Certified Ethical Hacker v13

Ace your homework & exams now with Quizwiz!

What are the phases of the ethical hacking framework?

1. Reconnaissance 2. Vulnerability scanning 3. Gaining access 4. Maintaining access 5. Clearing tracks

Which NMAP command combination would let a tester scan every TCP port from a class C network that is blocking ICMP with fingerprinting and service detection? NMAP -Pn -A -O -sS -p1-65535 192.168.2.0/24NMAP -P0 -A -sT -p0-65535 192.168.0/16NMAP -Pn -O -sS -p 1-1024 192.168.0/8NMAP -P0 -A -O -p1-65535 192.168.0/24

A.

Which of the following protocols uses TCP port 179 to enable routers for establishing sessions between them? BGPLDAPSIPSNMP

A. BGP

Which of the following tools allows an attacker to extract information such as sender identity, mail server, sender's IP address, location, and so on?

A. Email tracking tools B. Web updates monitoring tools C. Metadata extraction tools D. Website mirroring tools

Maya, a security analyst, was tasked with assessing the security of smart devices within an organization's network. While performing security scanning, Maya identified an insecure placement of some smart devices and made necessary amendments to the network. Which of the following types of scanning did Maya perform in the above scenario? Host-based scanningDatabase scanningIoT device vulnerability scanningDistributed scanning

C

Which of the following Nmap options is used by an attacker to perform an SCTP COOKIE ECHO scan? A. -sL B. -sU- C. sZ D. -sY

C

When a client's computer is infected with malicious software which connects to the remote computer to receive commands, the remote computer is called ___________ A.Botnet B.Server C.Bot D.C&C

C&C

Which of the following protocols uses TCP port 179 to enable routers for establishing sessions between them? A.LDAP B.SIP C.BGP D.SNMP

C. BGP

Which of the following ping methods is effective in identifying active hosts similar to the ICMP timestamp ping, specifically when the administrator blocks the conventional ICMP ECHO ping? ICMP address mask ping scanUDP ping scanICMP ECHO ping sweepICMP ECHO ping scan

A. ICMP address mask ping scan ICMP Address Mask Ping Scan: This type of ping method is also effective in identifying the active hosts similarly to the ICMP timestamp ping, specifically when the administrator blocks the traditional ICMP Echo ping

Identify the metric group within CVSS that reflects the potential or direct consequence of a successful exploit on the confidentiality, integrity, and availability of the information. A.Impact metrics B.Environmental metrics C.Supplemental metrics D.Threat metrics

A. Impact metrics

Which of the following protocols uses TCP or UDP as its transport protocol over port 389? A.LDAP B.SIP C.SMTP D.SNMP

A. LDAP

Jude, a professional hacker, targeted an organization's web server. Jude wanted to extract the information removed from older copies or archived links of the target website. For this purpose, he employed an exploration tool that assisted him in retrieving the archived URLs of the target website. Identify the tool employed by Jude in the above scenario. A. Photon B. Gephi C. Burp Suite D. Netcraft

A. Photon

In which of the following scanning techniques does an attacker send a spoofed source address to a computer to determine the available services? A. Inverse TCP flag scan B. IDLE/IPID header scan C. TCP Maimon scan D. ACK flag probe scan

B. IDLE/IPID header scan

Which of the following intrusion detection technique involves first creating models of possible intrusions and then comparing these models with incoming events to make a detection decision? Protocol anomaly detection Anomaly detection Obfuscating Signature recognition

Signature recognition

Cryptographic method used to verify Integrity by creating a unique fixed-size string from a message

Hashing

Elements of Information Security

1. Confidentiality 2. Integrity 3. Availability 4. Authenticity 5. Non-repudiation

Categories of Information Warfare

1. Hacker warfare 2. Psychological warfare 3. Electronic warfare 4. C2 warfare 5. Intelligence-based warfare 6. Cyber warfare 7. Economic warfare

NTP (Network Time Protocol)

123/tcp

Which of the following TCP communication flags confirms the receipt of a transmission and identifies the next expected sequence number? 1. FIN flag 2. ACK flag 3. SYN flag 4. RST flag

2. ACK

TFTP (Trivial File Transfer Protocol)

69/tcp

finger

79/tcp

Kerberos

88/tcp

Sean who works as a network administrator has just deployed an IDS in his organization's network. Sean deployed an IDS that generates four types of alerts that include: true positive, false positive, false negative, and true negative. In which of the following conditions does the IDS generate a true positive alert? A true positive is a condition occurring when an event triggers an alarm when no actual attack is in progress. A true positive is a condition occurring when an IDS fails to react to an actual attack event. A true positive is a condition occurring when an IDS identifies an activity as acceptable behavior and the activity is acceptable. A true positive is a condition occurring when an event triggers an alarm and causes the IDS to react as if a real attack is in progress.

