Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CERTIFIED ETHICAL HACKER v11 MASTER SET

Rating
-
Sold
-
Pages
169
Grade
A+
Uploaded on
17-03-2022
Written in
2021/2022

Which of the following information security elements guarantees that the sender of a message cannot later deny having sent the message and the recipient cannot deny having received the message? A Confidentiality B Non-repudiation C Availability D IntegrityCorrect answer - B A phase of the cyber kill chain methodology triggers the adversary's malicious code, which utilizes a vulnerability in the operating system, application, or server on a target system. At this stage, the organization may face threats such as authentication and authorization attacks, arbitrary code execution, physical security threats, and security misconfiguration. Which is this phase of the cyber kill chain methodology? A Reconnaissance B Weaponization C Exploitation D InstallationCorrect answer - C Which of the following is a category of hackers who are also known as crackers, use their extraordinary computing skills for illegal or malicious purposes, and are often involved in criminal activities? A Black hats B White hats C Suicide hackers D Script kiddiesCorrect answer - A John, a professional hacker, has launched an attack on a target organization to extract sensitive information. He was successful in launching the attack and gathering the required information. He is now attempting to hide the malicious acts by overwriting the server, system, and application logs to avoid suspicion. Which of the following phases of hacking is John currently in? A Maintaining access B Scanning C Clearing tracks D Gaining accessCorrect answer - C Which of the following risk management phases involves selecting and implementing appropriate controls for the identified risks to modify them? A Risk tracking and review B Risk identification C Risk treatment D Risk assessmentCorrect answer - C In which of the following incident handling and response phases are the identified security incidents analyzed, validated, categorized, and prioritized? A Incident recording and assignment B Incident triage C Containment D EradicationCorrect answer - B Which of the following phases of risk management is an ongoing iterative process that assigns priorities for risk mitigation and implementation plans to help determine the quantitative and qualitative value of risk? A Risk identification B Risk treatment C Risk tracking and review D Risk assessmentCorrect answer - D Jack, a security professional, was instructed to introduce a security standard to handle cardholder information for major debit, credit, prepaid, e-purse, ATM, and POS cards. In the process, Jack has employed a standard that offers robust and comprehensive standards as well as supporting materials to enhance payment-card data security. What is the security standard that Jack has employed? A HIPAA B SOX C DMCA D PCI DSSCorrect answer - D Morris, an attacker, has targeted an organization's network. To know the structure of the target network, he combined footprinting techniques with a network utility that helped him create diagrammatic representations of the target network. What is the network utility employed by Morris in the above scenario? A Netcraft B Tracert C Shodan D BuzzSumoCorrect answer - B Which of the following Google advanced search operators displays similar websites to the specified URL? A [site:] B [info:] C [inurl:] D [related:]Correct answer - D Which of the following techniques is used by an attacker to perform automated searches on the target website and collect specified information, such as employee names and email addresses? A Web spidering B Website mirroring C Monitoring of web updates D Website link extractionCorrect answer - A Jude, an attacker, has targeted an organization's communication network. While conducting initial footprinting, he used a Google dork to find the VoIP login portals of the organization. What is the Google dork that helped Jude find the VoIP login portals? A inurl:8080 intitle:"login" intext:"UserLogin" "English" B inurl:/voice/advanced/ intitle:Linksys SPA configuration C inurl:/remote/login?lang=en D !Host=*.* intext:enc_UserPassword=* ext:pcfCorrect answer - A Stokes, an attacker, decided to find vulnerable IoT devices installed in the target organization. In this process, he used an online tool that helped him gather information such as a device's manufacturer details, its IP address, and the location where it is installed. What is the online tool that Stokes used in the above scenario? A DuckDuckGo B Baidu C Shodan D BingCorrect answer - C CenSys Solutions hired Clark, a security professional, to enhance the Internet security of the organization. To achieve the goal, Clark employed a tool that provides various Internet security services, including anti-fraud and anti-phishing services, application testing, and PCI scanning. What is the tool used by Clark to perform the above activities? A Blisqy B OmniPeek C Netcraft D BTCrawlerCorrect answer - C Clark is a professional hacker. He targeted an organization for financial benefit and used various footprinting techniques to gather information about the target network. In this process, he employed a protocol used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block, or an autonomous system. What is the protocol employed by Clark in the above scenario? A SMB B Whois C SNMP D FTPCorrect answer - B Which of the following tools in OSRFramework is used by attackers to check for a user profile on up to 290 different platforms? A B C D Correct answer - A What is the feature in FOCA that checks each domain to ascertain the host names configured in NS, MX, and SPF servers to discover the new host and domain names? A Common names B DNS search C Web search D Bing IPCorrect answer - B Which of the following countermeasures should be followed to safeguard the privacy, data, and reputation of an organization and to prevent information disclosure? A Keeping the domain name profile public B Enabling directory listings in the web servers C Avoiding domain-level cross-linking for critical assets D Turning on geolocation access on all mobile devicesCorrect answer - C Which of the following TCP communication flags notifies the transmission of a new sequence number and represents the establishment of a connection between two hosts? A FIN flag B SYN flag C PSH flag D RST flagCorrect answer - B Which of the following hping commands is used by an attacker to scan the entire subnet to detect live hosts in a target network? A hping3 -8 50-60 -S 10.0.0.25 -V B hping3 -F -P -U 10.0.0.25 -p 80 C hping3 -1 10.0.1.x --rand-dest -I eth0 D hping3 -9 HTTP -I eth0Correct answer - C Which of the following commands is used by an attacker to perform an ICMP ECHO ping sweep that can determine the live hosts from a range of IP addresses by sending ICMP ECHO requests to multiple hosts? A nmap -sn -PR 10.10.10.10 B nmap -sn -PU 10.10.10.10 C nmap -sn -PE 10.10.10.10 D nmap -sn -PE 10.10.10.5-15Correct answer - D Which of the following scanning techniques is used by an attacker to send a TCP frame to a remote device with the FIN, URG, and PUSH flags set? A Xmas scan B TCP Maimon scan C ACK flag probe scan D IDLE/IPID header scanCorrect answer - A A certain scanning technique has no three-way handshake, and the system does not respond when the port is open; when the port is closed, the system responds with an ICMP port unreachable message. Which of the following is this scanning technique? A List scanning B SCTP COOKIE ECHO scanning C IPv6 scanning D UDP scanningCorrect answer - D A certain type of port scanning technique is similar to the TCP SYN scan and can be performed quickly by scanning thousands of ports per second on a fast network that is not obstructed by a firewall, offering a strong sense of security. Which of the following is this type of port scanning technique? A IDLE/IPID header scanning B SCTP COOKIE ECHO scanning C SSDP scanning D SCTP INIT scanningCorrect answer - D An attacker performed OS banner grabbing on a target host. They analyzed the packets received from the target system and identified that the values of time to live (TTL) and TCP window size as 255 and 4128, respectively. What is the operating system of the target host on which the attacker performed banner grabbing? A Linux (Kernel 2.4 and 2.6) B Google Linux C Windows 98, Vista, and 7 (Server 2008) D iOS 12.4 (Cisco Routers)Correct answer - D Which of the following OS discovery techniques is used by an attacker to identify a target machine's OS by observing the TTL values in the acquired scan result? A OS discovery using Nmap B OS discovery using Unicornscan C OS discovery using Nmap Script Engine D OS discovery using IPv6 fingerprintingCorrect answer - B Which of the following IDS/firewall evasion techniques is used by an attacker to bypass Internet censors and evade certain IDS and firewall rules? A IP address decoy B Sending bad checksums