CEH 5/6

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist's email, and you send her an email changing the source email to her boss's email (boss@company). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don't work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What testing method did you use? A. Social engineering B. Piggybacking C. Tailgating D. Eavesdropping

A. Social engineering

The "black box testing" methodology enforces what kind of restriction? A. Only the internal operation of a system is known to the tester. B. The internal operation of a system is completely known to the tester. C. The internal operation of a system is only partly accessible to the tester. D. Only the external operation of a system is accessible to the tester.

D. Only the external operation of a system is accessible to the tester

>NMAP -sn 192.168.11.200-215 The NMAP command above performs which of the following? A. A port scan B. A ping scan C. An operating system detect D. A trace sweep

A. A port scan

A penetration test was done at a company. After the test, a report was written and given to the company's IT authorities. A section from the report is shown below: Access List should be written between VLANs. Port security should be enabled for the intranet. A security solution which filters data packets should be set between intranet (LAN) and DMZ. A WAF should be used in front of the web applications. According to the section from the report, which of the following choice is true? A. A stateful firewall can be used between intranet (LAN) and DMZ. B. There is access control policy between VLANs. C. MAC Spoof attacks cannot be performed. D. Possibility of SQL Injection attack is eliminated.

A. A stateful firewall can be used between intranet (LAN) and DMZ.

It is a short-range wireless communication technology intended to replace the cables connecting portable of fixed devices while maintaining high levels of security. It allows mobile phones, computers and other devices to connect and communicate using a short-range wireless connection. Which of the following terms best matches the definition? A. Bluetooth B. WLAN C. InfraRed D. Radio-Frequency identification

A. Bluetooth

What is the correct process for the TCP three-way handshake connection establishment and connection termination? A. Connection Establishment: SYN, SYN-ACK, ACK Connection Termination: FIN, ACK-FIN, ACK B. Connection Establishment: ACK, ACK-SYN, SYN Connection Termination: FIN, ACK-FIN, ACK C. Connection Establishment: FIN, ACK-FIN, ACK Connection Termination: SYN, SYN-ACK, ACK D. Connection Establishment: SYN, SYN-ACK, ACK Connection Termination: ACK, ACK-SYN, SYN

A. Connection Establishment: SYN, SYN-ACK, ACK Connection Termination: FIN, ACK-FIN, ACK

A company's Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application. What kind of Web application vulnerability likely exists in their software? A. Cross-site scripting vulnerability B. Session management vulnerability C. SQL injection vulnerability D. Cross-site Request Forgery vulnerability

A. Cross-site scripting vulnerability

When you return to your desk after a lunch break, you notice a strange email in your inbox. The sender is someone you did business with recently, but the subject line has strange characters in it. What should you do? A. Forward the message to your company's security response team and permanently delete the message from your computer. B. Reply to the sender and ask them for more information about the message contents. C. Delete the email and pretend nothing happened. D. Forward the message to your supervisor and ask for her opinion on how to handle the situation.

A. Forward the message to your company's security response team and permanently delete the message from your computer

Which of the following statements is FALSE with respect to Intrusion Detection Systems? A. Intrusion Detection Systems can easily distinguish a malicious payload in an encrypted traffic B. Intrusion Detection Systems can examine the contents of the data in context of the network protocol C. Intrusion Detection Systems can be configured to distinguish specific content in network packets D. Intrusion Detection Systems require constant update of the signature library

A. Intrusion Detection Systems can easily distinguish a malicious payload in an encrypted traffic

An attacker attaches a rogue router in a network. He wants to redirect traffic to a LAN attached to his router as part of a man-in-the-middle attack. What measure on behalf of the legitimate admin can mitigate this attack? A. Make sure that legitimate network routers are configured to run routing protocols with authentication. B. Disable all routing protocols and only use static routes C. Only using OSPFv3 will mitigate this risk. D. Redirection of the traffic cannot happen unless the admin allows it explicitly.

A. Make sure that legitimate network routers are configured to run routing protocols with authentication.

Rebecca commonly sees an error on her Windows system that states that a Data Execution Prevention (DEP) error has taken place. Which of the following is most likely taking place? A. Malicious code is attempting to execute instruction a non-executable memory region. B. A page fault is occuring, which forces the operating system to write data from the hard drive. C. A race condition is being exploited, and the operating system is containing the malicious process. D. Malware is executing in either ROM or a cache memory area.

