent email with a malicious attachment and sent it to employees of the target organization. An employee who
manages the sales software of the operational plant opened the fraudulent email and clicked on the malicious attachment. This resulted in the malicious attachment being downloaded and malware being injected
into the sales software maintained in the victim’s system. Further, the malware propagated itself to other networked systems, finally damaging the industrial automation components. What is the attack technique
used by Stephen to damage the industrial systems?
A. Spear-phishing attack
B. SMishing attack
C. Reconnaissance attack
D. HMI-based attack

A

A. Spear-phishing attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Shiela is an information security analyst working at HiTech Security Solutions. She is performing service version discovery using Nmap to obtain information about the running services and their versions on a target
system.
Which of the following Nmap options must she use to perform service version discovery on the target host?
A. -SN
B. -SX
C. -sV
D. -SF

A

C. -sV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Kate dropped her phone and subsequently encountered an issue with the phone’s internal speaker.
Thus, she is using the phone’s loudspeaker for phone calls and other activities. Bob, an attacker, takes advantage of this vulnerability and secretly exploits the hardware of Kate’s phone so that he can monitor the
loudspeaker’s output from data sources such as voice assistants, multimedia messages, and audio files by using a malicious app to breach speech privacy. What is the type of attack Bob performed on Kate in the
above scenario?
A. Man-in-the-disk attack
B. aLTEr attack
C. SIM card attack
D. Spearphone attack

A

D. Spearphone attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Jude, a pen tester, examined a network from a hacker’s perspective to identify exploits and vulnerabilities accessible to the outside world by using devices such as firewalls, routers, and servers.
In this process, he also estimated the threat of network security attacks and determined the level of security of the corporate network.
What is the type of vulnerability assessment that Jude performed on the organization?
A. External assessment
B. Passive assessment
C. Host-based assessment
D. Application assessment

A

A. External assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Roma is a member of a security team. She was tasked with protecting the internal network of an organization from imminent threats. To accomplish this task, Roma fed threat intelligence into the security devices in a
digital format to block and identify inbound and outbound malicious traffic entering the organization’s network.
Which type of threat intelligence is used by Roma to secure the internal network?
A. Technical threat intelligence
B. Operational threat intelligence
C. Tactical threat intelligence
D. Strategic threat intelligence

A

A. Technical threat intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Becky has been hired by a client from Dubai to perform a penetration test against one of their remote offices. Working from her location in Columbus, Ohio, Becky runs her usual reconnaissance scans to obtain basic
information about their network. When analyzing the results of her Whois search, Becky notices that the IP was allocated to a location in Le Havre, France. Which regional Internet registry should Becky go to for
detailed information?
A. ARIN
B. APNIC
C. RIPE
D. LACNIC

A

C. RIPE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Joel, a professional hacker, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a
malicious script that can redirect users from the web page and download malware onto a victim’s machine. Joel waits for the victim to access the infected web application so as to compromise the victim’s machine.
Which of the following techniques is used by Joel in the above scenario?
A. DNS rebinding attack
B. Clickjacking attack
C. MarioNet attack
D. Watering hole attack

A

D. Watering hole attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Juliet, a security researcher in an organization, was tasked with checking for the authenticity of images to be used in the organization’s magazines. She used these images as a search query and tracked the original
source and details of the images, which included photographs, profile pictures, and memes. Which of the following footprinting techniques did Rachel use to finish her task?
A. Reverse image search
B. Meta search engines
C. Advanced image search
D. Google advanced search

A

A. Reverse image search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A security analyst uses Zenmap to perform an ICMP timestamp ping scan to acquire information related to the current time from the target host machine.
Which of the following Zenmap options must the analyst use to perform the ICMP timestamp ping scan?
A. -PY
B. -PU
C. -PP
D. -Pn

A

C. -PP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Elante company has recently hired James as a penetration tester. He was tasked with performing enumeration on an organization’s network. In the process of enumeration, James discovered a service that is
accessible to external sources.
This service runs directly on port 21. What is the service enumerated byjames in the above scenario?
A. Border Gateway Protocol (BGP)
B. File Transfer Protocol (FTP)
C. Network File System (NFS)
D. Remote procedure call (RPC)