C Source port manipulation D AnonymizersCorrect answer - D Through which of the following techniques can an attacker obtain a computer's IP address, alter the packet headers, and send request packets to a target machine while pretending to be a legitimate host? A IP address decoy B Source port manipulation C Packet fragmentation D IP address spoofingCorrect answer - D Larry, a professional hacker, was hired to launch a few attacks on an organization. In the process, he identified that FTP server ports are open and performed enumeration on FTP to find the software version and state of existing vulnerabilities for performing further exploitations. What is the FTP port number that Larry has targeted? A TCP 25 B TCP 20/21 C TCP/UDP 5060, 5061 D TCP 179Correct answer - B Which of the following Net View commands is used by an attacker to view all the available shares in a domain? A net view computername /ALL B net view /domain:domain name C net view /domain D net view computernameCorrect answer - C Which of the following commands is used by the SNMP manager continuously to retrieve all the data stored in an array or table? A GetResponse B GetNextRequest C GetRequest D SetRequestCorrect answer - B George hired an attacker named Joan to perform a few attacks on a competitor organization and gather sensitive information. In this process, Joan performed enumeration activities on the target organization's systems to access the directory listings within Active Directory. What is the type of enumeration that Joan has performed in the above scenario? A SNMP enumeration B LDAP enumeration C NTP enumeration D NetBIOS enumerationCorrect answer - B Sam, an ethical hacker, is launching an attack on a target company. He performed various enumeration activities to detect any existing vulnerabilities on the target network and systems. In this process, he performed NTP enumeration and executed some commands to acquire the list of hosts connected to the NTP server. Which of the following NTP enumeration commands helps Sam in collecting system information such as the number of time samples from several time sources? A ntptrace B ntpdc C ntpdate D ntpqCorrect answer - C Jim, a professional hacker, was hired to perform an attack on an organization. In the attack process, Jim targeted the SMTP server of the target organization and performed SMTP enumeration using the smtp-user-enum tool. He used some options in the tool to gather the usernames of the target organization's employees. Which of the following options did Jim use in the SMTP command for guessing the username from among EXPN, VRFY, and RCPT TO? A -m n B -u user C -M mode D -p portCorrect answer - C Given below are the different phases of the vulnerability management lifecycle. 1) Monitor 2) Vulnerability scan 3) Identify assets and create a baseline 4) Risk assessment 5) Verification 6) Remediation What is the correct sequence of phases involved in the vulnerability management lifecycle? A 1 → 2 → 3 → 4 → 5 → 6 B 2 → 1 → 5 → 3 → 6 → 4 C 3 → 2 → 4 → 6 → 5 → 1 D 3 → 1 → 4 → 5 → 6 → 2Correct answer - C Jaden, a security professional in an organization, introduced new tools and services into the organization. Before introducing the tools, he had to evaluate whether the tools are effective and appropriate for the organization. He used a publicly available and free-to- use list of standardized identifiers for software vulnerabilities and exposures to evaluate the tools. Which of the following databases did Jaden use to evaluate the tools and services? A LACNIC B CVE C Whois D ARINCorrect answer - B Edward, a security professional in an organization, was instructed by higher officials to calculate the severity of the organization' s systems.In the process, he used CVSS, a published standard that provides an open framework for communicating the characteristics and impacts of IT vulnerabilities. He used three metrics provided by CVSS for measuring vulnerabilities. Which of the following CVSS metrics represents the features that continue to change during the lifetime of the vulnerability? A Base metric B Environmental metric C Temporal metric D Overall scoreCorrect answer - C Which of the following types of vulnerability assessment sniffs the traffic present on the network to identify the active systems, network services, applications, and vulnerabilities? A Active assessment B Passive assessment C Credentialed assessment D Distributed assessmentCorrect answer - B Ben, an ethical hacker, was hired by an organization to check its security levels. In the process, Ben examined the network from a hacker's perspective to identify exploits and vulnerabilities accessible to the outside world by using devices such as firewalls, routers, and servers. Which of the following types of vulnerability assessment did Ben perform on the organization? A Active assessment B Passive assessment C External assessment D Internal assessmentCorrect answer - C Clark, an ethical hacker, is performing vulnerability assessment on an organization's network. Instead of performing footprinting and network scanning, he used tools such as Nessus and Qualys for the assessment. Which of the following types of vulnerability assessment did Clark perform on the organization? A Manual assessment B Credentialed assessment C Distributed assessment D Automated assessmentCorrect answer - D Ray, a security professional in an organization, was instructed to identify all potential security weaknesses in the organization and fix them before an attacker can exploit them. In the process, he consulted a third-party consulting firm to run a security audit of the organization's network. Which of the following types of solutions did Ray implement in the above scenario? A Product-based solution B Service-based solution C Tree-based assessment D Inference-based assessmentCorrect answer - B Karen, a security professional in an organization, performed a vulnerability assessment on the organization's network to check for vulnerabilities. In this process, she used a type of location data examination scanner that resides on a single machine but can scan several machines on the same network. Which of the following types of location and data examination tools did Karen use? A Network-based scanner B Agent-based scanner C Proxy scanner D Cluster scannerCorrect answer - B Rick, an ethical hacker, is performing a vulnerability assessment on an organization and a security audit on the organization's network. In this process, he used a tool for identifying vulnerabilities, configuration issues, and malware that attackers use to penetrate networks. Which of the following tools did Rick use to perform vulnerability assessment? A Metagoofil B Infoga C Immunity Debugger D NessusCorrect answer - D Which of the following types of password attacks does not require any technical knowledge about hacking or system exploitation and includes techniques such as shoulder surfing, social engineering, and dumpster diving? A Active online attacks B Passive online attacks C Non-electronic attacks D Offline attacksCorrect answer - C Given below are the different steps involved in exploiting vulnerabilities. 1) Develop the exploit. 2) Determine the risk associated with the vulnerability. 3) Determine the capability of the vulnerability. 4) Identify the vulnerability. 5) Gain remote access. 6) Select the method for delivering: local or remote. 7) Generate and deliver the payload. What is the correct sequence of steps involved in exploiting vulnerabilities? A 1 → 2 → 3 → 4 → 5 → 6 → 7 B 3 → 6 → 7 → 4 → 2 → 1 → 5 C 2 → 3 → 6 → 4 → 5 → 1 → 7 D 4 → 2 → 3 → 1 → 6 → 7 → 5Correct answer - D Which of the following is a shim that runs in the user mode and is used by attackers to bypass UAC and perform different attacks including the disabling of Windows Defender and backdoor installation? A RedirectEXE B Schtasks C launchd D WinRMCorrect answer - A Joan, a professional hacker, was hired to retrieve sensitive information from a target organization. In this process, she used a post-exploitation tool to check common misconfigurations and find a way to escalate privileges. Which of the following tools helps Joan in escalating privileges? A ShellPhish B GFI LanGuard C Netcraft D BeRootCorrect answer - D Which of the following steganography techniques is used by attackers for hiding the message with a large amount of useless data and mixing the original data with the unused data in any order? A Null ciphers B Grille ciphers C Jargon codes D SemagramsCorrect answer - A Which of the following commands is used by an attacker to delete only the history of the current shell and retain the command history of other shells? A cat /dev/null ~.bash_history && history -c && exit B history -w C export HISTSIZE=0 D history -cCorrect answer - B David, a content writer, was searching online for a specific topic. He visited a web page that appears legitimate and downloaded a file. As soon as he downloaded the file, his laptop started to behave in a weird manner. Out of suspicion, he scanned the laptop for viruses but found nothing. Which of the following programs conceals the malicious code of malware via various techniques, making it difficult for security mechanisms to detect or remove it? A Exploit B Downloader C Obfuscator D PayloadCorrect answer - C Given below are the different phases of the APT lifecycle. 