A. Malicious code is attempting to execute instruction a non-executable memory region.

Log monitoring tools performing behavioral analysis have alerted several suspicious logins on a Linux server occuring during non-business hours. After further examination of all login activities, it is notices that none of the logins have occurred during typical work hours. A Linux administrator who is investigating this problem realized the system time on the Linux server is wrong by more than twelve hours. What protocol used on Linux serves to synchronize the time has stopped working? A. NTP B. TimeKeeper C. OSPF D. PPP

A. NTP

Your team has won a contract to infiltrate an organization. The company wants to have the attack be as realistic as possible; therefore, they did not provide any information besides the company name. What should be the first step in security testing the client? A. Reconnaissance B. Escalation C. Scanning D. Enumeration

A. Reconnaissance

Trinity needs to scan all hosts on a /16 network for TCP port 445 only. What is the fastest way she can accomplish this with Nmap? Stealth is not a concern. A. nmap -p 445 -n -T4 -open 10.1.0.0/16 B. nmap -p 445 -max -Pn 10.1.0.0/16 C. nmap -sn -sF 10.1.0.0/16 445 D. nmap -s 445 -sU -T5 10.1.0.0/16

A. nmap -p 445 -n -T4 -open 10.1.0.0/16

A company's security policy states that all Web browsers must automatically delete their HTTP browser cookies upon terminating. What sort of security breach is this policy attempting to mitigate? A. Attempts by attackers to access the user and password information stored in the company's SQL database. B. Attempts by attackers to access Web sites that trust the Web browser user by stealing the user's authentication credentials. C. Attempts by attackers to access password stored on the user's computer without the user's knowledge. D. Attempts by attackers to determine the user's Web browser usage patterns, including when sites were visited and for how long.

B. Attempts by attackers to access Web sites that trust the Web browser user by stealing the user's authentication credentials.

Elliot is in the process of exploiting a web application that uses SQL as a back-end database. He is determined that the application is vulnerable to SQL injection and has introduced conditional timing delays into injected queries to determine whether they are successful. What type of SQL injection is Elliot most likely performing? A. NoSQL injection B. Blind SQL injection C. Union-based SQL injection D. Error-based SQL injection

B. Blind SQL injection

A medium-sized healthcare IT business decides to implement a risk management strategy. Which of the following is NOT one of the five basic responses to risk? A. Accept B. Delegate C. Mitigate D. Avoid

B. Delegate

Matthew, a black hat, has managed to open a meterpreter session to one of the kiosk machines in Evil Corp's lobby. He checks his current SID, which is S-1-5-21-1223352397-1872883824-861252104-501. What needs to happen before Matthew has full administrator access? A. He needs to gain physical access. B. He must perform privilege escalation. C. He already has admin privileges, as shown by the "501" at the end of the SID. D. He needs to disable antivirus protection.

B. He must perform privilege escalation.

You are performing a penetration test for a client and have gained shell access to a Windows machine on the internal network. You intend to retrieve all DNS records for the internal domain. If the DNS server is at 192.168.10.2 and the domain name is abccorp.local, what command would you type at the nslookup prompt to attempt a zone transfer? A. list domain=abccorp.local type=zone B. Is -d accorp.local C. list server=192.168.10.2 type=all D. Iserver 192.168.10.2 -t all

B. Is -d accorp.local

Gavin owns a white-hat firm and is performing a website security audit for one of his clients. He begins by running a scan which looks for common misconfigurations and outdated software versions. Which of the following tools is he most likely using? A. Armitage B. Nikto C. Metasploit D. Nmap

B. Nikto

Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety? A. Read the first 512 bytes of the tape B. Perform a full restore C. Read the last 512 bytes of the tape D. Restore a random file

B. Perform a full restore

The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE's Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the Transport Layer Security (TLS) protocols defined in RFC6520. What type of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy? A. Public B. Private C. Shared D. Root

B. Private

Eve stole a file named secret.txt, transferred it to her computer and she just entered these commands: What is she trying to achieve? http://prntscr.com/ppjssh A. She is using ftp to transfer the file to another hacker named John. B. She is using John the Ripper to crack the passwords in the secret.txt file C. She is encrypting the file. D. She is using John the Ripper to view the contents of the file.

B. She is using John the Ripper to crack the passwords in the secret.txt file

Ricardo wants to send secret messages to a competitor company. To secure these messages, he uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Ricardo using? A. Encryption B. Steganography C. RSA algorithm D. Public-key cryptography

B. Steganography

You have successfully logged on a Linux system. You want to now cover your track. Your login attempt may be logged on several files located in /var/log. Which file does NOT belong to the list: A. wtmp B. user.log C. btmp D. auth.log

B. user.log

In IPv6 what is the major difference concerning application layer vulnerabilities compared to IPv4? A. Implementing IPv4 security in a dual-stack network offers protection from IPv6 attacks too. B. Vulnerabilities in the application layer are independent of the network layer. Attacks and mitigation techniques are almost identical. C. Due to the extensive security measures built in IPv6, application layer vulnerabilities need not be addresses. D. Vulnerabilities in the application layer are greatly different from IPv4.

B. Vulnerabilities in the application layer are independent of the network layer. Attacks and mitigation techniques are almost identical.

An attacker is trying to redirect the traffic of a small office. That office is using their own mail server, DNS server and NTP server because of the importance of their job. The attacker gain access to the DNS server and redirect the direction www.google.com to his own IP address. Now when the employees of the office wants to go to Google they are being redirected to the attacker machine. What is the name of this kind of attack? A. MAC Flooding B. Smurf Attack C. DNS spoofing D. ARP Polsoning

C. DNS spoofing

It is a regulation that has a set of guidelines, which should be adhered to by anyone who handles any electronic medical data. These guidelines stipulate that all medical practices must ensure that all necessary measures are in place while saving, accessing, and sharing any electronic medical data to keep patient data secure. Which of the following regulations best matches the description? A. FISMA B. ISO/IEC 27002 C. HIPAA D. COBIT

C. HIPAA

You are performing information gathering for an important penetration test. You have found pdf, doc, and images in your objective. You decide to extract metadata from these files and analyze it. What tool will help you with the task? A. Armitage B. Dmitry C. Metagoofil D. cdpsnarf

C. Metagoofil

Which of the following describes the characteristics of a Boot Sector Virus? A. Modifies directory table entries so that directory entries point to the virus code instead of the actual program. B. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR. C. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR. D. Overwrites the original MBR and only executes the new virus code.

C. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR

Which command can be used to show the current TCP/IP connections? A. Netsh B. Net use connection C. Netstat D. Net use

C. Netstat

As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing. What document describes the specifics of the testing, the associated violations, and essentially protects both the organization's interest and your liabilities as a tester? A. Service Level Agreement B. Project Scope C. Rules of Engagement D. Non-Disclosure Agreement

C. Rules of Engagement

The "Gray-box testing" methodology enforces what kind of restriction? A. Only the internal operation of a system is known to the tester. B. The internal operation of a system is completely known to the tester. C. The internal operation of a system is only partly accessible to the tester. D. Only the external operation of a system is accessible to the tester.

C. The internal operation of a system is only partly accessible to the tester.

It is an entity or event with the potential to adversely impact a system through unauthorized acces, destruction, disclosure, denial of service or modification of data. Which of the following terms best matches the definition? A. Attack B. Vulnerability C. Threat D. Risk

C. Threat

Which of the following is one of the most effective ways to prevent Cross-site Scripting (XSS) flaws in software applications? A. Use security policies and procedures to define and implement proper security settings. B. Use digital certificates to authenticate a server prior to sending data. C. Validate and escape all information sent to a server. D. Verify access right before allowing access to protected information and UI controls

C. Validate and escape all information sent to a server

While using your bank's online servicing you notice the following string in the URL bar: "http: // www. MyPersonalBank. com/ account?id=368940911028389&Damount=10980&Camount=21" You observe that if you modify the Damount&Camount values and submit the request, that data on the web page reflects the changes. Which type of vulnerability is present on this site? A. Cookie Tampering B. SQL Injection C. Web Parameter Tampering D. XSS Reflection

C. Web Parameter Tampering

env x='(){ :;};echo exploit' bash -c 'cat/etc/passwd' What is the Shellshock bash vulnerability attempting to do a vulnerable Linux host? A. Removes the passwd file B. Changes all passwords in passwd C. Add new user to the passwd file D. Display passwd content to promp

