Sample CEH Questions Flashcards
Which of the following can the administrator do to verify that a tape backup can be recovered in
its entirety?
A. Read the first 512 bytes of the tape
B. Perform a full restore
C. Read the last 512 bytes of the tape
D. Restore a random file
B. Perform a full restore
A company’s security policy states that all Web browsers must automatically delete their HTTP
browser cookies upon terminating. What sort of security breach is this policy attempting to
mitigate?
A. Attempts by attackers to access the user and password information stored in the company’s SQL
database.
B. Attempts by attackers to access Web sites that trust the Web browser user by stealing the user’s
authentication credentials.
C. Attempts by attackers to access password stored on the user’s computer without the user’s
knowledge.
D. Attempts by attackers to determine the user’s Web browser usage patterns, including when sites
were visited and for how long.
B. Attempts by attackers to access Web sites that trust the Web browser user by stealing the user’s
authentication credentials.
To maintain compliance with regulatory requirements, a security audit of the systems on a
network must be performed to determine their compliance with security policies. Which one of the
following tools would most likely be used in such an audit?
A. Protocol analyzer
B. Intrusion Detection System
C. Port scanner
D. Vulnerability scanner
D. Vulnerability scanner
You are tasked to perform a penetration test. While you are performing information gathering, you
find an employee list in Google. You find the receptionist’s email, and you send her an email
changing the source email to her boss’s email (boss@company). In this email, you ask for a pdf
with information. She reads your email and sends back a pdf with links. You exchange the pdf
links with your malicious links (these links contain malware) and send back the modified pdf,
saying that the links don’t work. She reads your email, opens the links, and her machine gets
infected. You now have access to the company network.
What testing method did you use?
A. Social engineering
B. Piggybacking
C. Tailgating
D. Eavesdropping
A. Social engineering
Your team has won a contract to infiltrate an organization. The company wants to have the attack
be as realistic as possible; therefore, they did not provide any information besides the company
name. What should be the first step in security testing the client?
A. Reconnaissance
B. Escalation
C. Scanning
D. Enumeration
A. Reconnaissance
A medium-sized healthcare IT business decides to implement a risk management strategy. Which
of the following is NOT one of the five basic responses to risk?
A. Accept
B. Delegate
C. Mitigate
D. Avoid
B. Delegate
OpenSSL on Linux servers includes a command line tool for testing TLS. What is the name of the
tool and the correct syntax to connect to a web server?
A. openssl s_client -site www.website.com:443
B. openssl_client -site www.website.com:443
C. openssl_client -connect www.website.com:443
D. openssl s_client -connect www.website.com:443
D. openssl s_client -connect www.website.com:443
Which of the following describes the characteristics of a Boot Sector Virus?
A. Modifies directory table entries so that directory entries point to the virus code instead of the actual
program.
B. Moves the MBR to another location on the RAM and copies itself to the original location of the
MBR.
C. Moves the MBR to another location on the hard disk and copies itself to the original location of the
MBR.
D. Overwrites the original MBR and only executes the new virus code.
C. Moves the MBR to another location on the hard disk and copies itself to the original location of the
MBR.
John is an incident handler at a financial institution. His steps in a recent incident are not up to the
standards of the company. John frequently forgets some steps and procedures while handling
responses as they are very stressful to perform. Which of the following actions should John take
to overcome this problem with the least administrative effort?
A. Increase his technical skills
B. Read the incident manual every time it occurs
C. Select someone else to check the procedures
D. Create an incident checklist
D. Create an incident checklist
Which of the following is the least-likely physical characteristic to be used in biometric control that
supports a large company?
A. Voice
B. Fingerprints
C. Iris patterns
D. Height and Weight
D. Height and Weight
While using your bank’s online servicing you notice the following string in the URL bar:
“http: // www. MyPersonalBank. com/
account?id=368940911028389&Damount=10980&Camount=21” You observe that if you modify the Damount&Camount values and submit the request, that data on the web page reflects the
changes.