A true positive is a condition occurring when an event triggers an alarm and causes the IDS to react as if a real attack is in progress.

Alex, a professional hacker, plans to gather detailed information about a target network's infrastructure and performance metrics. For this purpose, he needs a tool that can trace network routes, monitor packet loss, and visualize latency over time.Which of the following tools would help Alex achieve his goal? A. PingPlotter B. Sherlock C. Shodan D. IP2LOCATION's Email Header Tracer

A. PingPlotter PingPlotter allows attackers to collect traceroute data for target hosts using ICMP, UDP, and TCP packets. It automatically discovers the network hops and tracks latency and packet loss over time. Using this tool, attackers can visualize the traceroute data in readable graphs. This tool aids attackers in identifying bandwidth bottlenecks, WiFi interference, or hardware faults on the target network.

Which of the following protocols typically uses port 22 to ensure secure data exchange over a single Internet connection? SFTPBGPSMBSMTP

A. SFTP TCP 22: Secure Shell (SSH) / Secure File Transfer Protocol (SFTP) SFTP, by default, uses port 22, facilitating the secure exchange of data over a single Internet connection. This designated port for SFTP enhances its security and simplicity compared to protocols like FTP/S that require multiple ports for operation.

Which of the following is a query and response protocol used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block, or an autonomous system?

A. Traceroute B. Whois lookup C. DNS lookup D. TCP/IP

Which of the following ports provides a name-resolution service for computers running NetBIOS that is also known as the Windows Internet Name Service (WINS)? A.UDP 137 B.TCP 22 C.UDP 161 D.TCP 135

A. UDP 137 NBNS, also known as the Windows Internet Name Service (WINS), provides a name-resolution service for computers running NetBIOS.

Which Google search query will search for any files a target certifiedhacker.com may have?

A. allinurl: certifiedhacker.com ext:xml | ext:conf | ext:cnf | ext:reg | ext:inf | ext:rdp | ext:cfg | ext:txt | ext:ora | ext:ini B. site: certifiedhacker.com filetype:xml | filetype:conf | filetype:cnf | filetype:reg | filetype:inf | filetype:rdp | filetype:cfg | filetype:txt | filetype:ora | filetype:ini C. site: certifiedhacker.com ext:xml || ext:conf || ext:cnf || ext:reg || ext:inf || ext:rdp || ext:cfg || ext:txt || ext:ora || ext:ini D.site: certifiedhacker.com intext:xml | intext:conf | intext:cnf | intext:reg | intext:inf | intext:rdp | intext:cfg | intext:txt | intext:ora | intext:ini

What is the formula for information security attacks?

Attacks = Motive (Goal) x Method (TTP) x Vulnerability

IPsec protocol that provides Data Integrity and Origin Authentication, but DOES NOT provide Confidentiality (Encryption)

Authentication Header

Identify the AI-powered vulnerability assessment tool that uses machine-learning algorithms for vulnerability detection and API protection. A) NetScanTools Pro B) Equixly C) SnmpWalk D) thc-hydra

B

Which of the following tools are useful in extracting information about the geographical location of routers, servers, and IP devices in a network? A. Web spidering tools B. Traceroute tools C. Website mirroring tools D. Email tracking tools

B

Identify the tool that uses AI and ML to detect a wide range of vulnerabilities, including the top 10 OWASP application security risks. A) DNSQuerySniffer B) Beagle Security C) inSSIDer D) HawkEye

B Beagle Security is a comprehensive web application security testing platform that combines automated scanning and manual penetration testing. It uses AI and ML to detect a wide range of vulnerabilities, including the top 10 OWASP risks, and provides detailed reports to help organizations improve their application security.