A

B. File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Given below are different steps involved in the vulnerability-management life cycle.
1) Remediation
2) Identify assets and create a baseline
3) Verification
4) Monitor
5) Vulnerability scan
6) Risk assessment
Identify the correct sequence of steps involved in vulnerability management.
A. 2–>5–>6–>1–>3–>4
B. 2–>1–>5–>6–>4–>3
C. 2–>4–>5–>3–>6–> 1
D. 1–>2–>3–>4–>5–>6

A

A. 2–>5–>6–>1–>3–>4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Tony is a penetration tester tasked with performing a penetration test. After gaining initial access to a target system, he finds a list of hashed passwords.
Which of the following tools would not be useful for cracking the hashed passwords?
A. John the Ripper
B. Hashcat
C. netcat
D. THC-Hydra

A

C. netcat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which Nmap switch helps evade IDS or firewalls?
A. -n/-R
B. -0N/-0X/-0G
C. -T
D. -D

A

C. -T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Harper, a software engineer, is developing an email application. To ensure the confidentiality of email messages. Harper uses a symmetric-key block cipher having a classical 12- or 16-round Feistel network with a
block size of 64 bits for encryption, which includes large 8 x 32-bit S-boxes (S1, S2, S3, S4) based on bent functions, modular addition and subtraction, key-dependent rotation, and XOR operations. This cipher also uses
a masking key(Km1)and a rotation key (Kr1) for performing its functions. What is the algorithm employed by Harper to secure the email messages?
A. CAST-128
B. AES
C. GOST block cipher
D. DES

A

A. CAST-128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following Google advanced search operators helps an attacker in gathering information about websites that are similar to a specified target URL?
A. [inurl:]
B. [related:]
C. [info:]
D. [site:]

A

B. [related:]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The security team of Debry Inc. decided to upgrade Wi-Fi security to thwart attacks such as dictionary attacks and key recovery attacks. For this purpose, the security team started implementing cutting-edge
technology that uses a modern key establishment protocol called the simultaneous authentication of equals (SAE), also known as dragonfly key exchange, which replaces the PSK concept. What is the Wi-Fi encryption
technology implemented by Debry Inc.?
A. WEP
B. WPA
C. WPA2
D. WPA3

A

D. WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Stella, a professional hacker, performs an attack on web services by exploiting a vulnerability that provides additional routing information in the SOAP header to support asynchronous communication. This further
allows the transmission of web-service requests and response messages using different TCP connections. Which of the following attack techniques is used by Stella to compromise the web services?
A. XML injection
B. WS-Address spoofing
C. SOAPAction spoofing
D. Web services parsing attacks

A

B. WS-Address spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

James is working as an ethical hacker at Technix Solutions. The management ordered James to discover how vulnerable its network is towards footprinting attacks. James took the help of an opensource framework
for performing automated reconnaissance activities. This framework helped James in gathering information using free tools and resources. What is the framework used by James to conduct footprinting and
reconnaissance activities?
A. WebSploit Framework
B. Browser Exploitation Framework
C. OSINT framework
D. SpeedPhish Framework

A

C. OSINT framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Thomas, a cloud security professional, is performing security assessment on cloud services to identify any loopholes. He detects a vulnerability in a bare-metal cloud server that can enable hackers to implant
malicious backdoors in its firmware. He also identified that an installed backdoor can persist even if the server is reallocated to new clients or businesses that use it as an laaS.
What is the type of cloud attack that can be performed by exploiting the vulnerability discussed in the above scenario?
A. Man-in-the-cloud (MITC) attack
B. Cloud cryptojacking
C. Cloudborne attack
D. Metadata spoofing attack

A

C. Cloudborne attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which among the following is the best example of the third step (delivery) in the cyber kill chain?
A. An intruder sends a malicious attachment via email to a target.
B. An intruder creates malware to be used as a malicious attachment to an email.
C. An intruder’s malware is triggered when a target opens a malicious email attachment.
D. An intruder’s malware is installed on a target’s machine.