Which type of vulnerability is present on this site?
A. Cookie Tampering
B. SQL Injection
C. Web Parameter Tampering
D. XSS Reflection
C. Web Parameter Tampering
It is an entity or event with the potential to adversely impact a system through unauthorized
acces, destruction, disclosure, denial of service or modification of data. Which of the following
terms best matches the definition?
A. Attack
B. Vulnerability
C. Threat
D. Risk
C. Threat
Which of the following is one of the most effective ways to prevent Cross-site Scripting (XSS)
flaws in software applications?
A. Use security policies and procedures to define and implement proper security settings.
B. Use digital certificates to authenticate a server prior to sending data.
C. Validate and escape all information sent to a server.
D. Verify acces right before allowing access to protected information and UI control
C. Validate and escape all information sent to a server.
Gavin owns a white-hat firm and is performing a website security audit for one of his clients. He
begins by running a scan which looks for common misconfigurations and outdated software
versions. Which of the following tools is he most likely using?
A. Armitage
B. Nikto
C. Metasploit
D. Nmap
B. Nikto
Matthew, a black hat, has managed to open a meterpreter session to one of the kiosk machines in Evil Corp’s lobby. He checks his current SID, which is S-1-5-21-1223352397-1872883824-861252104-501. What needs to happen before Matthew has full administrator access?
A. He needs to gain physical access.
B. He must perform privilege escalation.
C. He already has admin privileges, as shown by the “501” at the end of the SID.
D. He needs to disable antivirus protection.
B. He must perform privilege escalation.
Elliot is in the process of exploiting a web application that uses SQL as a back-end database. He
is determined that the application is vulnerable to SQL injection and has introduced conditional
timing delays into injected queries to determine whether they are successful. What type of SQL
injection is Elliot most likely performing?
A. NoSQL injection
B. Blind SQL injection
C. Union-based SQL injection
D. Error-based SQL injection
B. Blind SQL injection
You have successfully logged on a Linux system. You want to now cover your track. Your login
attempt may be logged on several files located in /var/log. Which file does NOT belong to the list:
A. wtmp
B. user.log
C. btmp
D. auth.log
B. user.log
When you return to your desk after a lunch break, you notice a strange email in your inbox. The
sender is someone you did business with recently, but the subject line has strange characters in
it. What should you do?
A. Forward the message to your company’s security response team and permanently delete the
message from your computer.
B. Reply to the sender and ask them for more information about the message contents.
C. Delete the email and pretend nothing happened.
D. Forward the message to your supervisor and ask for her opinion on how to handle the situation.
A. Forward the message to your company’s security response team and permanently delete the
message from your computer.
The “gray box testing” methodology enforces what kind of restriction?
A. Only the internal operation of a system is known to the tester.
B. The internal operation of a system is completely known to the tester.
C. The internal operation of a system is only partly accessible to the tester.
D. Only the external operation of a system is accessible to the tester.
C. The internal operation of a system is only partly accessible to the tester.
Log monitoring tools performing behavioral analysis have alerted several suspicious logins on a
Linux server occuring during non-business hours. After further examination of all login activities, it
is notices that none of the logins have occurred during typical work hours. A Linux administrator
who is investigating this problem realized the system time on the Linux server is wrong by more
than twelve hours. What protocol used on Linux serves to synchronize the time has stopped
working?
A. NTP
B. TimeKeeper
C. OSPF
D. PPP
A. NTP
The “black box testing” methodology enforces what kind of restriction?
A. Only the internal operation of a system is known to the tester.
B. The internal operation of a system is completely known to the tester.
C. The internal operation of a system is only partly accessible to the tester.
D. Only the external operation of a system is accessible to the tester.
D. Only the external operation of a system is accessible to the tester.
>NMAP -sn 192.168.11.200-215 The NMAP command above performs which of the following? A. A port scan B. A ping scan C. An operating system detect D. A trace sweep
A. A port scan
An LDAP directory can be used to store information similar to a SQL database. LDAP uses a
____ database structure instead of SQL’s ______ structure. Because of this, LDAP has difficulty
representing many-to-one relationships.