1) Initial intrusion 2) Persistence 3) Preparation 4) Cleanup 5) Expansion 6) Search and exfiltration What is the correct sequence of phases in the APT lifecycle? A 1 → 2 → 3 → 4 → 5 → 6 B 3 → 1 → 5 → 2 → 6 → 4 C 5 → 3 → 2 → 6 → 4 → 1 D 2 → 4 → 6 → 1 → 5 → 3Correct answer - B Which of the following types of malware remains dormant until the user performs an online financial transaction, replicates itself on the computer, and edits the registry entries each time the computer starts? A TAN grabber B Covert credential grabber C HTML injection D Form grabberCorrect answer - B Which of the following types of viruses infects Microsoft Word or similar applications by automatically performing a sequence of actions after triggering an application? A Multipartite viruses B Macro viruses C Encryption viruses D Sparse infector virusesCorrect answer - B Identify the fileless malware obfuscation technique in which an attacker uses the below command to bypass antivirus software. /c ((echo command1)&&(echo command2)) A Inserting characters B Inserting parentheses C Inserting double quotes D Custom environment variablesCorrect answer - B Victor, an employee in an organization, received an executable file as an email attachment. Out of suspicion, he reached out to the organization's IT team. The team used a tool to dismantle the executable file into a binary program to find harmful or malicious processes. Which of the following tools did the IT team employ to analyze the application? A Splunk B Spam Mimic C IDA Pro D CCleanerCorrect answer - C John, an attacker, performed sniffing on a target organization's network and found that one of the protocols used by the target organization is vulnerable as it allows a client to access and manipulate the emails on a server. John exploited that protocol to obtain the data and employee credentials that are transmitted in cleartext. Which of the following protocols was exploited by John in the above scenario? A IMAP B HTTPS C IPsec D DTLSCorrect answer - A Which of the following DNS poisoning techniques is used by an attacker to infect a victim's machine with a Trojan and remotely change their DNS IP address to that of the attacker's? A DNS cache poisoning B Proxy server DNS poisoning C Internet DNS spoofing D Intranet DNS spoofingCorrect answer - C Which of the following filters in Wireshark displays only the traffic in a LAN (192.168.x.x) between workstations and servers with no Internet? A ==192.168.0.0/16 and ==192.168.0.0/16 B != && != && sip C ==192.168.1.100 && =23 D == 10.0.0.4 or == 10.0.0.5Correct answer - A In which of the following phases of social engineering attacks does an attacker collect sensitive information about the organization's accounts, finance, technologies in use, and upcoming plans? A Research the target company B Select a target C Develop a relationship D Exploit the relationshipCorrect answer - D In one of the following social engineering techniques, an attacker assumes the role of a knowledgeable professional so that the organization's employees ask them for information. The attacker then manipulates questions to draw out the required information. Which is this technique? A Baiting B Quid pro quo C Reverse social engineering D Dumpster divingCorrect answer - C When Jake, a software engineer, was using social media, he abruptly received a friend request from an unknown lady. Out of curiosity, he accepted it. She pretended to be nice and tricked Jake into revealing sensitive information about his organization. Once she obtained the information, she deactivated her account. Which of the following types of attack was performed on Jake in the above scenario? A Shoulder surfing B Honey trap C Diversion theft D TailgatingCorrect answer - B Kate, a disgruntled ex-employee of an organization, decided to hinder the operations of the organization and gather sensitive information by injecting malware into the organization's network. Which of the following categories of insiders does Kate belong to? A Negligent insider B Malicious insider C Compromised insider D Professional insiderCorrect answer - B In one of the following types of identity theft, the perpetrator obtains information from different victims to create a new identity by stealing a social security number and uses it with a combination of fake names, date of birth, address, and other details required for creating a new identity. Which is this type of identity theft? A Social identity theft B Synthetic identity theft C Child identity theft D Medical identity theftCorrect answer - B Santa, an attacker, targeted an organization's web infrastructure and sent partial HTTP requests to the target web server. When the partial requests were received, the web server opened multiple connections and waited for the requests to complete; however, these requests remained incomplete, causing the target server's maximum concurrent connection pool to be exhausted and additional connection attempts to be denied. Which of the following attack techniques was employed by Santa? A Slowloris attack B Ping-of-death (PoD) attack C Multi-vector attack D Smurf attackCorrect answer - A Which of the following techniques scans the headers of IP packets leaving a network and ensures that unauthorized or malicious traffic never leaves the internal network? A Ingress filtering B TCP intercept C Rate limiting D Egress filteringCorrect answer - D Which of the following techniques is also called a one-click attack or session riding and is used by an attacker to exploit a victim's active session with a trusted site to perform malicious activities? A Cross-site request forgery attack B Cross-site script attack C Session replay attacks D Session fixationCorrect answer - A An attacker aims to hack an organization and gather sensitive information. In this process, they lure an employee of the organization into clicking on a fake link, which appears legitimate but redirects the user to the attacker's server. The attacker then forwards the request to the legitimate server on behalf of the victim. Which of the following types of attack is performed by the attacker in the above scenario? A Man-in-the-middle attack B Cross-site script attack C Session replay attack D Session hijacking using proxy serversCorrect answer - D In which of the following types of hijacking can an attacker inject malicious data or commands into intercepted communications in a TCP session, even if the victim disables source routing? A RST hijacking B Blind hijacking C UDP hijacking D Session fixationCorrect answer - B Which of the following types of IDS alerts is an alarm raised when no actual attack is in progress? A True positive B False positive C True negative D False negativeCorrect answer - B Which of the following firewalls works at the session layer of the OSI model or TCP layer of TCP/IP, forwards data between networks without verification, and blocks incoming packets from the host but allows traffic to pass through? A Packet filtering firewall B Circuit-level gateway firewall C Application-level firewall D Application proxyCorrect answer - B Which of the following is an IDS evasion technique used by attackers to encode an attack packet payload in such a manner that the destination host can decode the packet but not the IDS? A Evasion B Session splicing C Obfuscating D FragmentationCorrect answer - C In which of the following techniques does an attacker use a combination of upper- and lower-case letters in an XSS payload to bypass the WAF? A Using hex encoding to bypass the WAF B Using ASCII values to bypass the WAF C Using obfuscation to bypass the WAF D Using ICMP tunnelingCorrect answer - C One of the following techniques redirects all malicious network traffic to a honeypot after any intrusion attempt is detected. Attackers can identify such honeypots by examining specific TCP/IP parameters such as the round-trip time (RTT), time to live (TTL), and TCP timestamp. Which is this technique? A Fake AP B Snort_inline C User-Mode Linux (UML) D Bait and switchCorrect answer - D Which of the following web-server components is located between the web client and web server to pass all the requests and is also used to prevent IP blocking and maintain anonymity? A Server root B Web proxy C Virtual document tree D Virtual hostingCorrect answer - B In which of the following attack types does an attacker use compromised PCs with spoofed IP addresses to intensify DDoS attacks on the victims' DNS server by exploiting the DNS recursive method? A DoS/DDoS attack B DNS server hijacking C DNS amplification attack D Directory traversal attackCorrect answer - C In which of the following attack types does an attacker exploit vulnerabilities that evolve from the unsafe use of functions in an application in public web servers to send crafted requests to internal or backend servers? A SSH brute forcing B Web-server password cracking C Server-side request forgery D Web-server misconfigurationCorrect answer - C In which of the following attack types does an attacker modify the content of a web page by examining its HTML code and identifying form fields that lack valid constraints? A Directory traversal B Buffer overflow attack C Command injection attack D Cross-site scripting (XSS) attackCorrect answer - C Which of the following is a technique used by an attacker to gather valuable system- level data such as account details, OS, software version, server names, and database schema details? A Whois B Session hijacking C Web server footprinting D Vulnerability scanningCorrect answer - C In which of the following stages of the web server attack methodology does an attacker determine the web server's remote access capabilities, its ports and services, and other aspects of its security? A Information gathering B Web server footprinting C Website mirroring D Vulnerability scanningCorrect answer - B Which of the following modules establishes a communication channel between the Metasploit framework and a victim host? A Exploit module B Auxiliary module C Payload module D NOPS moduleCorrect answer - C Given below are the steps involved in automated patch management. a. Test b. Assess c. Detect d. Acquire e. Maintain f. Deploy What is the correct sequence of steps involved in automatic patch management? A c → b → a → d → f → e B b → c → d → a → f → e C c → b → d → a → f → e D a → c → b → e → f → dCorrect answer - C Which of the following web services is designed to make services more productive and uses many underlying HTTP concepts to define the services? A SOAP B RESTful C XML-RPC D JSON-RPCCorrect answer - B In which of the following web application threats does an attacker manipulate the variables that reference files with "dot-dot-slash (../)" sequences and its variations? A Unvalidated redirects and forwards B Hidden field manipulation attack C Directory traversal attack D Cookie/session poisoningCorrect answer - C Which of the following is a process that can be used to convert object data into a linear format for transportation to a different system or different network? A Deserialization B Serialization C Insecure deserialization D Directory traversalCorrect answer - B Which of the following attacks runs malicious code inside a browser and causes an infection that persists even after closing or browsing away from the malicious web page that spread the infection? A Clickjacking attack B DNS rebinding attack C MarioNet attack D XML poisoningCorrect answer - C Which of the following information is exploited by an attacker to perform a buffer overflow attack on a target web application? A Cleartext communication B Error message C Application code D Email interactionCorrect answer - C In which of the following attacks does an attacker obtain the user session ID and then reuse it to gain unauthorized access to a target user account? A Session token prediction B Session token tampering C Session hijacking D Session replayCorrect answer - D In which of the following security risks does an API accidentally expose internal variables or objects because of improper binding and filtering based on a whitelist, allowing attackers with unauthorized access to modify object properties? A Broken object-level authorization B Mass assignment C Improper assets management D InjectionCorrect answer - B Which of the following encoding schemes represents any binary data using only printable ASCII characters and is used for encoding email attachments for safe transmission over SMTP? A URL encoding B Unicode encoding C Base64 encoding D Hex encodingCorrect answer - C Which of the following attacks is performed by asking the appropriate questions to an application database, with multiple valid statements evaluated as true or false being supplied in the affected parameter in the HTTP request? A Heavy query B Error-based SQL injection C No error message returned D Boolean exploitationCorrect answer - D Which of the following elements can be extracted using the query from sysobjects where xtype=char(85)))-- ? A 1st database table B 1st table column name C 1st field of the 1st row D Database nameCorrect answer - A Which of the following is an evasion technique that involves replacing characters with their ASCII codes in hexadecimal form and prefixing each code point with the percent sign (%)? A URL encoding B Sophisticated matches C Null byte D Case variationCorrect answer - A Which of the following regular expressions helps security professionals detect zero or more alphanumeric and underscore characters involved in an attack? A /(')|(%27)|(--)|(#)|(%23)/ix B /exec(s|+)+(s|x)pw+/ix C /w*((%27)|('))((%6F)|o|(%4F))((%72)|r|(%52))/ix D /((%3D)|(=))[^ ]*((%27)|(')|(--)|(%3B)|(;))/ixCorrect answer - C Which of the following protocols uses AES and the Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) for wireless data encryption? A WEP B WPA3 C WPA2 D WPACorrect answer - C Which of the following is a mode of operation that includes EAP or RADIUS for centralized client authentication using multiple authentication methods, such as token cards, Kerberos, and certificates? A WPA3-Personal B WPA2-Personal C WPA3-Enterprise D WPA2-EnterpriseCorrect answer - D In which of the following attacks does an attacker install a fake communication tower between two authentic endpoints with the intention of misleading a user and interrupting the data transmission between the user and real tower to hijack an active session? A Rogue AP attack B Key reinstallation attack C Wardriving D aLTEr attackCorrect answer - D In which of the following types of attack does an attacker exploit the carrier-sense multiple access with collision avoidance (CSMA/CA) clear channel assessment (CCA) mechanism to make a channel appear busy? A Beacon flood B Denial of service C Access point theft D EAP failureCorrect answer - B Which of the following attacks does not directly recover a WEP key and requires at least one data packet from a target AP for initiation? A MAC spoofing attack B Evil twin attack C Fragmentation attack D De-authentication attackCorrect answer - C Which of the following Bluetooth attacks is similar to the ICMP ping-of-death attack, where the attacker sends an oversized ping packet to a victim's device to cause a buffer overflow? A Bluesnarfing B Bluesniff C Bluejacking D BluesmackingCorrect answer - D Which of the following techniques involves sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones and laptops? A Bluejacking B Bluesmacking C Bluebugging D BluePrintingCorrect answer - A In which of the following attacks does an attacker dump memory by rebooting a victim's device with a malicious OS and then extract sensitive data from the dumped memory? A iOS jailbreaking B OS data caching C Carrier-loaded software D User-initiated codeCorrect answer - B Which of the following drozer commands is used by an attacker to find the list of various exported activities, services, broadcast receivers, and content providers in a target mobile device? A dz run ksurface package_name B dz run --component package_name activity_name C dz run D dz run -a package_nameCorrect answer - A In one of the following jailbreaking techniques, a user turns their device off and back on, following which the device starts up completely and the kernel is patched without the help of a computer. Which is this jailbreaking technique? A Semi-tethered jailbreaking B Tethered jailbreaking C Semi-untethered jailbreaking D Untethered jailbreakingCorrect answer - D John, an employee of an organization, always connects to the corporate network using his own mobile device. Which of the following best practices prevents BYOD risk when John connects to the corporate network? A Improperly disposing of a device B Not reporting a lost or stolen device C Providing support for many different devices D Separating personal and private dataCorrect answer - D In one of the following IoT attacks, attackers intercept legitimate messages from a valid communication and continuously send the intercepted message to the target device to perform a denial-of-service attack or crash the target device. Which is this IoT attack? A Replay attack B Exploit kits C Network pivoting D BlueBorne attackCorrect answer - A Which of the following RFCrack commands is used by an attacker to perform an incremental scan on a target IoT device while launching a rolling-code attack? A python RFC -b -v B python RFC -j -F C python RFC -r -M MOD_2FSK -F D python RFC -iCorrect answer - A Which of the following components of an IoT framework must incorporate strong encryption techniques for secure communications between endpoints and the