A

A. An intruder sends a malicious attachment via email to a target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the
response of a honeypot to a manual SYN request. Which of the following techniques is employed by Dayn to detect honeypots?
A. Detecting honeypots running on VMware
B. Detecting the presence of Honeyd honeypots
C. Detecting the presence of Snort_inline honeypots
D. Detecting the presence of Sebek-based honeypots

A

C. Detecting the presence of Snort_inline honeypots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which type of malware spreads from one system to another or from one network to another and causes similar types of damage as viruses do to the infected system?
A. Rootkit
B. Trojan
C. Worm
D. Adware

A

C. Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A group of hackers were roaming around a bank office building in a city, driving a luxury car. They were using hacking tools on their laptop with the intention to find a free-access wireless network.
What is this hacking process known as?
A. GPS mapping
B. Spectrum analysis
C. Wardriving
D. Wireless sniffing

A

C. Wardriving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

John, a security analyst working for an organization, found a critical vulnerability on the organization’s LAN that allows him to view financial and personal information about the rest of the employees. Before reporting
the vulnerability, he examines the information shown by the vulnerability for two days without disclosing any information to third parties or other internal employees. He does so out of curiosity about the other
employees and may take advantage of this information later. What would John be considered as?
A. Cybercriminal
B. Black hat
C. White hat
D. Gray hat

A

D. Gray hat

43
Q

BitLocker encryption has been implemented for all the Windows-based computers in an organization. You are concerned that someone might lose their cryptographic key. Therefore, a mechanism was implemented
to recover the keys from
Active Directory. What is this mechanism called in cryptography?
A. Key archival
B. Key escrow.
C. Certificate rollover
D. Key renewal

A

B. Key escrow.

44
Q

Miley, a professional hacker, decided to attack a target organization’s network. To perform the attack, she used a tool to send fake ARP messages over the target network to link her MAC address with the target
system’s IP address. By performing this, Miley received messages directed to the victim’s MAC address and further used the tool to intercept, steal, modify, and block sensitive communication to the target system.
What is the tool employed by Miley to perform the above attack?
A. Gobbler
B. KDerpNSpoof
C. BetterCAP
D. Wireshark

A

C. BetterCAP

45
Q

Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script. After infecting the victim’s device. Mason further used Emotet to spread the infection across local
networks and beyond to compromise as many machines as possible. In this process, he used a tool, which is a self-extracting RAR file, to retrieve information related to network resources such as writable share
drives. What is the tool employed by Mason in the above scenario?
A. NetPass.exe
B. Outlook scraper
C. WebBrowserPassView
D. Credential enumerator

A

D. Credential enumerator

46
Q

Which wireless security protocol replaces the personal pre-shared key (PSK) authentication with Simultaneous Authentication of Equals (SAE) and is therefore resistant to offline dictionary attacks?
A. WPA3-Personal
B. WPA2-Enterprise
C. Bluetooth
D. ZigBee

A

D. ZigBee

47
Q

A “Server-Side Includes” attack refers to the exploitation of a web application by injecting scripts in HTML pages or executing arbitrary code remotely.
Which web-page file type, if it exists on the web server, is a strong indication that the server is vulnerable to this kind of attack?
A. .stm
B. .html
C. .rss
D. .cms

A

A. .stm

48
Q

Which of the following web vulnerabilities would an attacker be attempting to exploit if they delivered the following input?
] >
A. XXE
B. SQLi
C. IDOR
D. XXS

A

A. XXE

49
Q

Which of the following allows attackers to draw a map or outline the target organization’s network infrastructure to know about the actual environment that they are going to hack.
A. Enumeration
B. Vulnerability analysis
C. Malware analysis
D. Scanning networks

A

D. Scanning networks

50
Q

Eric, a cloud security engineer, implements a technique for securing the cloud resources used by his organization. This technique assumes by default that a user attempting to access the network is not an authentic
entity and verifies every incoming connection before allowing access to the network.
Using this technique, he also imposed conditions such that employees can access only the resources required for their role.
What is the technique employed by Eric to secure cloud resources?
A. Serverless computing
B. Demilitarized zone
C. Container technology
D. Zero trust network

A

D. Zero trust network

51
Q

Calvin, a software developer, uses a feature that helps him auto-generate the content of a web page without manual involvement and is integrated with SSI directives. This leads to a vulnerability in the developed
web application as this feature accepts remote user inputs and uses them on the page.
Hackers can exploit this feature and pass malicious SSI directives as input values to perform malicious activities such as modifying and erasing server files. What is the type of injection attack Calvin’s web application is
susceptible to?
A. Server-side template injection
B. Server-side JS injection
C. CRLF injection
D. Server-side includes injection

A

D. Server-side includes injection

52
Q

John, a professional hacker, targeted CyberSol Inc., an MNC. He decided to discover the loT devices connected in the target network that are using default credentials and are vulnerable to various hijacking attacks.
For this purpose, he used an automated tool to scan the target network for specific types of loT devices and detect whether they are using the default, factory-set credentials. What is the tool employed by John in the
above scenario?
A. loTSeeker
B. loT Inspector
C. AT&T loT Platform
D. Azure loT Central