Mark, an attacker, aimed to identify active hosts on a target network without drawing significant attention. To streamline his reconnaissance efforts, he used ShellGPT to generate the appropriate Nmap command. By providing a prompt via ShellGPT, Mark was able to perform an ICMP ECHO ping sweep on the target network. Which of the following commands did ShellGPT generate for Mark in the above scenario? nmap -sM -v 10.10.1.10 nmap -sn -PE 10.10.1.0/24 ping -c 1 10.10.1.9 | grep "ttl" nmap -sX 10.10.1.11

B.

In which of the following enumeration techniques does an attacker take advantage of different error messages generated during the service authentication process? Extracting usernames using email IDsBrute-force Active DirectoryExtracting usernames using SNMPExtracting information using default passwords

B. Brute-force Active Directory

Which of the following types of software vulnerability occurs due to coding errors and allows attackers to gain access to the target system? Unpatched serversBuffer overflowMisconfigurationOpen services

B. Buffer Overflow

Which of the following tools is specifically used for scanning and enumerating subdomains and identifying non-contiguous IP spaces associated with a target domain? A. BuzzSumo B. Fierce C. IP2Location D. Sherlock

B. Fierce

Peter, a professional hacker, targeted an organization's network to gather as much information as possible to perform future attacks. For this purpose, he employed a reconnaissance framework that helped him gather confidential information such as private Secure Shell (SSH) and Secure Sockets Layer (SSL) keys as well as dynamic libraries from an online third-party repository. Identify the online third-party repository targeted by Peter in the above scenario. A. Sublist3r B. GitLab C. BeRoot D. MITRE ATT&CK framework

B. Gitlab (only answer that is a repository) GitHub : Source code-based repositories are online services or tools available on internal servers or can be hosted on third-party websites such as GitHub, GitLab, SourceForge, and BitBucket. These sites contain sensitive data related to configuration files, private Secure Shell (SSH) and Secure Sockets Layer (SSL) keys, source-code files, dynamic libraries, and software tools developed by contributors, which can be leveraged by attackers to launch attacks on the target organization.

Which of the following terms is referred to as an undesirable incident that occurs when software or a system program depends on the execution of processes in a sequence and on the timing of the programs? A.Memory leaks B.Race condition C.Integer overflows D.Null pointer/object dereference

B. Race Condition Race condition: A race condition is an undesirable incident that occurs when a software or system program depends on the execution of processes in a sequence and on the timing of the programs. This condition occurs when a system that handles events in a sequential format is coerced to perform multiple operations simultaneously.

Jacob, a professional hacker, targeted an organization's website to find a way into its network. To achieve his goal, he employed a footprinting tool that helped him in gathering confidential files and other relevant information related to the target website from public source-code repositories. Identify the footprinting tool employed by Jacob in the above scenario. A. ShellPhish B. Recon-ng C. Reverse Lookup D. Netcraft

B. Recon-ng

A security engineer is attempting to perform scanning on a company's internal network to verify security policies of their networks. The engineer uses the following NMAP command: nmap -n -sS -P0 -p 80 ***.***.**.**. What type of scan is this? Intense scanStealth scanComprehensive scanQuick scan

B. Stealth Scans

Which protocol and port number might be needed to send log messages to a log analysis tool that resides behind a firewall? UDP 415UDP 514UDP 541UDP 123

B. UDP 514

Tom, an ethical hacker, was tasked with evaluating the security posture of his organization's network. As part of his job, Tom used an AI tool to automate network scanning tasks. He executed an hping3 scan on port 80 of a target IP address and determined the status. Identify the command that assisted Tom in the above scenario. A. hping3 -S 72.14.207.99 -p 80 --tcp-timestamp B. hping3 --ack -p 80 10.10.1.11 C. hping3 -F -P -U 10.0.0.25 -p 80 D. hping3 --icmp --count 10 10.10.1.11

B. hping3 --ack -p 80 10.10.1.11`hping3 This is the command to invoke the Hping3 tool, which is a network scanning and testing utility.`--ack`: This parameter specifies the TCP ACK scan mode. In this mode, Hping3 sends TCP packets with the ACK flag set.`-p 80`: This parameter specifies the destination port to which the TCP packets will be sent. In this case, it is set to port 80, which is commonly used for HTTP (web) traffic.`10.10.1.11`: This is the target IP address to which the TCP packets will be sent.