A. Strict, Abstract
B. Simple, Complex
C. Relational, Hierarchical
D. Hierarchical, Relational
D. Hierarchical, Relational
What is the purpose of DNS AAAA record? A. Address prefix record B. Address database record C. Authorization, Authentication and Auditing record D. IPv6 address resolution record
D. IPv6 address resolution record
Which of the following statements is FALSE with respect to Intrusion Detection Systems?
A. Intrusion Detection Systems can easily distinguish a malicious payload in an encrypted traffic
B. Intrusion Detection Systems can examine the contents of the data in context of the network
protocol
C. Intrusion Detection Systems can be configured to distinguish specific content in network packets
D. Intrusion Detection Systems require constant update of the signature library
A. Intrusion Detection Systems can easily distinguish a malicious payload in an encrypted traffic
You are performing a penetration test for a client and have gained shell access to a Windows
machine on the internal network. You intend to retrieve all DNS records for the internal domain. If
the DNS server is at 192.168.10.2 and the domain name is abccorp.local, what command would
you type at the nslookup prompt to attempt a zone transfer?
A. list domain=abccorp.local type=zone
B. Is -d accorp.local
C. list server=192.168.10.2 type=all
D. Iserver 192.168.10.2 -t all
B. Is -d accorp.local
Which command can be used to show the current TCP/IP connections? A. Netsh B. Net use connection C. Netstat D. Net use
C. Netstat
You are performing information gathering for an important penetration test. You have found pdf,
doc, and images in your objective. You decide to extract metadata from these files and analyze it.
What tool will help you with the task?
A. Armitage
B. Dmitry
C. Metagoofil
D. cdpsnarf
C. Metagoofil
You have several plain-text firewall logs that you must review to evaluate network traffic. You
know that in order to do fast, efficient searches of the logs you must use regular expressions.
Which command-line utility are you most likely to use?
A. Relational Database
B. MS Excel
C. Notepad
D. Grep
D. Grep
This phase will increase the odds of success in later phases of the penetration test. It is also the
very first step in Information Gathering and it will tell you the “landscape” looks like. What is the
most important phase of ethical hacking in which you need to spend a considerable amount of
time?
A. network mapping
B. footprinting
C. escalating privileges
D. gaining access
B. footprinting
When you are collecting information to perform a data analysis, Google commands are very
useful to find sensitive information and files. These files may contain information about
passwords, system functions, or documentation. What command will help you to search files
using Google as a search engine?
A. site: target.com filetype:xls username password email
B. domain: target.com archieve:xls username password email
C. inurl: target.com filename:xls username password email
D. site: target.com file:xls username password email
A. site: target.com filetype:xls username password email
You have successfully gained access to your client’s internal network and successfully comprised
a Linux server which is part of the internal IP network. You want to know which Microsoft
Windows workstations have file sharing enabled. Which port would you see listening on these
Windows machines in the network?
A. 161
B. 3389
C. 445
D. 1433
C. 445
Which of the following is assured by the use of a hash? A. Authentication B. Confidentially C. Availability D. Integrity
D. Integrity
Risks=Threats x Vulnerabilities is referred to as the: A. BIA equation B. Disaster recovery formula C. Risk equation D. Threat assessment
C. Risk equation
The tools which receive event logs from servers, network equipment, and applications, and
perform analysis and correlation on those logs, and can generate alarms for security relevant
issues, are known as what?
A. Network Sniffer
B. Vulnerability Scanner
C. Intrusion Prevention Server
D. Security Incident and Event Monitoring
D. Security Incident and Event Monitoring
You have just been hired to perform a pen test on an organization that has been subjected to a
large-scale attack. The CIO is concerned with mitigating threats and vulnerabilities to totally
eliminate risk. What is one of the first things you should do when given the job?