A

C. AT&T loT Platform

53
Q

Josh has finished scanning a network and has discovered multiple vulnerable services. He knows that several of these usually have protections against external sources but are frequently susceptible to internal users.
He decides to draft an email, spoof the sender as the internal IT team, and attach a malicious file disguised as a financial spreadsheet. Before Josh sends the email, he decides to investigate other methods of getting
the file onto the system. For this particular attempt, what was the last stage of the cyber kill chain that Josh performed?
A. Exploitation
B. Weaponization
C. Delivery
D. Reconnaissance

A

B. Weaponization

54
Q

An organization decided to harden its security against web-application and web-server attacks. John, a security personnel in the organization, employed a security scanner to automate web-application security
testing and to guard the organization’s web infrastructure against web-application threats.
Using that tool, he also wants to detect XSS, directory transversal problems, fault injection, SQL injection, attempts to execute commands, and several other attacks. Which of the following security scanners will help
John perform the above task?
A. AlienVault®OSSIM™
B. Syhunt Hybrid
C. Saleae Logic Analyzer
D. Cisco ASA

A

B. Syhunt Hybrid

55
Q

To hide the file on a Linux system, you have to start the filename with a specific character. What is the character?
A. Exclamation mark (!)
B. Underscore (_)
C. Tilde H
D. Period (.)

A

D. Period (.)

56
Q

Harris is attempting to identify the OS running on his target machine. He inspected the initial TTL in the IP header and the related TCP window size and obtained the following results:
TTL: 64 Window Size: 5840
What is the OS running on the target machine?
A. Solaris OS
B. Windows OS
C. Mac OS
D. Linux OS

A

D. Linux OS

57
Q

Attacker Rony installed a rogue access point within an organization’s perimeter and attempted to intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network
that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack. What is the type of
vulnerability assessment performed by johnson in the above scenario?
A. Host-based assessment
B. Wireless network assessment
C. Application assessment
D. Distributed assessment

A

B. Wireless network assessment

58
Q

Jane is working as a security professional at CyberSol Inc. She was tasked with ensuring the authentication and integrity of messages being transmitted in the corporate network. To encrypt the messages, she
implemented a security model in which every user in the network maintains a ring of public keys. In this model, a user needs to encrypt a message using the receiver’s public key, and only the receiver can decrypt the
message using their private key. What is the security model implemented by Jane to secure corporate messages?
A. Zero trust network
B. Transport Layer Security (TLS)
C. Secure Socket Layer (SSL)
D. Web of trust (WOT)

A

D. Web of trust (WOT)

59
Q

While performing an Nmap scan against a host, Paola determines the existence of a firewall. In an attempt to determine whether the firewall is stateful or stateless, which of the following options would be best to
use?
A. -sA
B. -sX
C. -sT
D. -sF

A

A. -sA

60
Q

Bob wants to ensure that Alice can check whether his message has been tampered with. He creates a checksum of the message and encrypts it using asymmetric cryptography. What key does Bob use to encrypt the
checksum for accomplishing this goal?
A. Alice’s private key
B. Alice’s public key
C. His own private key
D. His own public key

A

B. Alice’s public key

61
Q

Mirai malware targets loT devices. After infiltration, it uses them to propagate and create botnets that then used to launch which types of attack?
A. MITM attack
B. Birthday attack
C. DDoS attack
D. Password attack

A

C. DDoS attack

62
Q

What information security law or standard aims at protecting stakeholders and the general public from accounting errors and fraudulent activities within organizations?
A. PCI-DSS
B. FISMA
C. SOX
D. ISO/I EC 27001:2013

A

C. SOX

63
Q

Kevin, an encryption specialist, implemented a technique that enhances the security of keys used for encryption and authentication. Using this technique, Kevin input an initial key to an algorithm that generated an
enhanced key that is resistant to brute-force attacks. What is the technique employed by Kevin to improve the security of encryption keys?
A. Key derivation function
B. Key reinstallation
C. A Public key infrastructure
D. Key stretching

A

D. Key stretching

64
Q

Ron, a security professional, was pen testing web applications and SaaS platforms used by his company. While testing, he found a vulnerability that allows hackers to gain unauthorized access to API objects and
perform actions such as view, update, and delete sensitive data of the company.
What is the API vulnerability revealed in the above scenario?
A. Code injections
B. Improper use of CORS
C. No ABAC validation
D. Business logic flaws