Which of the following protocols provides reliable multiprocess communication service in a multinetwork environment? SMTPTCPSNMPUDP

B. tcp

Which of the following information is collected using enumeration? A.Email Recipient's system IP address and geolocation B.Network resources, network shares, and machine names C.Open ports and services D.Operating systems, location of web servers, users, and passwords

B.Network resources, network shares, and machine names

Which of the following elements in the firewall architecture is a computer system designed and configured to protect network resources from attacks and acts as a mediator between inside and outside networks? Multi-homed firewall Demilitarized zone Bastion host Screened subnet

Bastion Host

Steve, an attacker, wants to track the most shared content that belongs to the target organization. For this purpose, he used an advanced social search engine that displayed shared activity across all major social networks including Twitter, Facebook, LinkedIn, Google Plus, and Pinterest. What is the tool employed by Steve in the above scenario?

BuzzSumo

In which of the following enumeration techniques does an attacker take advantage of different error messages generated during the service authentication process? A.Extracting usernames using email IDs B.Extracting information using default passwords C.Brute-force Active Directory D.Extracting usernames using SNMP

C. Brute-force Active Directory This is a design error in the Microsoft Active Directory implementation. If a user enables the "logon hours" feature, then all the attempts at service authentication result in different error messages.

If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP? A. Broadcast ping B. Traceroute C. Hping D. TCP ping

C. Hping

Which of the following tools is a command-line search tool for Exploit-DB that allows taking a copy of the Exploit database for remote use? A. Spyse B. DroidSniff C. SearchSploit D. Spokeo

C. SearchSploit

Which of the following tools allows attackers to search for people belonging to the target organization? A. Netcraft B. GFI LanGuard C. Spokeo D. OpenVAS

C. Spokeo

Jake, an attacker, is performing an attack on a target organization to gather sensitive information. In this process, he exploited the protocol running on port 23 to perform banner grabbing on other protocols, such as SSH and SMTP, as well as brute-forcing attacks on login credentials. Which of the following protocols is running on port 23? A. File Transfer Protocol B. Border Gateway Protocol C. Telnet D. Secure Shell

C. Telnet

Which of the following vulnerabilities occurs in software due to a lack of proper certificate validation, or having an expired certificate that could allow attackers to embed malicious code and trick users into installing it? A.Improper input handling B.Race conditions C.Code signing weakness D.Time of check/time of use

C. code signing

Which of the following location and data examination tools allows ethical hackers to perform two or more scans on different machines in the network? A) Agent-based scanner B) Network-based scanner C) Cluster scanner D) Proxy scanner

Cluster scanner

An attacker is using the scanning tool Hping to scan and identify live hosts, open ports, and services running on a target network. He/she wants to collect all the TCP sequence numbers generated by the target host.Which of the following Hping commands he/she needs to use to gather the required information? A. hping3 -S <Target IP> -p 80 --tcp-timestamp B. hping3 -A <Target IP> -p 80 C. hping3 -F -P -U 10.0.0.25 -p 80 D. hping3 <Target IP> -Q -p 139 -s

D

Which of the following hping commands is used by an attacker to collect the initial sequence number? A. hping3 -A 10.0.0.25 -p 80 B. hping3 -2 10.0.0.25 -p 80 C. hping3 -S 72.14.207.99 -p 80 --tcp-timestamp D. hping3 192.168.1.103 -Q -p 139 -s

D

Jim, an ethical hacker, was hired to perform a vulnerability assessment on an organization to check the security posture of the organization and its vulnerabilities. Jim used a tool that helped him continuously identify threats and monitor unexpected changes in the network before they turn into breaches.Which of the following tools did Jim employ in the above scenario? A) Octoparse B) theHarvester C) Sherlock D) Qualys VM

D Qualys VM is a cloud-based service that gives immediate, global visibility into where IT systems might be vulnerable to the latest Internet threats and how to protect them. It helps to continuously identify threats and monitor unexpected changes in a network before they turn into breaches

Given below is the command generated by ShellGPT to gather email accounts associated with the target organization:theHarvester -d microsoft.com -l 200 -b Baidu -f Microsoft_emails.xmlWhich of the following parameters from the above command is used to specify the data source for gathering email accounts? A. -l 200 B. -d microsoft.com C. theHarvester D. -b baidu

D. -b baidu

Which of the following protocols is widely used by Internet service providers (ISPs) to maintain huge routing tables and efficiently process Internet traffic? TFTP FTP SIP BGP

D. BGP Border Gateway Protocol (BGP): BGP is widely used by Internet service providers (ISPs) to maintain huge routing tables and for efficiently processing Internet traffic. BGP routers establish sessions on TCP port 179. The misconfiguration of BGP may lead to various attacks such as dictionary attacks, resource-exhaustion attacks, flooding attacks, and hijacking attacks.