A. Establish attribution to suspected attackers
B. Interview all employees in the company to rule out possible insider threats
C. Explain to the CIO that you cannot eliminate all risk, but you will be able to reduce risk to
acceptable levels.
D. Start the wireshark application to start sniffing network traffic.
C. Explain to the CIO that you cannot eliminate all risk, but you will be able to reduce risk to
acceptable levels.
The purpose of a \_\_\_\_\_\_\_is to deny network access to local area networks and other information assets by unauthorized wireless devices. A. Wireless Analyzer B. Wireless Jammer C. Wireless Access Point D. Wireless Access Control List
D. Wireless Access Control List
What does the -oX flag do in an Nmap scan?
A. Perform an Xmas scan
B. Perform an eXpress scan
C. Output the results in truncated format to the screen
D. Output the results in XML format to a file
D. Output the results in XML format to a file
During an Xmas scan, what indicates a port is closed? A. RST B. SYN C. ACK D. No return response
D. No return response
While performing online banking using a Web browser, a user receives an email that contains a
link to an interesting Web site. When the user clicks on the link, another Web browser session
starts and displays a video of cats playing a piano. The next business day, the user receives what
looks like an email from his bank, indicating that his bank account has been accessed from a
foreign country. The email asks the user to call his bank and verify the authorization of a funds
transfer that took place. What Web browser-based security vulnerability was exploited to
compromise the user?
A. Clickjacking
B. Cross-Sire Scripting
C. Cross-Sire Request Forgery
D. Web form input validation
C. Cross-Sire Request Forgery
Tremp is an IT Security Manager, and he is planning to deploy an IDS in his small company. He
is looking for an IDS with the following characteristics: -Verifies success or failure of an attack -
Monitors system activities - Detects attacks that a network-based IDS fails to detect. - Near real-
time detection and response - Does not require additional hardware - Lower entry cost. Which
type of IDS is best suited for Tremp’s requirements?
A. Network-based IDS
B. Open source-based IDS
C. Host-based IDS
D. Gateway-based IDS
C. Host-based IDS
Which of the following parameters describe LM Hash:
I - The maximum password length is 14 characters
II - There are no distinctions between uppercase and lowercase
III - The password is split into two 7-byte halves
A. II
B. I
C. I, II, and III
D. I and II
C. I, II, and III
Which of the following is not a Bluetooth attack? A. Bluesnarfing B. Bluedriving C. Bluesmacking D. Bluejacking
B. Bluedriving
The Open Web Application Security Project (OWASP) is the worldwide not-for-profit charitable
organization focused on improving the security of software. What item is the primary concern on
OWASP’s Top Ten Project Most Critical Web Application Security Risks?
A. Cross Site Scripting
B. Injection
C. Path disclosure
D. Cross Site Request Forgery
B. Injection
A pen-tester is configuring a Windows laptop for a test. In setting up Wireshark, what river and
library are required to allow the NIC to work in promiscous mode?
A. Winprom
B. Libpcap
C. Winpsw
D. Winpcap
D. Winpcap
Analyst is investigating proxy logs and found out that one of the internal user visited website
storing suspicious java scripts. After opening one of them, he noticed that it is very hard to
understand the code and that all codes differ from the typical java script. What is the name of this
technique to hide the code and extend analysis time?
A. Steganography
B. Code encoding
C. Obfuscation
D. Encryption
C. Obfuscation
During the security audit of IT processes, an IS auditor found that there were no documented
security procedures. What should the IS auditor do?