A

C. No ABAC validation

65
Q

Leverox Solutions hired Arnold, a security professional, for the threat intelligence process. Arnold collected information about specific threats against the organization. From this information, he retrieved contextual
information about security events and incidents that helped him disclose potential risks and gain insight into attacker methodologies. He collected the information from sources such as humans, social media, and chat
rooms as well as from events that resulted in cyberattacks. In this process, he also prepared a report that includes identified malicious activities, recommended courses of action, and warnings for emerging attacks.
What is the type of threat intelligence collected by Arnold in the above scenario?
A. Strategic threat intelligence
B. Tactical threat intelligence
C. Operational threat intelligence
D. Technical threat intelligence

A

C. Operational threat intelligence

66
Q

Rebecca, a security professional, wants to authenticate employees who use web services for safe and secure communication. In this process, she employs a component of the Web Service Architecture, which is an
extension of SOAP, and it can maintain the integrity and confidentiality of SOAP messages.
Which of the following components of the Web Service Architecture is used by Rebecca for securing the communication?
A. WSDL
B. WS Work Processes
C. WS-Policy
D. WS-Security

A

D. WS-Security

67
Q

Jake, a professional hacker, installed spyware on a target iPhone to spy on the target user’s activities.
He can take complete control of the target mobile device by jailbreaking the device remotely and record audio, capture screenshots, and monitor all phone calls and SMS messages. What is the type of spyware that
Jake used to infect the target device?
A. DroidSheep
B. Androrat
C. Zscaler
D. Trident

A

D. Trident

68
Q

Clark, a professional hacker, attempted to perform a Btlejacking attack using an automated tool, Btlejack, and hardware tool, micro:bit. This attack allowed Clark to hijack, read, and export sensitive information shared between connected devices. To perform this attack, Clark executed various btlejack commands. Which of the following commands was used by Clark to hijack the connections?
A. btlejack-f 0x129f3244-j
B. btlejack -c any
C. btlejack -d /dev/ttyACM0 -d /dev/ttyACM2 -s
D. btlejack -f 0x9c68fd30 -t -m 0x1 fffffffff

A

D. btlejack -f 0x9c68fd30 -t -m 0x1 fffffffff

69
Q

Mike, a security engineer, was recently hired by BigFox Ltd. The company recently experienced disastrous DoS attacks. The management had instructed Mike to build defensive strategies for the company’s IT
infrastructure to thwart DoS/ DDoS attacks. Mike deployed some countermeasures to handle jamming and scrambling attacks. What is the countermeasure Mike applied to defend against jamming and scrambling
attacks?
A. Allow the usage of functions such as gets and strcpy
B. Allow the transmission of all types of addressed packets at the ISP level
C. Implement cognitive radios in the physical layer
D. A Disable TCP SYN cookie protection

A

C. Implement cognitive radios in the physical layer

70
Q

What useful information is gathered during a successful Simple Mail Transfer Protocol (SMTP) enumeration?
A. The two internal commands VRFY and EXPN provide a confirmation of valid users, email addresses, aliases, and mailing lists.
B. Reveals the daily outgoing message limits before mailboxes are locked
C. The internal command RCPT provides a list of ports open to message traffic.
D. A list of all mail proxy server addresses used by the targeted host

A

A. The two internal commands VRFY and EXPN provide a confirmation of valid users, email addresses, aliases, and mailing lists.

71
Q

Gregory, a professional penetration tester working at Sys Security Ltd., is tasked with performing a security test of web applications used in the company. For this purpose, Gregory uses a tool to test for any security
loopholes by hijacking a session between a client and server. This tool has a feature of intercepting proxy that can be used to inspect and modify the traffic between the browser and target application. This tool can
also perform customized attacks and can be used to test the randomness of session tokens. Which of the following tools is used by Gregory in the above scenario?
A. Nmap
B. Burp Suite
C. CxSAST
D. Wireshark

A

B. Burp Suite

72
Q

When considering how an attacker may exploit a web server, what is web server footprinting?
A. When an attacker implements a vulnerability scanner to identify weaknesses
B. When an attacker creates a complete profile of the site’s external links and file structures
C. When an attacker gathers system-level data, including account details and server names
D. When an attacker uses a brute-force attack to crack a web-server password