Which of the following protocols uses the port number 88/TCP and can verify the identity of a user or host connected to a network? A.TFTP B.Finger C.NTP D.Kerberos

D. Kerberos

Which of the following features in FOCA allows an attacker to find more servers in the same segment of a determined address? A. IP resolution B. Web search C. DNS search D. PTR scanning

D. PTR scanning Finds more servers in the same segment of a determined address; IP FOCA executes a PTR log scan.

Which of the following types of scanning involves the process of checking the services running on a target computer by sending a sequence of messages to break in? A. Banner grabbing B. Vulnerability scanning C. Network scanning D. Port scanning

D. Port Scanning

Henry, an employee of an organization, faced issues with a newly allocated system, which was purchased from a refurbished market. When he raised a complaint, the security team analyzed the system components and identified that the vendor did not properly sanitize the system's drive.Identify the third-party risk demonstrated in the above scenario. A.Design flaws B.Unpatched firmware C.Data storage D.Supply-chain risk

D. Supply-chain risk

Which of the following scans detects when a port is open after completing the three-way handshake, establishes a full connection, and closes the connection by sending an RST packet? A. ACK flag probe scan B. IDLE/IPID header scan C. Stealth scan D. TCP connect scan

D. TCP connect scan TCP Connect scan detects when a port is open after completing the three-way handshake. TCP Connect scan establishes a full connection and then closes the connection by sending an RST packet

Which of the following port number is used to exploit vulnerabilities within DNS servers to launch attacks? A.TCP/UDP 135 B.UDP 137 C.TCP 139 D.TCP/UDP 53

D. port 53

Jack, a professional hacker, searched for Fortinet VPN login pages using an AI-based automated tool. After accessing the search results, Jack wants to filter out the lines containing a specific string from the output. Which command would help Jack to achieve this objective? A. | cut -d "=" -f2> B. recon1.txt| grep -o C. "http[^&]*" D. | grep "http"

D. | grep "http"

Which of the following protocols provides reliable multiprocess communication service in a multinetwork environment? A.SMTP B.UDP C.SNMP D.TCP

D.TCP

Robert, a professional hacker, has launched a reflection attack on the target organization's Microsoft Azure environment to downgrade its network capacity. For this purpose, he initiated sending a large number of spoofed UDP packets with fake IP addresses that resembled the source IP addresses to an intermediary server. The intermediary server started responding to all the source IP addresses at once causing legitimate users to wait for some time to receive the resources. Which of the following types of attacks did Robert launch in the above scenario? MarioNet attack IRDP spoofing DNS server hijacking DDoS attack

DDoS attack

Electronic document that binds a Public Key to an Identity, used to establish Authenticity (e.g., in SSL/TLS)

Digital Certificate

Technology that provides Non-Repudiation by proving a message originated from a specific sender's private key

Digital Signatures

Primary technical control used to ensure Confidentiality for data at rest and in transit

Encryption

Which of the following TCP communication flags is set to "1" to announce that no more transmissions will be sent to the remote system and the connection established by the SYN flag is terminated? ACK flagSYN flagFIN flagRST flag

FIN flag

Which of the following attributes in a packet can be used to check whether the packet originated from an unreliable zone? Source IP address Direction Interface TCP flag bits

Interface: Used to check whether the packet is coming from an unreliable zone.

Classification of Attacks

Passive Attacks, Active Attacks, Close-in Attacks, Insider Attacks, Distribution Attacks

Attribution

The process of identifying and tracing the origins of cyberattacks to specific threat actors

Based of a NMAP result, what does port 515/tcp being open say about what's installed on the target machine by the OS?

The protocols TCP and UDP uses port 515 to interact with the printer. As port 515 is open in the above Nmap output, probably the host is a printer.

Information Warfare

use of information and communication technologies (ICT) to gain competitive advantages over an opponent


Related study sets

Lesson 34: What Is the Importance of Civic Engagement to American Constitutional Democracy?

View Set

Sources of Government Revenue-practice

View Set

Post Test: Exponential and Logarithmic Functions

View Set