A. Create a procedures document
B. Terminate the audit
C. Conduct compliance testing
D. Identify and evaluate existing practices
D. Identify and evaluate existing practices
You just set up a security system in your network. In what kind of system would you find the
following string of characters used as a rule within its configuration? alert tcp any any
->192.168.100.0/24 21 (msg:”“FTP on the network!””;)
A. a firewall IPTable
B. FTP Server rule
C. A Router IPTable
D. An Intrusion Detection System
D. An Intrusion Detection System
While scanning with Nmap, Patin found several hosts which have the IP ID of incremental
sequences. He then decided to conduct: nmap -Pn -p -sl kiosk.adobe.com www.riaa.com
kiosk.adobe.com is the host with incremental IP ID sequence. What is the purpose of using “-sl”
with Nmap?
A. Conduct stealth scan
B. Conduct ICMP scan
C. Conduct IDLE scan
D. Conduct silent scan
C. Conduct IDLE scan
What is the process of logging, recording, and resolving events that take place in an organization? A. Incident Management Process B. Security Policy C. Internal Procedure D. Metrics
A. Incident Management Process
During a blackbox pen test you attempt to pass IRC traffic over port 80/TCP from a compromised
web enabled host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded. What
type of firewall is inspecting outbound traffic?
A. Circuit
B. Stateful
C. Application
D. Packet Filtering
C. Application
The change of a hard drive failure is once every three years. The cost to buy a new hard drive is
$300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a
further 4 hours to restore the database from the last backup to the new hard disk. The recovery
person earns $10/hour. Calculate the SLE, ARO, and ALE. Assume the EF = 1(100%). What is
the closest approximate cost of this replacement and recovery operation per year?
A. $1320
B. $440
C. $100
D. $146
D. $146
An IT employee got a call from one our best customers. The caller wanted to know about the
company’s network infrastructure, systems, and team. New opportunities of integration are in
sight for both company and customer. What should this employee do?
A. The employee can not provide any information: but, anyway, he/she will provide the name of the
person in charge
B. Since the company’s policy is all about Customer Service. he/she will provide information
C. The employee should not provide any information without previous management authorization
D. Disregarding the call, the employee should hand up
C. The employee should not provide any information without previous management authorization
You are attempting to man-in-the-middle a session. Which protocol will allow you to guess a sequence number? A. ICMP B. TCP C. UPX D. UPD
B. TCP
What is a “Collision attack” in cryptography?
A. Collision attacks try to get the public key
B. Collision attacks try to break the hash into three parts to get the plaintext value
C. Collision attacks try to break the hash into two parts, with the same bytes in each part to get the
private key
D. Collision attacks try to find two inputs producing the same hash
D. Collision attacks try to find two inputs producing the same hash
Which of the following is the successor of SSL? A. GRE B. IPSec C. RSA D. TLS
D. TLS
This international organization regulates billions of transactions daily and provides security
guidelines to protect personally identifiable information (PII). These security controls provide a
baseline and prevent low-level hackers sometimes known as script kiddies from causing a data
breach. Which of the following organization is being described?
A. Institute of Electrical and Electronics Engineers(IEEE)
B. International Security Industry Organization (ISIO)
C. Center for Disease Control (CDC)
D. Payment Card Industry (PCI)
D. Payment Card Industry (PCI)
Which of the following DoS tools is used to attack target web applications by starvation of
available sessions on the web server? The tool keeps sessions at halt using never-ending POST
transmissions and sending an arbitrarily large content-length header value.
A. Stacheldraht
B. LOIC
C. R-U-Dead-Yet? (RUDY)
D. MyDoom
C. R-U-Dead-Yet? (RUDY)
WPA2 uses AES for wireless data encryption at which of the following encryption levels? A. 64 bit and CCMP B. 128 bit and CRC C. 128 bit and CCMP D. 128 bi and TKIP
C. 128 bit and CCMP
You are tasked to configure the DHCP server to lease the last 100 usable IP addresses in subnet
10.1.4.0/23.
Which of the following IP addresses could be leased as a result of the new configuration?
A. 10.1.4.254
B. 10.1.255.200
C. 10.1.5.200
D. 10.1.4.156
C. 10.1.5.200