A

C. When an attacker gathers system-level data, including account details and server names

73
Q

Which of the following tactics uses malicious code to redirect users’ web traffic?
A. Spimming
B. Pharming
C. Phishing
D. Spear-phishing

A

B. Pharming

74
Q

Attacker Simon targeted the communication network of an organization and disabled the security controls of NetNTLMvl by modifying the values of LMCompatibilityLevel, NTLMMinClientSec, and
RestrictSendingNTLMTraffic. He then extracted all the non-network logon tokens from all the active processes to masquerade as a legitimate user to launch further attacks. What is the type of attack performed by
Simon?
A. Internal monologue attack
B. Combinator attack
C. Rainbow table attack
D. Dictionary attack

A

A. Internal monologue attack

75
Q

Calvin, a grey-hat hacker, targets a web application that has design flaws in its authentication mechanism. He enumerates usernames from the login form of the web application, which requests users to feed data and
specifies the incorrect field in case of invalid credentials. Later, Calvin uses this information to perform social engineering.
Which of the following design flaws in the authentication mechanism is exploited by Calvin?
A. Insecure transmission of credentials
B. Verbose failure messages
C. User impersonation
D. Password reset mechanism

A

B. Verbose failure messages

76
Q

Henry is a penetration tester who works for XYZ organization. While performing enumeration on a client organization, he queries the DNS server for a specific cached DNS record. Further, by using this cached record,
he determines the sites recently visited by the organization’s user. What is the enumeration technique used by Henry on the organization?
A. DNS zone walking
B. DNS cache snooping
C. DNS SEC zone walking
D. DNS cache poisoning

A

B. DNS cache snooping

77
Q

An attacker decided to crack the passwords used by industrial control systems. In this process, he employed a loop strategy to recover these passwords. He used one character at a time to check whether the first
character entered is correct; if so, he continued the loop for consecutive characters.
If not, he terminated the loop. Furthermore, the attacker checked how much time the device took to finish one complete password authentication process, through which he deduced how many characters entered
are correct.
What is the attack technique employed by the attacker to crack the passwords of the industrial control systems?
A. Side-channel attack
B. Denial-of-service attack
C. HMI-based attack
D. Buffer overflow attack

A

A. Side-channel attack

78
Q

Mary, a penetration tester, has found password hashes in a client system she managed to breach.
She needs to use these passwords to continue with the test, but she does not have time to find the passwords that correspond to these hashes. Which type of attack can she implement in order to continue?
A. LLMNR/NBT-NS poisoning
B. Internal monologue attack
C. Pass the ticket
D. Pass the hash

A

D. Pass the hash

79
Q

Jack, a disgruntled ex-employee of Incalsol Ltd., decided to inject fileless malware into Incalsol’s systems. To deliver the malware, he used the current employees’ email IDs to send fraudulent emails embedded with
malicious links that seem to be legitimate. When a victim employee clicks on the link, they are directed to a fraudulent website that automatically loads Flash and triggers the exploit.
What is the technique used byjack to launch the fileless malware on the target systems?
A. In-memory exploits
B. Phishing
C. Legitimate applications
D. Script-based injection

A

B. Phishing

80
Q

In an attempt to damage the reputation of a competitor organization, Hailey, a professional hacker, gathers a list of employee and client email addresses and other related information by using various search engines,
social networking sites, and web spidering tools. In this process, she also uses an automated tool to gather a list of words from the target website to further perform a brute-force attack on the previously gathered
email addresses.
What is the tool used by Hailey for gathering a list of words from the target website?
A. Shadowsocks
B. CeWL
C. Psiphon
D. Orbot

A

B. CeWL

81
Q

Sam, a web developer, was instructed to incorporate a hybrid encryption software program into a web application to secure email messages. Sam used an encryption software, which is a free implementation of the
OpenPGP standard that uses both symmetric-key cryptography and asymmetric-key cryptography for improved speed and secure key exchange. What is the encryption software employed by Sam for securing the
email messages?
A. PGP
B. S/MIME
C. SMTP
D. GPG

A

A. PGP

82
Q

Which among the following is the best example of the hacking concept called “clearing tracks”?
A. After a system is breached, a hacker creates a backdoor to allow re-entry into a system.
B. During a cyberattack, a hacker injects a rootkit into a server.
C. An attacker gains access to a server through an exploitable vulnerability.
D. During a cyberattack, a hacker corrupts the event logs on all machines.