authentication mechanism for the edge components? A Gateway B Cloud platform C Mobile D EdgeCorrect answer - A Through which of the following SCADA vulnerabilities does an attacker exploit code security issues that include out-of-bound read/write vulnerabilities and heap- and stack- based buffer overflow? A Credential management B Code injection C Lack of authorization D Memory corruptionCorrect answer - D Which of the following modbus-cli commands is used by attackers to manipulate the register values in a target PLC device? A modbus write Target IP 101 1 1 1 1 1 1 1 1 1 1 modbus write Target IP %M100 1 1 1 1 1 1 1 1 1 1 B modbus write Target IP %MW100 2 2 2 2 2 2 2 2 modbus write Target IP 2 2 2 2 2 2 2 2 C modbus read Target IP 101 10 modbus read Target IP %M100 10 D modbus read Target IP %MW100 10 modbus read Target IP 10Correct answer - B Which of the following Purdue levels is commonly referred to as an industrial demilitarized zone (IDMZ)? A Level 2 B Level 3 C Level 3.5 D Level 4Correct answer - C Which of the following cloud services provides data processing services, such as IoT services for connected devices, mobile and web applications, and batch-and-stream processing? A Function as a service (FaaS) B Container as a service (CaaS) C Security as a service (SECaaS) D Identity as a service (IDaaS)Correct answer - A Which of the following cloud deployment models is also known as the internal or corporate cloud and is a cloud infrastructure operated by a single organization and implemented within a corporate firewall? A Community cloud B Multi cloud C Private cloud D Public cloudCorrect answer - C Which of the following is the component in the docker architecture where images are stored and pulled and can be either private or public? A Docker daemon B Docker client C Docker registries D Docker objectsCorrect answer - C Which of the following is a serverless security risk due to the poor design of identity and access controls, paving the way for attackers to identify missing resources, such as open APIs and public cloud storage, and leading to system business logic breakage and execution flow disruption? A Injection B Broken authentication C Sensitive data exposure D XML external entities (XXE)Correct answer - B In which of the following attacks does an attacker exploit the vulnerability residing in a bare-metal cloud server and use it to implant a malicious backdoor in its firmware? A Wrapping attack B Cloudborne attack C Cryptanalysis attack D Cross-site scripting attackCorrect answer - B Which of the following information does an attacker enumerate by analyzing the AWS error messages that reveal information regarding the existence of a user? A Enumerating AWS account IDs B Enumerating S3 buckets C Enumerating IAM roles D Enumerating bucket permissionsCorrect answer - C An attacker is using DumpsterDiver, an automated tool, to identify potential secret leaks and hardcoded passwords in target cloud services. Which of the following flags is set by the attacker to analyze the files using rules specified in ""? A -r, --remove B -a, --advance C -s, --secret D -o OUTFILECorrect answer - B Which of the following encryption algorithms is a large tweakable symmetric-key block cipher with equal block and key sizes of 256, 512, or 1024 and involves only three operations, that is, addition-rotation-XOR? A RC4 B Twofish C RC5 D ThreefishCorrect answer - D Which of the following symmetric-key block ciphers has either 18 rounds for 128-bit keys or 24 rounds for 256-bit keys and uses four 8 × 8-bit S-boxes that perform affine transformations and logical operations? A RSA B Diffie-Hellman C Camellia D YAKCorrect answer - C Which of the following components of public key infrastructure acts as a verifier for the certificate authority? A Authentication authority B Registration authority C Certificate management system D Validation authorityCorrect answer - B Which of the following protocols is often used for data compression, digital signing, encryption and decryption of messages, emails, files, and directories as well as to enhance the privacy of email communications? A EAP B PGP C CHAP D HMACCorrect answer - B Which of the following is an attack where an attacker intercepts the communication between a client and server, negotiates cryptographic parameters to decrypt the encrypted content, and obtains confidential information such as system passwords? A Chosen-key attack B Man-in-the-middle attack C Rubber hose attack D Chosen-ciphertext attackCorrect answer - B Which of the following cryptography attacks is similar to the chosen plaintext attack, except that the attacker can obtain ciphertexts encrypted under two different keys? A Ciphertext-only attack B Known-plaintext attack C Chosen-key attack D Related-key attackCorrect answer - D Which of the following is an attack technique where the only information available to the attacker is some plaintext blocks along with the corresponding ciphertext and algorithm used to encrypt and decrypt the text? A Ciphertext-only attack B Adaptive chosen-plaintext attack C Chosen-plaintext attack D Known-plaintext attackCorrect answer - D Because attackers break into systems for various reasons, it is important for information security professionals to understand how malicious hackers exploit systems and the probable reasons behind the attacks. A True B FalseCorrect answer - A Information security refers to ________ or ________ information and information systems that use, store, and transmit information from unauthorized access, disclosure, alteration, and destruction. A compiling / securing B imaging / shielding C duplicating / saving D protecting / safeguardingCorrect answer - D Information is NOT the critical asset that organizations need to secure. A False B TrueCorrect answer - A ________ is the part of a malware or an exploit that performs the intended malicious actions, which can include creating backdoor access to a victim's machine, damaging or deleting files, and data theft. A Payload B Vulnerability C Exploit D Hack valueCorrect answer - A In a ________, the attacker exploits vulnerabilities in a computer application before the software developer can release a patch for them. A payload B zero-day attack C hack value D vulnerabilityCorrect answer - B Information security is defined as "a state of well-being of information and infrastructure in which the possibility of theft, tampering, and disruption of information and services is kept low and tolerable." A False B TrueCorrect answer - B Information security relies on four major elements: confidentiality, integrity, availability, and authenticity. A True B FalseCorrect answer - B ________ is the assurance that the information is accessible only to those authorized to have access. A Availability B Confidentiality C Authenticity D IntegrityCorrect answer - B Confidentiality controls include data classification, data encryption, and proper equipment disposal. A False B TrueCorrect answer - B ________ is trustworthiness of data or resources in the prevention of improper and unauthorized changes—the assurance that information is sufficiently accurate for its purpose. A Confidentiality B Availability C Authenticity D IntegrityCorrect answer - D Measures to maintain data integrity may include a checksum and access control. A False B TrueCorrect answer - B ________ is the assurance that the systems responsible for delivering, storing, and processing information are accessible when required by authorized users. A Integrity B Confidentiality C Availability D AuthenticityCorrect answer - C Measures to maintain data availability do not include redundant systems' disk array and clustered machines, antivirus software to stop worms from destroying networks, and distributed denial-of-service (DDoS) prevention systems. A True B FalseCorrect answer - B The major role of ________ is to confirm that a user is who he or she claims to be. A availability B integrity C confidentiality D authenticityCorrect answer - D Controls such as biometrics, smart cards, and digital certificates ensure the authenticity of data, transactions, communications, or documents. A False B TrueCorrect answer - B ________ is a way to guarantee that the sender of a message cannot later deny having sent the message, and that the recipient cannot deny having received the message. A Confidentiality B Integrity C Authenticity D Non-repudiationCorrect answer - D Individuals and organizations use digital signatures to ensure non-repudiation. A True B FalseCorrect answer - A Hacking is defined as the exploitation of vulnerabilities of computer systems and networks. A False B TrueCorrect answer - B For attackers, motives are the same as: A Ethics B Ideas C Values D GoalsCorrect answer - D The term information warfare or InfoWar refers to the use of information and communication technologies (ICT) for competitive advantages over an opponent. A True B FalseCorrect answer - A Information warfare is divided into ________ categories. A five B four C six D sevenCorrect answer - D Each category of information warfare consists of both offensive and defensive strategies. A True B FalseCorrect answer - A Defensive Information Warfare refers to all strategies and actions to defend against attacks on ICT assets. A True B FalseCorrect answer - A Offensive Information Warfare refers to warfare against the assets of an opponent. A True B FalseCorrect answer - A ________ techniques include creating viruses and worms, performing denial-of-service (DoS) attacks as well as establishing unauthorized remote access connections to a device using Trojans/backdoors, creating botnets, packet sniffing, phishing, and password cracking. A Personal-hacking B Network-hacking C Server-hacking D Intelligence-hackingCorrect answer - B Hackers are intelligent individuals with excellent computer skills—with the ability to create and explore the computer's software and hardware. A False B TrueCorrect answer - B All hacking is done with malicious intent. A False B TrueCorrect answer - A Which of the following is NOT a hacker category? A Hacktivist B Black Hats C Green Hats D White HatsCorrect answer - C ________ are individuals who use their extraordinary computing skills for illegal or malicious purposes. A Black Hats B Gray Hats C Hacktivists D White HatsCorrect answer - A White Hats are also known as ________, who use their hacking for defensive purposes. A Script Kiddies B Criminals C Hacktivists D Penetration TestersCorrect answer - D ________ are the individuals who work both offensively and defensively at various times. A Hacktivists B Gray Hats C White Hats D Script KiddiesCorrect answer - B Suicide hackers are similar to suicide bombers, who sacrifice their life for an attack and are thus not concerned with the consequences of their actions. A True B FalseCorrect answer - A Script Kiddies are skilled hackers who compromise systems by running scripts, tools, and software developed by real hackers. A False B TrueCorrect answer - A ________ are individuals with a wide range of skills, motivated by religious or political beliefs to create fear of large-scale disruption of computer networks. A Script Kiddies B Black Hats C Cyber Terrorists D HacktivistsCorrect answer - C State-sponsored hackers are government agents who are tasked with trying to penetrate and gain top-secret information—and to damage information systems of other governments. A True B FalseCorrect answer - A Hacktivists use hacking to increase awareness of their social or political agendas, as well as themselves, in both the online and offline arenas. A False B TrueCorrect answer - B There are ________ phases of hacking. A six B four C three D fiveCorrect answer - D Which of the following is NOT a hacking phase? A Gathering B Gaining access C Reconnaissance D ScanningCorrect answer - A Ethical hackers perform hacking with the permission of the network or system owner and without the intention to cause harm. A True B FalseCorrect answer - A Ethical hacking is NOT necessary because organizations can counter attacks from malicious hackers through other means that assist in anticipating methods used by them to break into a system. A False B TrueCorrect answer - A Ethical hacking highlights the remedial actions and also reduces information and communications technology (ICT) costs by resolving those vulnerabilities. A False B TrueCorrect answer - B An ethical hacker does NOT need to know the penalties of unauthorized hacking activities associated with a network penetration test because the ethical hacker has permission to hack the network. A False B TrueCorrect answer - A Security experts categorize computer crimes into ________ categories. A two B three C five D fourCorrect answer - A A ________ works together to perform a full-scale test covering all aspects of the network, as well as physical and system intrusion. A tiger team B recovery team C red team D blue teamCorrect answer - A Information security controls prevent unwanted events from occurring and reduce risk to the organization's information assets. A True B FalseCorrect answer - A The basic security concepts critical to information on the internet are authentication, authorization, and non-repudiation; those related to the persons accessing information are confidentiality, integrity, and availability. A False B TrueCorrect answer - A ________ is the greatest asset to an organization. A Policy B Personnel C Technology D InformationCorrect answer - D IA refers to the assurance of the integrity, availability, confidentiality, and authenticity of information and information systems during usage, processing, storage, and transmission of information assurance with the help of physical, technical, and administrative controls. A False B TrueCorrect answer - B Information Assurance and Information Risk Management (IRM) ensure that only authorized personnel access and use information. A False B TrueCorrect answer - B Today's information security management programs are primarily concerned with firewalls and passwords. A False B TrueCorrect answer - A Effective management of information security is NOT an ongoing process; updates should be made periodically. A False B TrueCorrect answer - A The threat model consists of ________ major building block(s). A three B one C two D fourCorrect answer - A EISA ensures that the security architecture and controls are in alignment with the organization's core goals and strategic direction. A True B FalseCorrect answer - A A security zone is an area within a network that consists of a group of systems and other components with the same characteristics, all of which serve to manage a secure network. A False B TrueCorrect answer - B Defense in Depth uses the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier. A False B TrueCorrect answer - B Defense in Depth is a security strategy in which security professionals use several protection layers throughout an information system. A False B TrueCorrect answer - B Defense in Depth helps to prevent ________ against an information system and its data because a break in one layer only leads the attacker to gain access to a single system. A indirect attacks B hacking attacks C internal attacks D direct attacksCorrect answer - D Incident management only involves responding to incidents. A False B TrueCorrect answer - A A ________ is a "document established by consensus and approved by a recognized body that provides, for common and repeated use, rules, guidelines, or characteristics for activities or their results, aimed at the achievement of the optimum degree of order in a given context." A regulation B standard C data file D lawCorrect answer - B Which of the following attacks occur when attackers tamper with hardware or software prior to installation? A Distribution Attacks B Close-in Attacks C Passive Attacks D Insider AttacksCorrect answer - A ________ is the assurance that the information is accessible only to those authorized to have access. A Integrity B Availability C Authenticity D ConfidentialityCorrect answer - D Identify the category of information warfare that uses various techniques such as propaganda and terror, to demoralize one's adversary in an attempt to succeed in battle. A Hacker warfare B Psychological warfare C Electronic warfare D Economic warfareCorrect answer - B Which attack type typically involves the monitoring of data flow between systems without modifying the data? A Close-in B Passive C Insider D DistributionCorrect answer - B Which concept was originally established to identify, prepare to attack, engage, and destroy the target? A Cyber Kill Chain Methodology B Adversary Behavioral Identification C Indicators of Compromise (IOCs) D Tactics, Techniques, and Procedures (TTPs)Correct answer - A Which term is a category of cyber threat intelligence? A Operational B Adversarial C Kinetic D LogicalCorrect answer - A The first step in the evaluation of the security posture of the target organization's IT infrastructure is called ________. A conceptualizing B forensics C footprinting D networkingCorrect answer - C ________ gives the blueprint of the security profile for an organization, and should be undertaken in a methodological manner. A Networking B Forensics C Conceptualizing D FootprintingCorrect answer - D ________ is legal in nature and conducted in order to evaluate the security of a target organization's IT infrastructure with their consent. ________ is the first step in ethical hacking, in which an attacker tries to gather information about a target. A Forensics examination / Conceptualizing B Forensics / Infrastructure consent C Networking / Conceptualizing D Ethical hacking / FootprintingCorrect answer - D It is NOT possible to find ways to intrude into a target organization's network using footprinting. A False B TrueCorrect answer - A Using ________, attackers find vulnerabilities in the target system and then exploit those vulnerabilities. A privacy loss B