D. Display passwd content to prompt

John is an incident handler at a financial institution. His steps in a recent incident are not up to the standards of the company. John frequently forgets some steps and procedures while handling responses as they are very stressful to perform. Which of the following actions should John take to overcome this problem with the least administrative effort? A. Increase his technical skills B. Read the incident manual every time it occurs C. Select someone else to check the procedures D. Create an incident checklist

D. Create an incident checklist

When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's Computer to update the router configuration. What type of an alert is this? A. False negative B. True negative C. True positive D. False positive

D. False positive

You have several plain-text firewall logs that you must review to evaluate network traffic. You know that in order to do fast, efficient searches of the logs you must use regular expressions. Which command-line utility are you most likely to use? A. Relational Database B. MS Excel C. Notepad D. Grep

D. Grep

Which of the following is the least-likely physical characteristic to be used in biometric control that supports a large company? A. Voice B. Fingerprints C. Iris patterns D. Height and Weight

D. Height and Weight

An LDAP directory can be used to store information similar to a SQL database. LDAP uses a ____ database structure instead of SQL's ______ structure. Because of this, LDAP has difficulty representing many-to-one relationships. A. Strict, Abstract B. Simple, Complex C. Relational, Hierarchical D. Hierarchical, Relational

D. Hierarchical, Relational

What is the purpose of DNS AAAA record? A. Address prefix record B. Address database record C. Authorization, Authentication and Auditing record D. IPv6 address resolution record

D. IPv6 address resolution record

A well-intentioned researcher discovers a vulnerability on the web site of a major corporation. What should he do? A. Try to sell the information to a well-paying party on the dark web. B. Exploit the vulnerability without harming the web site owner so that attention be drawn to the problem. C. Ignore it. D. Notify the web site owner so that corrective action be taken as soon as possible to patch the vulnerability.

D. Notify the web site owner so that corrective action be taken as soon as possible to patch the vulnerability.

You are performing a penetration test. You achieved access via a buffer overflow exploit and you proceed to find interesting data, such as files with usernames and passwords. You find a hidden folder that has the administrator's bank account password and login information for the administrator's bitcoin account. What should you do? A. Do not report it and continue the penetration test. B. Transfer money from the administrator's account to another account. C. Do not transfer the money but steal the bitcoins. D. Report immediately to the administrator.

D. Report immediately to the administrator.

Which results will be returned with the following Google search query? site:target.com site:Marketing.target.com accounting A. Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting. B. Results matching all words in the query. C. Results for matches on target.com and Marketing,target.com that include the word "accounting" D. Results matching "accounting" in domain target.com but not on the site Marketing.target.com

D. Results matching "accounting" in domain target.com but not on the site Marketing.target.com

Jesse receives an email with an attachment labeled "Court_Notice_21206.zip". Inside the zip file named "Court_Notice_21206.docx.exe" disguised as a word document. Upon execution, a window appears stating, "This word document is corrupt". In the background, the file copies itself to Jesse APPDATA\local directory and begins to beacon to a C2 server to download additional malicious binaries. What type of malware has Jesse encountered? A. Worm B. Macro Virus C. Key-Logger D. Trojan

D. Trojan

To maintain compliance with regulatory requirements, a security audit of the systems on a network must be performed to determine their compliance with security policies. Which one of the following tools would most likely be used in such an audit? A. Protocol analyzer B. Intrusion Detection System C. Port scanner D. Vulnerability scanner

D. Vulnerability scanner

Which system consists of a publicly available set of databases that contain domain name registration contact information? A. IANA B. CAPTCHA C. IETF D. WHOIS

D. WHOIS

OpenSSL on Linux servers includes a command line tool for testing TLS. What is the name of the tool and the correct syntax to connect to a web server? A. openssl s_client -site www.website.com:443 B. openssl_client -site www.website.com:443 C. openssl_client -connect www.website.com:443 D. openssl s_client -connect www.website.com:443

D. openssl s_client -connect www.website.com:443


Kaugnay na mga set ng pag-aaral

MKT Chap. 8, 9, & 10 Concept Checks

View Set

NUR 398 Noninfectious Lower Respiratory Problems: Asthma & COPD

View Set

Vocabulary Workshop Level E Unit 6 - Complete Sentences

View Set

Personal and Community Health - CH 2

View Set

Hormones and Paracrines that Act in Digestion

View Set

Chapter 10: Cultura ¿Cierto o falso? (p.340)

View Set

ASSESSMENT: 1.0.1 AWS CLOUD CONCEPTS

View Set