A

D. During a cyberattack, a hacker corrupts the event logs on all machines.

83
Q

George, an employee of an organization, is attempting to access restricted websites from an official computer. For this purpose, he used an anonymizer that masked his real IP address and ensured complete and
continuous anonymity for all his online activities. Which of the following anonymizers helps George hide his activities?
A. https://www.baidu.com
B. https://www.guardster.com
C. https://www.wolframalpha.com
D. https://karmadecay.com

A

B. https://www.guardster.com

84
Q

Richard, an attacker, targets an MNC In this process, he uses a footprinting technique to gather as much information as possible. Using this technique, he gathers domain information such as the target domain name,
contact details of its owner, expiry date, and creation date. With this information, he creates a map of the organization’s network and misleads domain owners with social engineering to obtain internal details of its
network. What type of footprinting technique is employed by Richard?
A. VPN footprinting
B. Email footprinting
C. VoIP footprinting
D. Whois footprinting

A

B. Email footprinting

85
Q

An attacker utilizes a Wi-Fi Pineapple to run an access point with a legitimate-looking SSID for a nearby business in order to capture the wireless password. What kind of attack is this?
A. MAC spoofing attack
B. Evil-twin attack
C. War driving attack
D. Phishing attack

A

B. Evil-twin attack

86
Q

You are using a public Wi-Fi network inside a coffee shop. Before surfing the web, you use your VPN to prevent intruders from sniffing your traffic. If you did not have a VPN, how would you identify whether someone
is performing an ARP spoofing attack on your laptop?
A. You should check your ARP table and see if there is one IP address with two different MAC addresses.
B. You should scan the network using Nmap to check the MAC addresses of all the hosts and look for duplicates.
C. You should use netstat to check for any suspicious connections with another IP address within the LAN.
D. You cannot identify such an attack and must use a VPN to protect your traffic, r

A

A. You should check your ARP table and see if there is one IP address with two different MAC addresses.

87
Q

This type of injection attack does not show any error message. It is difficult to exploit as it returns information when the application is given SQL payloads that elicit a true or false response from the server. By
observing the response, an attacker can extract sensitive information. What type of attack is this?
A. Time-based SQL injection
B. Union SQL injection
C. Error-based SQL injection
D. Blind SQL injection

A

D. Blind SQL injection

88
Q

An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption. The attacker installed a rogue access point with only WPA2 compatibility in the vicinity and forced the
victim to go through the
WPA2 four-way handshake to get connected. After the connection was established, the attacker used automated tools to crack WPA2-encrypted messages.
What is the attack performed in the above scenario?
A. Timing-based attack
B. Side-channel attack
C. Downgrade security attack
D. Cache-based attack

A

C. Downgrade security attack

89
Q

Sophia is a shopping enthusiast who spends significant time searching for trendy outfits online. Clark, an attacker, noticed her activities several times and sent a fake email containing a deceptive page link to her
social media page displaying all-new and trendy outfits. In excitement, Sophia clicked on the malicious link and logged in to that page using her valid credentials. Which of the following tools is employed by Clark to
create the spoofed email?
A. PyLoris
B. Slowloris
C. Evilginx
D. PLCinject

A

C. Evilginx

90
Q

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient’s consent, similar to email spamming?
A. Bluesmacking
B. BlueSniffing
C. Bluejacking
D. Bluesnarfing

A

C. Bluejacking

91
Q

Jacob works as a system administrator in an organization. He wants to extract the source code of a mobile application and disassemble the application to analyze its design flaws. Using this technique, he wants to fix
any bugs in the application, discover underlying vulnerabilities, and improve defense strategies against attacks.
What is the technique used by Jacob in the above scenario to improve the security of the mobile application?
A. Reverse engineering
B. App sandboxing
C. Jailbreaking
D. Social engineering

A

A. Reverse engineering

92
Q

Which rootkit is characterized by its function of adding code and/or replacing some of the operatingsystem kernel code to obscure a backdoor on a system?
A. User-mode rootkit
B. Library-level rootkit
C. Kernel-level rootkit
D. Hypervisor-level rootkit

A

C. Kernel-level rootkit

93
Q

Which of the following Metasploit post-exploitation modules can be used to escalate privileges on Windows systems?
A. getsystem
B. getuid
C. keylogrecorder
D. autoroute

A

A. getsystem

94
Q

Robert, a professional hacker, is attempting to execute a fault injection attack on a target IoT device.
In this process, he injects faults into the power supply that can be used for remote execution, also causing the skipping of key instructions. He also injects faults into the clock network used for delivering a
synchronized signal across the chip.
Which of the following types of fault injection attack is performed by Robert in the above scenario?
A. Frequency/voltage tampering
B. Optical, electromagnetic fault injection (EMFI)
C. Temperature attack
D. Power/clock/reset glitching

A

D. Power/clock/reset glitching

95
Q

Jude, a pen tester working in Keiltech Ltd., performs sophisticated security testing on his company’s network infrastructure to identify security loopholes. In this process, he started to circumvent the network
protection tools and firewalls used in the company. He employed a technique that can create forged TCP sessions by carrying out multiple SYN, ACK, and RST or FIN packets. Further, this process allowed Jude to
execute DDoS attacks that can exhaust the network resources. What is the attack technique used by Jude for finding loopholes in the above scenario?
A. UDP flood attack
B. Ping-of-death attack
C. Spoofed session flood attack
D. Peer-to-peer attack

A

C. Spoofed session flood attack

96
Q

Upon establishing his new startup, Tom hired a cloud service provider (CSP) but was dissatisfied with their service and wanted to move to another CSP.
What part of the contract might prevent him from doing so?
A. Virtualization
B. Lock-in
C. Lock-down
D. Lock-up

A

B. Lock-in

97
Q

Alex, a cloud security engineer working in Eyecloud Inc. is tasked with isolating applications from the underlying infrastructure and stimulating communication via well-defined channels. For this purpose, he used an
open-source technology that helped him in developing, packaging, and running applications; further, the technology provides PaaS through OS-level visualization, delivers containerized software packages, and
promotes fast software delivery. What is the cloud technology employed by Alex in the above scenario?
A. Virtual machine
B. Serverless computing
C. Docker
D. Zero trust network

A

C. Docker

98
Q

CyberTech Inc. recently experienced SQL injection attacks on its official website. The company appointed Bob, a security professional, to build and incorporate defensive strategies against such attacks. Bob adopted a
practice whereby only a list of entities such as the data type, range, size, and value, which have been approved for secured access, is accepted. What is the defensive technique employed by Bob in the above
scenario?
A. Output encoding
B. Enforce least privileges
C. Whitelist validation
D. Blacklist validation

A

C. Whitelist validation

99
Q

Which type of attack attempts to overflow the content-addressable memory (CAM) table in an Ethernet switch?
A. Evil twin attack
B. DNS cache flooding
C. MAC flooding
D. DDoS attack

A

C. MAC flooding

100
Q

What is the following command used for? sqlmap.py-u ,,http://10.10.1.20/?p=1&forumaction=search” -dbs
A. Creating backdoors using SQL injection
B. A Enumerating the databases in the DBMS for the URL
C. Retrieving SQL statements being executed on the database
D. Searching database statements at the IP address given

A

B. A Enumerating the databases in the DBMS for the URL`

101
Q

Which of the following types of SQL injection attacks extends the results returned by the original query, enabling attackers to run two or more statements if they have the same structure as the original one?
A. Error-based injection
B. Boolean-based blind SQL injection
C. Blind SQL injection
D. Union SQL injection

A

C. Blind SQL injection

102
Q

Your organization has signed an agreement with a web hosting provider that requires you to take full responsibility of the maintenance of the cloud-based resources. Which of the following models covers this?
A. Platform as a service
B. Software as a service
C. Functions as a
D. service Infrastructure as a service

A

B. Software as a service

103
Q

Lewis, a professional hacker, targeted the loT cameras and devices used by a target venture-capital firm. He used an information-gathering tool to collect information about the loT devices connected to a network,
open ports and services, and the attack surface are a. Using this tool, he also generated statistical reports on broad usage patterns and trends. This tool helped Lewis continually monitor every reachable server and
device on the Internet, further allowing him to exploit these devices in the network. Which of the following tools was employed by Lewis in the above scenario?
A. Censys
B. Wapiti
C. NeuVector
D. Lacework

A

A. Censys

104
Q

You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise In order to evade IDS?
A. nmap -sP- -p-65535-T5
B. nmap-A-host-time 99-T1
C. nmap -A -Pn
D. nmap -sT-O- To

A

D. nmap -sT-O- To