social engineering C system and network attacks D information leakageCorrect answer - C ________ is one of the major threats to organizations, as competitors can spy and attempt to steal sensitive data through footprinting. A System and network attacks B Corporate espionage C Information leakage D Privacy lossCorrect answer - B Footprinting performed on target organizations does NOT give the complete profile of the organization's security posture. A False B TrueCorrect answer - A A detailed footprint provides maximum information about the target organization and can help identify vulnerabilities in the target organization's security perimeter. A True B FalseCorrect answer - A ________ involve(s) gathering information about a target organization such as URLs, locations, establishment details, number of employees, the specific range of domain names, contact information, etc. A Footprinting methodology B Information leakage C Corporate espionage D System and network attacksCorrect answer - A Using information procured through search engines helps an attacker in performing social engineering and other types of advanced system attacks. A True B FalseCorrect answer - A ________ are the rapidly increasing online services, platforms, or other sites that allow people to connect with each other and to build social relations. A Special engineering sites B System sites C Social networking sites D Information sitesCorrect answer - C ________ monitors and tracks the emails of a particular user. This kind of tracking is possible through digitally time-stamped records that reveal the time and date when the target receives and opens a specific ________. A Information tracking / data B Email tracking / email C System tracking / data D Social networking tracking / cache filesCorrect answer - B ________ is a process that gathers, analyzes, and distributes information about products, customers, competitors, and technologies using the internet. A Social networking B Competitive intelligence C Email tracking D Information trackingCorrect answer - B The Whois tools help to determine who, where, and when a domain or site was registered—and the information about those who support it now. A False B TrueCorrect answer - B ________ is a totally non-technical process in which an attacker tricks a person and obtains confidential information in such a way that the target is unaware of the fact that someone is stealing confidential information. A Email tracking B Information tracking C Competitive intelligence D Social engineeringCorrect answer - D ________ is software used for open-source intelligence and forensics. It is useful during the information-gathering phase of all security-related work. A Maltego B Recon-Dog C FOCA D Recon-ngCorrect answer - A ________ is NOT intended to compete with existing frameworks, as it is designed exclusively for web-based, open-source reconnaissance. A Email tracking B Maltego C Social engineering D Recon-ngCorrect answer - D ________ refers to the process of testing the organization's security posture using similar techniques and tools as those of an attacker, but with the knowledge and approval of the organization. A Recon-ng B Maltego C Social engineering D Penetration testing (pen testing)Correct answer - D In which of the following attacks does an attacker pretend to be a legitimate or authorized person and uses a phone or other communication medium to mislead targets and trick them into revealing information? A Dumpster Diving B Eavesdropping C Impersonation D Shoulder SurfingCorrect answer - C In which of the following footprinting threats do competitors launch similar products in the market, alter prices, and undermine the market position of a target organization? A Corporate Espionage B Network Attack C Information Leakage D Social EngineeringCorrect answer - A Which website can be used to gather footprinting information of a target across social media platforms? A W B C C M D SCorrect answer - C Which technique is used to determine a hostname from an IP address? A Reverse ARP request B Reverse DNS lookup C DHCP request D ICMP echo requestCorrect answer - B Which tool is used to exploit a target as well as perform information gathering? A Robtex B Metasploit C Th3Inspector D theHarvesterCorrect answer - B Footprinting is the ________ phase of hacking in which the attacker gains ________ information about a potential target. A first / secondary B first / primary C second / secondary D second / primaryCorrect answer - B ________ is the process of gathering additional detailed information about the target using highly complex and aggressive reconnaissance techniques. A Pen testing B Reconnaissance C Scanning D TargetingCorrect answer - C Reconnaissance is one of the most important phases of intelligence gathering for an attacker. A True B FalseCorrect answer - B Which of the following is a purpose for scanning? A to use open ports B to discover exploitable communications channels C to list IP addresses D to transfer the request to the Web serverCorrect answer - B ________ involves connecting to or probing TCP and UDP ports on the target system to determine if the services are running or are in a listening state. A Vulnerability scanning B Workstation scanning C Port scanning D Network scanningCorrect answer - C ________ is a procedure for identifying active hosts on a network, either to attack them or as a network security assessment. A Vulnerability scanning B Port scanning C Workstation scanning D Network scanningCorrect answer - D ________ checks the system for known exploitable attack vectors typically found on unpatched systems. A Port scanning B Vulnerability scanning C Network scanning D Workstation scanningCorrect answer - B The more information there is at hand about a target organization, the greater the chances are of knowing a network's security loopholes and, consequently, for gaining unauthorized access to it. A False B TrueCorrect answer - B TCP is connectionless, which prioritizes connection establishment before data transfer between applications. A True B FalseCorrect answer - B TCP connection between protocols is possible through the process of the ________. A Three-way handshake B Stateful connections C IP session D TCP sessionCorrect answer - A The first step in scanning networks is to check for live systems. A False B TrueCorrect answer - B A ________ is a basic network scanning technique to determine which range of IP addresses maps to live hosts (computers). A ICMP ECHO B ping sweep C Nmap D ping scanCorrect answer - B Once the attackers detect live systems in the target network, they try to find ________ in the detected live systems. A closed ports B unused ports C open ports D unnecessary portsCorrect answer - C The SSDP service controls communication for the Universal Plug and Play feature (uPnP). A True B FalseCorrect answer - A IPv6 decreases the size of IP address space from 128 bits to 32 bits to support more levels of addressing hierarchy. A True B FalseCorrect answer - B Scanning is the process of gathering information about systems that are "alive" and responding on the network. A True B FalseCorrect answer - A Scanning techniques are split into ________ categories. A three B five C four D twoCorrect answer - A TCP Connect/Full Open Scan is one of the most unreliable forms of TCP scanning. A False B TrueCorrect answer - A Xmas Scan is a port-scan technique with FIN, URG, and PUSH flags set to send a TCP frame to a remote device. A False B TrueCorrect answer - B The UDP protocol can be easier to use than TCP scanning because you can send a packet, and NOT worry about whether the host is alive, dead, or filtered. A False B TrueCorrect answer - A ICMP echo scanning pings all the machines in the target network to discover live machines. A True B FalseCorrect answer - A Packet fragmentation, source routing, and IP address spoofing are attempts to circumvent detection techniques employed by IDS. A False B TrueCorrect answer - B Attackers circumvent IDSs by implementing techniques such as: A Packet fragmentation B UDP port scans C NAT translation D TCP scansCorrect answer - A SYN/FIN scanning using IP fragments was created to avoid false positives generated by other scans because of a packet-filtering device on the target system. A False B TrueCorrect answer - B Banner grabbing, or "OS fingerprinting," is a method used to determine the operating system that is running on a remote target system. A True B FalseCorrect answer - A Whenever a port is open, it means a service/banner is running on it. A False B TrueCorrect answer - B A network diagram does NOT help with analyzing network topologies. A False B TrueCorrect answer - A The network diagram helps to trace out the path to the target host in the network, but does not enable the attacker to understand the position of firewalls, IDSs, routers, and other access control devices. A False B TrueCorrect answer - A A/An ________ is an application that can serve as an I

Show more Read less
Institution
Course

Content preview

CERTIFIED ETHICAL HACKER v11
MASTER SET

Which of the following information security elements guarantees that the sender of a
message cannot later deny having sent the message and the recipient cannot deny
having received the message?

A Confidentiality
B Non-repudiation
C Availability
D IntegrityCorrect answer - B

A phase of the cyber kill chain methodology triggers the adversary's malicious code,
which utilizes a vulnerability in the operating system, application, or server on a target
system. At this stage, the organization may face threats such as authentication and
authorization attacks, arbitrary code execution, physical security threats, and security
misconfiguration.

Which is this phase of the cyber kill chain methodology?

A Reconnaissance
B Weaponization
C Exploitation
D InstallationCorrect answer - C

Which of the following is a category of hackers who are also known as crackers, use
their extraordinary computing skills for illegal or malicious purposes, and are often
involved in criminal activities?

A Black hats
B White hats
C Suicide hackers
D Script kiddiesCorrect answer - A

John, a professional hacker, has launched an attack on a target organization to extract
sensitive information. He was successful in launching the attack and gathering the
required information. He is now attempting to hide the malicious acts by overwriting the
server, system, and application logs to avoid suspicion.

Which of the following phases of hacking is John currently in?

A Maintaining access

,B Scanning
C Clearing tracks
D Gaining accessCorrect answer - C

Which of the following risk management phases involves selecting and implementing
appropriate controls for the identified risks to modify them?

A Risk tracking and review
B Risk identification
C Risk treatment
D Risk assessmentCorrect answer - C

In which of the following incident handling and response phases are the identified
security incidents analyzed, validated, categorized, and prioritized?

A Incident recording and assignment
B Incident triage
C Containment
D EradicationCorrect answer - B

Which of the following phases of risk management is an ongoing iterative process that
assigns priorities for risk mitigation and implementation plans to help determine the
quantitative and qualitative value of risk?

A Risk identification
B Risk treatment
C Risk tracking and review
D Risk assessmentCorrect answer - D

Jack, a security professional, was instructed to introduce a security standard to handle
cardholder information for major debit, credit, prepaid, e-purse, ATM, and POS cards. In
the process, Jack has employed a standard that offers robust and comprehensive
standards as well as supporting materials to enhance payment-card data security.

What is the security standard that Jack has employed?

A HIPAA
B SOX
C DMCA
D PCI DSSCorrect answer - D

Morris, an attacker, has targeted an organization's network. To know the structure of the
target network, he combined footprinting techniques with a network utility that helped
him create diagrammatic representations of the target network.

What is the network utility employed by Morris in the above scenario?

,A Netcraft
B Tracert
C Shodan
D BuzzSumoCorrect answer - B

Which of the following Google advanced search operators displays similar websites to
the specified URL?

A [site:]
B [info:]
C [inurl:]
D [related:]Correct answer - D

Which of the following techniques is used by an attacker to perform automated
searches on the target website and collect specified information, such as employee
names and email addresses?

A Web spidering
B Website mirroring
C Monitoring of web updates
D Website link extractionCorrect answer - A

Jude, an attacker, has targeted an organization's communication network. While
conducting initial footprinting, he used a Google dork to find the VoIP login portals of the
organization.

What is the Google dork that helped Jude find the VoIP login portals?

A inurl:8080 intitle:"login" intext:"UserLogin" "English"
B inurl:/voice/advanced/ intitle:Linksys SPA configuration
C inurl:/remote/login?lang=en
D !Host=*.* intext:enc_UserPassword=* ext:pcfCorrect answer - A

Stokes, an attacker, decided to find vulnerable IoT devices installed in the target
organization. In this process, he used an online tool that helped him gather information
such as a device's manufacturer details, its IP address, and the location where it is
installed.

What is the online tool that Stokes used in the above scenario?

A DuckDuckGo
B Baidu
C Shodan
D BingCorrect answer - C

, CenSys Solutions hired Clark, a security professional, to enhance the Internet security
of the organization. To achieve the goal, Clark employed a tool that provides various
Internet security services, including anti-fraud and anti-phishing services, application
testing, and PCI scanning.

What is the tool used by Clark to perform the above activities?

A Blisqy
B OmniPeek
C Netcraft
D BTCrawlerCorrect answer - C

Clark is a professional hacker. He targeted an organization for financial benefit and
used various footprinting techniques to gather information about the target network. In
this process, he employed a protocol used for querying databases that store the
registered users or assignees of an Internet resource, such as a domain name, an IP
address block, or an autonomous system.

What is the protocol employed by Clark in the above scenario?

A SMB
B Whois
C SNMP
D FTPCorrect answer - B

Which of the following tools in OSRFramework is used by attackers to check for a user
profile on up to 290 different platforms?

A usufy.py
B phonefy.py
C entify.py
D searchfy.pyCorrect answer - A

What is the feature in FOCA that checks each domain to ascertain the host names
configured in NS, MX, and SPF servers to discover the new host and domain names?

A Common names
B DNS search
C Web search
D Bing IPCorrect answer - B

Which of the following countermeasures should be followed to safeguard the privacy,
data, and reputation of an organization and to prevent information disclosure?

A Keeping the domain name profile public
B Enabling directory listings in the web servers

Written for

Course

Document information

Uploaded on
March 17, 2022
Number of pages
169
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.48
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EvaTee Phoenix University
Follow You need to be logged in order to follow users or courses
Sold
5202
Member since
4 year
Number of followers
3567
Documents
55582
Last sold
7 hours ago
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

947 reviews

5
451
4
167
3
171
2
48
1
110

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions