Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Certified Ethical Hacker Exam (CEHv13) Question and Answers

Certified Ethical Hacker Exam (CEHv13)

Last Update Nov 30, 2025
Total Questions : 568

We are offering FREE 312-50v13 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare 312-50v13 free exam questions and then go for complete pool of Certified Ethical Hacker Exam (CEHv13) test questions that will help you more.

312-50v13 pdf

312-50v13 PDF

$36.75  $104.99
312-50v13 Engine

312-50v13 Testing Engine

$43.75  $124.99
312-50v13 PDF + Engine

312-50v13 PDF + Testing Engine

$57.75  $164.99
Questions 1

Samuel, a professional hacker, monitored and Intercepted already established traffic between Bob and a host machine to predict Bob's ISN. Using this ISN, Samuel sent spoofed packets with Bob's IP address to the host machine. The host machine responded with <| packet having an Incremented ISN. Consequently. Bob's connection got hung, and Samuel was able to communicate with the host machine on behalf of Bob. What is the type of attack performed by Samuel in the above scenario?

Options:

A.  

UDP hijacking

B.  

Blind hijacking

C.  

TCP/IP hacking

D.  

Forbidden attack

Discussion 0
Questions 2

An ethical hacker is hired to evaluate the defenses of an organization's database system which is known to employ a signature-based IDS. The hacker knows that some SQL Injection evasion techniques may allow him

to bypass the system's signatures. During the operation, he successfully retrieved a list of usernames from the database without triggering an alarm by employing an advanced evasion technique. Which of the following

could he have used?

Options:

A.  

Utilizing the char encoding function to convert hexadecimal and decimal values into characters that pass-through SQL engine parsing

B.  

Using the URL encoding method to replace characters with their ASCII codes in hexadecimal form

C.  

Implementing sophisticated matches such as “OR ‘john' = john" in place of classical matches like "OR 1-1"

D.  

Manipulating white spaces in SQL queries to bypass signature detection

Discussion 0
Questions 3

During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network.

What is this type of DNS configuration commonly called?

Options:

A.  

DynDNS

B.  

DNS Scheme

C.  

DNSSEC

D.  

Split DNS

Discussion 0
Questions 4

Mr. Omkar performed tool-based vulnerability assessment and found two vulnerabilities. During analysis, he found that these issues are not true vulnerabilities.

What will you call these issues?

Options:

A.  

False positives

B.  

True negatives

C.  

True positives

D.  

False negatives

Discussion 0
Questions 5

A zone file consists of which of the following Resource Records (RRs)?

Options:

A.  

DNS, NS, AXFR, and MX records

B.  

DNS, NS, PTR, and MX records

C.  

SOA, NS, AXFR, and MX records

D.  

SOA, NS, A, and MX records

Discussion 0
Questions 6

ViruXine.W32 virus hides its presence by changing the underlying executable code. This virus code mutates while keeping the original algorithm intact — the code changes itself each time it runs, but the function of the code (its semantics) does not change at all.

Here is a section of the virus code (refer to image), where the loop performs XOR encryption and changes the way the code looks every time it is executed.

What is this technique called?

Options:

A.  

Polymorphic Virus

B.  

Metamorphic Virus

C.  

Dravidic Virus

D.  

Stealth Virus

Discussion 0
Questions 7

Which utility will tell you in real time which ports are listening or in another state?

Options:

A.  

Netstat

B.  

TCPView

C.  

Nmap

D.  

Loki

Discussion 0
Questions 8

Ralph, a professional hacker, targeted Jane, who had recently bought new systems for her company. After a few days, Ralph contacted Jane while masquerading as a legitimate customer support executive, informing that her systems need to be serviced for proper functioning and that customer support will send a computer technician. Jane promptly replied positively. Ralph entered Jane's company using this opportunity and gathered sensitive information by scanning terminals for passwords, searching for important documents in desks, and rummaging bins. What is the type of attack technique Ralph used on jane?

Options:

A.  

Dumpster diving

B.  

Eavesdropping

C.  

Shoulder surfing

D.  

impersonation

Discussion 0
Questions 9

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient’s consent, similar to email spamming?

Options:

A.  

Bluesmacking

B.  

BlueSniffing

C.  

Bluejacking

D.  

Bluesnarfing

Discussion 0
Questions 10

Richard, an attacker, targets an MNC. In this process, he uses a footprinting technique to gather as much information as possible. Using this technique, he gathers domain information such as the target domain name, contact details of its owner, expiry date, and creation date. With this information, he creates a map of the organization's network and misleads domain owners with social engineering to obtain internal details of its network.

What type of footprinting technique is employed by Richard?

Options:

A.  

VPN footprinting

B.  

Email footprinting

C.  

VoIP footprinting

D.  

Whois footprinting

Discussion 0
Questions 11

If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?

Options:

A.  

Birthday

B.  

Brute force

C.  

Man-in-the-middle

D.  

Smurf

Discussion 0
Questions 12

An Internet Service Provider (ISP) has a need to authenticate users connecting via analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network.

Which AAA protocol is the most likely able to handle this requirement?

Options:

A.  

TACACS+

B.  

DIAMETER

C.  

Kerberos

D.  

RADIUS

Discussion 0
Questions 13

Which of the following is a passive wireless packet analyzer that works on Linux-based systems?

Options:

A.  

Burp Suite

B.  

OpenVAS

C.  

tshark

D.  

Kismet

Discussion 0
Questions 14

Suppose your company has just passed a security risk assessment exercise. The results display that the risk of the breach in the main company application is 50%. Security staff has taken some measures and

implemented the necessary controls. After that, another security risk assessment was performed showing that risk has decreased to 10%. The risk threshold for the application is 20%. Which of the following risk decisions will be the best for the project in terms of its successful continuation with the most business profit?

Options:

A.  

Accept the risk

B.  

Introduce more controls to bring risk to 0%

C.  

Mitigate the risk

D.  

Avoid the risk

Discussion 0
Questions 15

Larry, a security professional in an organization, has noticed some abnormalities In the user accounts on a web server. To thwart evolving attacks, he decided to harden the security of the web server by adopting a countermeasures to secure the accounts on the web server.

Which of the following countermeasures must Larry implement to secure the user accounts on the web server?

Options:

A.  

Enable unused default user accounts created during the installation of an OS

B.  

Enable all non-interactive accounts that should exist but do not require interactive login

C.  

Limit the administrator or toot-level access to the minimum number of users

D.  

Retain all unused modules and application extensions

Discussion 0
Questions 16

Your organization has signed an agreement with a web hosting provider that requires you to take full responsibility for the maintenance of the cloud-based resources. Which of the following models covers this?

Options:

A.  

Platform as a Service

B.  

Software as a Service

C.  

Functions as a Service

D.  

Infrastructure as a Service

Discussion 0
Questions 17

Widespread fraud ac Enron. WorldCom, and Tyco led to the creation of a law that was designed to improve the accuracy and accountability of corporate disclosures. It covers accounting firms and third parties that provide financial services to some organizations and came into effect in 2002. This law is known by what acronym?

Options:

A.  

Fed RAMP

B.  

PCIDSS

C.  

SOX

D.  

HIPAA

Discussion 0
Questions 18

In the context of password security, a simple dictionary attack involves loading a dictionary file into a cracking application such as L0phtCrack or John the Ripper. The brute force method is slow but exhaustive. If you use both brute force and dictionary methods combined to vary words, what would you call such an attack?

Options:

A.  

Full Blown

B.  

Thorough

C.  

Hybrid

D.  

BruteDics

Discussion 0
Questions 19

During a penetration testing assignment, a Certified Ethical Hacker (CEH) used a set of scanning tools to create a profile of the target organization. The CEH wanted to scan for live hosts, open ports, and services on a target network. He used Nmap for network inventory and Hping3 for network security auditing. However, he wanted to spoof IP addresses for anonymity during probing. Which command should the CEH use to perform this task?

Options:

A.  

Hping3 -110.0.0.25 --ICMP

B.  

Nmap -sS -Pn -n -vw --packet-trace -p- --script discovery -T4

C.  

Hping3 -S 192.168.1.1 -a 192.168.1.254 -p 22 -flood

D.  

Hping3-210.0.0.25-p 80

Discussion 0
Questions 20

How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender’s identity?

Options:

A.  

Hash value

B.  

Private key

C.  

Digital signature

D.  

Digital certificate

Discussion 0
Questions 21

You are analyzing traffic on the network with Wireshark. You want to routinely run a cron job which will run the capture against a specific set of IPs - 192.168.8.0/24. What command would you use?

Options:

A.  

wireshark --fetch '192.168.8*'

B.  

wireshark --capture --local masked 192.168.8.0 ---range 24

C.  

tshark -net 192.255.255.255 mask 192.168.8.0

D.  

sudo tshark -f "net 192.168.8.0/24"

Discussion 0
Questions 22

Tony wants to integrate a 128-bit symmetric block cipher with key sizes of 128, 192, or 256 bits into a software program, which involves 32 rounds of computational operations that include substitution and permutation operations on four 32-bit word blocks using 8-variable S-boxes with 4-bit entry and 4-bit exit.

Which of the following algorithms includes all the above features and can be integrated by Tony into the software program?

Options:

A.  

TEA

B.  

CAST-128

C.  

RC5

D.  

Serpent

Discussion 0
Questions 23

Allen, a professional pen tester, was hired by xpertTech solutWns to perform an attack simul-ation on the organization's network resources. To perform the attack, he took advantage of the NetBIOS API and targeted the NetBIOS service. B/enumerating NetBIOS, he found that port 139 was open and could see the resources that could be accessed or viewed on a remote system. He came across many NetBIOS codes during enumeration.

identify the NetBIOS code used for obtaining the messenger service running for the logged-in user?

Options:

A.  

<1B>

B.  

<00>

C.  

<03>

D.  

<20>

Discussion 0
Questions 24

Gerard, a disgruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attacks and bring down its reputation in the market. To launch the attacks process, he performed DNS footprinting to gather information about ONS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names. IP addresses. DNS records, and network Who is records. He further exploited this information to launch other sophisticated attacks. What is the tool employed by Gerard in the above scenario?

Options:

A.  

Knative

B.  

zANTI

C.  

Towelroot

D.  

Bluto

Discussion 0
Questions 25

An attacker runs the netcat tool to transfer a secret file between two hosts.

He is worried about information being sniffed on the network.

How would the attacker use netcat to encrypt the information before transmitting onto the wire?

Options:

A.  

Machine A: netcat -l -p -s password 1234 < testfile Machine B: netcat 1234

B.  

Machine A: netcat -l -e magickey -p 1234 < testfile Machine B: netcat 1234

C.  

Machine A: netcat -l -p 1234 < testfile -pw password Machine B: netcat 1234 -pw password

D.  

Use cryptcat instead of netcat

Discussion 0
Questions 26

Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the information, he successfully performed an attack on the target government organization without being traced. Which of the following techniques is described in the above scenario?

Options:

A.  

Dark web footprinting

B.  

VoIP footprinting

C.  

VPN footprinting

D.  

Website footprinting

Discussion 0
Questions 27

Ethical backer jane Doe is attempting to crack the password of the head of the it department of ABC company. She Is utilizing a rainbow table and notices upon entering a password that extra characters are added to the password after submitting. What countermeasure is the company using to protect against rainbow tables?

Options:

A.  

Password key hashing

B.  

Password salting

C.  

Password hashing

D.  

Account lockout

Discussion 0
Questions 28

You want to analyze packets on your wireless network. Which program would you use?

Options:

A.  

Wireshark with Airpcap

B.  

Airsnort with Airpcap

C.  

Wireshark with Winpcap

D.  

Ethereal with Winpcap

Discussion 0
Questions 29

What does the following command in netcat do?

nc -l -u -p 55555 < /etc/passwd

Options:

A.  

Logs the incoming connections to /etc/passwd file

B.  

Loads the /etc/passwd file to the UDP port 55555

C.  

Grabs the /etc/passwd file when connected to UDP port 55555

D.  

Deletes the /etc/passwd file when connected to the UDP port 55555

Discussion 0
Questions 30

What hacking attack is challenge/response authentication used to prevent?

Options:

A.  

Replay attacks

B.  

Scanning attacks

C.  

Session hijacking attacks

D.  

Password cracking attacks

Discussion 0
Questions 31

Cross-site request forgery involves:

Options:

A.  

A request sent by a malicious user from a browser to a server

B.  

Modification of a request by a proxy between client and server

C.  

A browser making a request to a server without the user’s knowledge

D.  

A server making a request to another server without the user’s knowledge

Discussion 0
Questions 32

When conducting a penetration test, it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network. Which of the following cannot be performed by passive network sniffing?

Options:

A.  

Identifying operating systems, services, protocols and devices

B.  

Modifying and replaying captured network traffic

C.  

Collecting unencrypted information about usernames and passwords

D.  

Capturing a network traffic for further analysis

Discussion 0
Questions 33

Which file is a rich target to discover the structure of a website during web-server footprinting?

Options:

A.  

Document root

B.  

Robots.txt

C.  

domain.txt

D.  

index.html

Discussion 0
Questions 34

What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?

Options:

A.  

110

B.  

135

C.  

139

D.  

161

E.  

445

F.  

1024

Discussion 0
Questions 35

What information security law or standard aims at protecting stakeholders and the general public from accounting errors and fraudulent activities within organizations?

Options:

A.  

PCI-DSS

B.  

FISMA

C.  

SOX

D.  

ISO/IEC 27001:2013

Discussion 0
Questions 36

Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical Information to Johnson's machine. What is the social engineering technique Steve employed in the above scenario?

Options:

A.  

Quid pro quo

B.  

Diversion theft

C.  

Elicitation

D.  

Phishing

Discussion 0
Questions 37

What does a firewall check to prevent particular ports and applications from getting packets into an organization?

Options:

A.  

Transport layer port numbers and application layer headers

B.  

Presentation layer headers and the session layer port numbers

C.  

Network layer headers and the session layer port numbers

D.  

Application layer port numbers and the transport layer headers

Discussion 0
Questions 38

Jane is working as a security professional at CyberSol Inc. She was tasked with ensuring the authentication and integrity of messages being transmitted in the corporate network. To encrypt the messages, she implemented a security model in which every user in the network maintains a ring of public keys. In this model, a user needs to encrypt a message using the receiver's public key, and only the receiver can decrypt the message using their private key. What is the security model implemented by Jane to secure corporate messages?

Options:

A.  

Zero trust network

B.  

Transport Layer Security (TLS)

C.  

Secure Socket Layer (SSL)

D.  

Web of trust (WOT)

Discussion 0
Questions 39

What type of virus is most likely to remain undetected by antivirus software?

Options:

A.  

Cavity virus

B.  

Stealth virus

C.  

File-extension virus

D.  

Macro virus

Discussion 0
Questions 40

You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible. But they are not accessible when you try using the URL.

What may be the problem?

Options:

A.  

Traffic is Blocked on UDP Port 53

B.  

Traffic is Blocked on TCP Port 80

C.  

Traffic is Blocked on TCP Port 54

D.  

Traffic is Blocked on UDP Port 80

Discussion 0
Questions 41

One of your team members has asked you to analyze the following SOA record. What is the version?

Rutgers.edu. SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.) (Choose four.)

Options:

A.  

200303028

B.  

3600

C.  

604800

D.  

2400

E.  

60

F.  

4800

Discussion 0
Questions 42

Password cracking programs reverse the hashing process to recover passwords. (True/False.)

Options:

A.  

True

B.  

False

Discussion 0
Questions 43

Which of the following is assured by the use of a hash?

Options:

A.  

Authentication

B.  

Confidentiality

C.  

Availability

D.  

Integrity

Discussion 0
Questions 44

OpenSSL on Linux servers includes a command line tool for testing TLS. What is the name of the tool and the correct syntax to connect to a web server?

Options:

A.  

openssl s_client -site www.website.com:443

B.  

openssl_client -site www.website.com:443

C.  

openssl s_client -connect www.website.com:443

D.  

openssl_client -connect www.website.com:443

Discussion 0
Questions 45

Josh has finished scanning a network and has discovered multiple vulnerable services. He knows that several of these usually have protections against external sources but are frequently susceptible to internal users. He decides to draft an email, spoof the sender as the internal IT team, and attach a malicious file disguised as a financial spreadsheet. Before Josh sends the email, he decides to investigate other methods of getting the file onto the system. For this particular attempt, what was the last stage of the cyber kill chain that Josh performed?

Options:

A.  

Exploitation

B.  

Weaponization

C.  

Delivery

D.  

Reconnaissance

Discussion 0
Questions 46

Gilbert, a web developer, uses a centralized web API to reduce complexity and increase the Integrity of updating and changing data. For this purpose, he uses a web service that uses HTTP methods such as PUT. POST. GET. and DELETE and can improve the overall performance, visibility, scalability, reliability, and portability of an application. What is the type of web-service API mentioned in the above scenario?

Options:

A.  

JSON-RPC

B.  

SOAP API

C.  

RESTful API

D.  

REST API

Discussion 0
Questions 47

Your company, Encryptor Corp, is developing a new application that will handle highly sensitive user information. As a cybersecurity specialist, you want to ensure this data is securely stored. The development team proposes a method where data is hashed and then encrypted before storage. However, you want an added layer of security to verify the integrity of the data upon retrieval. Which of the following cryptographic concepts should you propose to the team?

Options:

A.  

Implement a block cipher mode of operation.

B.  

a digital signature mechanism.

C.  

Suggest using salt with hashing.

D.  

Switch to elliptic curve cryptography.

Discussion 0
Questions 48

The network administrator at Spears Technology, Inc has configured the default gateway Cisco router's access-list.

You successfully brute-force the SNMP community string using a SNMP crack tool.

The access-list prevents you from establishing a successful connection.

You want to retrieve the Cisco configuration from the router. How would you proceed?

Options:

A.  

Use the Cisco's TFTP default password to connect and download the configuration file

B.  

Run a network sniffer and capture the returned traffic with the configuration file from the router

C.  

Run Generic Routing Encapsulation (GRE) tunneling protocol from your computer to the router masking your IP address

D.  

Send a customized SNMP set request with a spoofed source IP address in the range -192.168.1.0

Discussion 0
Questions 49

Alex, a cloud security engineer working in Eyecloud Inc. is tasked with isolating applications from the underlying infrastructure and stimulating communication via well-defined channels. For this purpose, he used an open-source technology that helped him in developing, packaging, and running applications; further, the technology provides PaaS through OS-level visualization, delivers containerized software packages, and promotes fast software delivery. What is the cloud technology employed by Alex in the above scenario?

Options:

A.  

Virtual machine

B.  

Serverless computing

C.  

Docker

D.  

Zero trust network

Discussion 0
Questions 50

You are a cybersecurity specialist at CloudTech Inc., a company providing cloud-based services. You are managing a project for a client who wants to migrate their sensitive data to a public cloud service. To comply with regulatory requirements, the client insists on maintaining full control over the encryption keys even when the data is at rest on the cloud. Which of the following practices should you implement to meet this requirement?

Options:

A.  

Use the cloud service provider's encryption services but store keys on-premises.

B.  

Use the cloud service provider's default encryption and key management services.

C.  

Rely on Secure Sockets Layer (SSL) encryption for data at rest.

D.  

Encrypt data client-side before uploading to the cloud and retain control of the encryption keys.

Discussion 0
Questions 51

A sophisticated attacker targets your web server with the intent to execute a Denial of Service (DoS) attack. His strategy involves a unique mixture of TCP SYN, UDP, and ICMP floods, using 'r' packets per second. Your server, reinforced with advanced security measures, can handle 'h' packets per second before it starts showing signs of strain. If 'r' surpasses 'h', it overwhelms the server, causing it to become unresponsive. In a peculiar pattern, the attacker selects 'r' as a composite number and 'h' as a prime number, making the attack detection more challenging. Considering 'r=2010' and different values for 'h', which of the following scenarios would potentially cause the server to falter?

Options:

A.  

h=1999 (prime): Despite the attacker's packet flood, the server can handle these requests, remaining responsive

B.  

h=2003 (prime): The server can manage more packets than the attacker is sending, hence it stays operational

C.  

h=1993 (prime): Despite being less than 'r', the server's prime number capacity keeps it barely operational, but the risk of falling is imminent

D.  

h=1987 (prime): The attacker's packet rate exceeds the server's capacity, causing potential unresponsiveness

Discussion 0
Questions 52

An ethical hacker has been tasked with assessing the security of a major corporation's network. She suspects the network uses default SNMP community strings. To exploit this, she plans to extract valuable network information using SNMP enumeration. Which tool could best help her to get the information without directly modifying any parameters within the SNMP agent’s management information base (MIB)?

Options:

A.  

snmp-check (snmp_enum Module) to gather a wide array of information about the target

B.  

Nmap, with a script to retrieve all running SNMP processes and associated ports

C.  

Oputits, are mainly designed for device management and not SNMP enumeration

D.  

SnmpWalk, with a command to change an OID to a different value

Discussion 0
Questions 53

Kate dropped her phone and subsequently encountered an issue with the phone's internal speaker. Thus, she is using the phone's loudspeaker for phone calls and other activities. Bob, an attacker, takes advantage of this vulnerability and secretly exploits the hardware of Kate's phone so that he can monitor the loudspeaker's output from data sources such as voice assistants, multimedia messages, and audio files by using a malicious app to breach speech privacy.

What is the type of attack Bob performed on Kate in the above scenario?

Options:

A.  

Man-in-the-disk attack

B.  

aLTEr attack

C.  

SIM card attack

D.  

Spearphone attack

Discussion 0
Questions 54

Which of the following is not a Bluetooth attack?

Options:

A.  

Bluedriving

B.  

Bluesmacking

C.  

Bluejacking

D.  

Bluesnarfing

Discussion 0
Questions 55

Which type of sniffing technique is generally referred as MiTM attack?

Options:

A.  

Password Sniffing

B.  

ARP Poisoning

C.  

MAC Flooding

D.  

DHCP Sniffing

Discussion 0
Questions 56

What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?

Options:

A.  

Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.

B.  

Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.

C.  

Symmetric encryption allows the server to securely transmit the session keys out-of-band.

D.  

Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.

Discussion 0
Questions 57

Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?

Options:

A.  

Nikto

B.  

John the Ripper

C.  

Dsniff

D.  

Snort

Discussion 0
Questions 58

which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth?

Options:

A.  

Bluesmacking

B.  

Bluebugging

C.  

Bluejacking

D.  

Bluesnarfing

Discussion 0
Questions 59

Steve, an attacker, created a fake profile on a social media website and sent a request to Stella. Stella was enthralled by Steve's profile picture and the description given for his profile, and she initiated a conversation with him soon after accepting the request. After a few days. Sieve started asking about her company details and eventually gathered all the essential information regarding her company. What is the social engineering technique Steve employed in the above scenario?

Options:

A.  

Diversion theft

B.  

Baiting

C.  

Honey trap

D.  

Piggybacking

Discussion 0
Questions 60

You have compromised a server and successfully gained a root access. You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System. What is the best approach?

Options:

A.  

Use Alternate Data Streams to hide the outgoing packets from this server.

B.  

Use HTTP so that all traffic can be routed vis a browser, thus evading the internal Intrusion Detection Systems.

C.  

Install Cryptcat and encrypt outgoing packets from this server.

D.  

Install and use Telnet to encrypt all outgoing traffic from this server.

Discussion 0
Questions 61

Bob is doing a password assessment for one of his clients. Bob suspects that security policies are not in place. He also suspects that weak passwords are probably the norm throughout the company he is evaluating. Bob is familiar with password weaknesses and keyloggers.

Which of the following options best represents the means that Bob can adopt to retrieve passwords from his clients’ hosts and servers?

Options:

A.  

Hardware, Software, and Sniffing.

B.  

Hardware and Software Keyloggers.

C.  

Passwords are always best obtained using Hardware key loggers.

D.  

Software only, they are the most effective.

Discussion 0
Questions 62

what is the port to block first in case you are suspicious that an loT device has been compromised?

Options:

A.  

22

B.  

443

C.  

48101

D.  

80

Discussion 0
Questions 63

Alice needs to send a confidential document to her coworker. Bryan. Their company has public key infrastructure set up. Therefore. Alice both encrypts the message and digitally signs it. Alice uses_______to encrypt the message, and Bryan uses__________to confirm the digital signature.

Options:

A.  

Bryan’s public key; Bryan’s public key

B.  

Alice’s public key; Alice’s public key

C.  

Bryan’s private key; Alice’s public key

D.  

Bryan’s public key; Alice’s public key

Discussion 0
Questions 64

An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.

What is the most likely cause?

Options:

A.  

The network devices are not all synchronized.

B.  

Proper chain of custody was not observed while collecting the logs.

C.  

The attacker altered or erased events from the logs.

D.  

The security breach was a false positive.

Discussion 0
Questions 65

Samuel a security administrator, is assessing the configuration of a web server. He noticed that the server permits SSlv2 connections, and the same private key certificate is used on a different server that allows SSLv2 connections. This vulnerability makes the web server vulnerable to attacks as the SSLv2 server can leak key information.

Which of the following attacks can be performed by exploiting the above vulnerability?

Options:

A.  

DROWN attack

B.  

Padding oracle attack

C.  

Side-channel attack

D.  

DUHK attack

Discussion 0
Questions 66

Bob, an attacker, has managed to access a target loT device. He employed an online tool to gather information related to the model of the loT device and the certifications granted to it. Which of the following tools did Bob employ to gather the above Information?

Options:

A.  

search.com

B.  

EarthExplorer

C.  

Google image search

D.  

FCC ID search

Discussion 0
Questions 67

Which iOS jailbreaking technique patches the kernel during the device boot so that it becomes jailbroken after each successive reboot?

Options:

A.  

Tethered jailbreaking

B.  

Semi-tethered jailbreaking

C.  

Untethered jailbreaking

D.  

Semi-Untethered jailbreaking

Discussion 0
Questions 68

Which method of password cracking takes the most time and effort?

Options:

A.  

Dictionary attack

B.  

Shoulder surfing

C.  

Rainbow tables

D.  

Brute force

Discussion 0
Questions 69

A newly joined employee. Janet, has been allocated an existing system used by a previous employee. Before issuing the system to Janet, it was assessed by Martin, the administrator. Martin found that there were possibilities of compromise through user directories, registries, and other system parameters. He also Identified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors. What is the type of vulnerability assessment performed by Martin?

Options:

A.  

Credentialed assessment

B.  

Database assessment

C.  

Host-based assessment

D.  

Distributed assessment

Discussion 0
Questions 70

What would you enter if you wanted to perform a stealth scan using Nmap?

Options:

A.  

nmap -sM

B.  

nmap -sU

C.  

nmap -sS

D.  

nmap -sT

Discussion 0
Questions 71

Which wireless security protocol replaces the personal pre-shared key (PSK) authentication with Simultaneous Authentication of Equals (SAE) and is therefore resistant to offline dictionary attacks?

Options:

A.  

WPA3-Personal

B.  

WPA2-Enterprise

C.  

Bluetooth

D.  

ZigBee

Discussion 0
Questions 72

Ricardo has discovered the username for an application in his targets environment. As he has a limited amount of time, he decides to attempt to use a list of common passwords he found on the Internet. He compiles them into a list and then feeds that list as an argument into his password-cracking application, what type of attack is Ricardo performing?

Options:

A.  

Known plaintext

B.  

Password spraying

C.  

Brute force

D.  

Dictionary

Discussion 0
Questions 73

Study the snort rule given below and interpret the rule:

alert tcp any any --> 192.168.1.0/24 111 (content:"|00 01 86 a5|"; msg: "mountd access";)

Options:

A.  

An alert is generated when a TCP packet is generated from any IP on the 192.168.1.0 subnet and destined to any IP on port 111

B.  

An alert is generated when any packet other than a TCP packet is seen on the network and destined for the 192.168.1.0 subnet

C.  

An alert is generated when a TCP packet is originated from port 111 of any IP address to the 192.168.1.0 subnet

D.  

An alert is generated when a TCP packet originating from any IP address is seen on the network and destined for any IP address on the 192.168.1.0 subnet on port 111

Discussion 0
Questions 74

What is correct about digital signatures?

Options:

A.  

A digital signature cannot be moved from one signed document to another because it is the hash of the original document encrypted with the private key of the signing party.

B.  

Digital signatures may be used in different documents of the same type.

C.  

A digital signature cannot be moved from one signed document to another because it is a plain hash of the document content.

D.  

Digital signatures are issued once for each user and can be used everywhere until they expire.

Discussion 0
Questions 75

Windows LAN Manager (LM) hashes are known to be weak.

Which of the following are known weaknesses of LM? (Choose three.)

Options:

A.  

Converts passwords to uppercase.

B.  

Hashes are sent in clear text over the network.

C.  

Makes use of only 32-bit encryption.

D.  

Effective length is 7 characters.

Discussion 0
Questions 76

You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist’s email, and you send her an email changing the source email to her boss’s email (boss@company). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don’t work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What testing method did you use?

Options:

A.  

Social engineering

B.  

Piggybacking

C.  

Tailgating

D.  

Eavesdropping

Discussion 0
Questions 77

Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory.

What kind of attack is Susan carrying on?

Options:

A.  

A sniffing attack

B.  

A spoofing attack

C.  

A man-in-the-middle attack

D.  

A denial of service attack

Discussion 0
Questions 78

Robert, a professional hacker, is attempting to execute a fault injection attack on a target IoT device. In this process, he injects faults into the power supply that can be used for remote execution, also causing the skipping of key instructions. He also injects faults into the clock network used for delivering a synchronized signal across the chip.

Which of the following types of fault injection attack is performed by Robert in the above scenario?

Options:

A.  

Frequency/voltage tampering

B.  

Optical, electromagnetic fault injection (EMFI)

C.  

Temperature attack

D.  

Power/clock/reset glitching

Discussion 0
Questions 79

An LDAP directory can be used to store information similar to a SQL database. LDAP uses a _____ database structure instead of SQL’s _____ structure. Because of this, LDAP has difficulty representing many-to-one relationships.

Options:

A.  

Relational, Hierarchical

B.  

Strict, Abstract

C.  

Hierarchical, Relational

D.  

Simple, Complex

Discussion 0
Questions 80

Joel, a professional hacker, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a malicious script that can redirect users from the web page and download malware onto a victim's machine. Joel waits for the victim to access the infected web application so as to compromise the victim's machine. Which of the following techniques is used by Joel in the above scenario?

Options:

A.  

DNS rebinding attack

B.  

Clickjacking attack

C.  

MarioNet attack

D.  

Watering hole attack

Discussion 0
Questions 81

Jason, an attacker, targeted an organization to perform an attack on its Internet-facing web server with the intention of gaining access to backend servers, which are protected by a firewall. In this process, he used a URL https://xyz.com/feed.php?url:externaIsile.com/feed/to to obtain a remote feed and altered the URL input to the local host to view all the local resources on the target server. What is the type of attack Jason performed In the above scenario?

Options:

A.  

website defacement

B.  

Server-side request forgery (SSRF) attack

C.  

Web server misconfiguration

D.  

web cache poisoning attack

Discussion 0
Questions 82

A company’s Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application.

What kind of Web application vulnerability likely exists in their software?

Options:

A.  

Cross-site scripting vulnerability

B.  

SQL injection vulnerability

C.  

Web site defacement vulnerability

D.  

Gross-site Request Forgery vulnerability

Discussion 0
Questions 83

You are a cybersecurity consultant for a healthcare organization that utilizes Internet of Medical Things (loMT) devices, such as connected insulin pumps and heart rate monitors, to provide improved patientcare. Recently, the organization has been targeted by ransomware attacks. While the IT infrastructure was unaffected due to robust security measures, they are worried that the loMT devices could be potential entry points for future

attacks. What would be your main recommendation to protect these devices from such threats?

Options:

A.  

Implement multi-factor authentication for all loMT devices.

B.  

Disable all wireless connectivity on loMT devices.

C.  

Use network segmentation to isolate loMT devices from the main network.

D.  

Regularly change the IP addresses of all loMT devices.

Discussion 0
Questions 84

You are using a public Wi-Fi network inside a coffee shop. Before surfing the web, you use your VPN to prevent intruders from sniffing your traffic. If you did not have a VPN, how would you identify whether someone is performing an ARP spoofing attack on your laptop?

Options:

A.  

You should check your ARP table and see if there is one IP address with two different MAC addresses.

B.  

You should scan the network using Nmap to check the MAC addresses of all the hosts and look for duplicates.

C.  

You should use netstat to check for any suspicious connections with another IP address within the LAN.

D.  

You cannot identify such an attack and must use a VPN to protect your traffic, r

Discussion 0
Questions 85

To invisibly maintain access to a machine, an attacker utilizes a toolkit that sits undetected In the core components of the operating system. What is this type of rootkit an example of?

Options:

A.  

Mypervisor rootkit

B.  

Kernel toolkit

C.  

Hardware rootkit

D.  

Firmware rootkit

Discussion 0
Questions 86

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?

Options:

A.  

Residual risk

B.  

Impact risk

C.  

Deferred risk

D.  

Inherent risk

Discussion 0
Questions 87

What tool can crack Windows SMB passwords simply by listening to network traffic?

Options:

A.  

This is not possible

B.  

Netbus

C.  

NTFSDOS

D.  

L0phtcrack

Discussion 0
Questions 88

You start performing a penetration test against a specific website and have decided to start by grabbing all the links from the main page.

What is the best Linux pipe to achieve your milestone?

Options:

A.  

dirb https://site.com | grep "site"

B.  

curl -s https://site.com | grep '

D.  

wget https://site.com | cut -d "http"

Questions 89

Kevin, an encryption specialist, implemented a technique that enhances the security of keys used for encryption and authentication. Using this technique, Kevin input an initial key to an algorithm that generated an enhanced key that is resistant to brute-force attacks. What is the technique employed by Kevin to improve the security of encryption keys?

Options:

A.  

Key derivation function

B.  

Key reinstallation

C.  

A Public key infrastructure

D.  

Key stretching

Discussion 0
Questions 90

what firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?

Options:

A.  

Decoy scanning

B.  

Packet fragmentation scanning

C.  

Spoof source address scanning

D.  

Idle scanning

Discussion 0
Questions 91

What kind of detection technique is used in antivirus software that collects data from multiple protected systems and performs analysis in a cloud-based environment?

Options:

A.  

VCloud based

B.  

Honeypot based

C.  

Behavior based

D.  

Heuristics based

Discussion 0
Questions 92

What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?

Options:

A.  

Copy the system files from a known good system

B.  

Perform a trap and trace

C.  

Delete the files and try to determine the source

D.  

Reload from a previous backup

E.  

Reload from known good media

Discussion 0
Questions 93

John is an incident handler at a financial institution. His steps in a recent incident are not up to the standards of the company. John frequently forgets some steps and procedures while handling responses as they are very stressful to perform. Which of the following actions should John take to overcome this problem with the least administrative effort?

Options:

A.  

Create an incident checklist.

B.  

Select someone else to check the procedures.

C.  

Increase his technical skills.

D.  

Read the incident manual every time it occurs.

Discussion 0
Questions 94

You have been hired as an intern at a start-up company. Your first task is to help set up a basic web server for the company’s new website. The team leader has asked you to make sure the server is secure from common - threats. Based on your knowledge from studying for the CEH exam, which of the following actions should be

your priority to secure the web server?

Options:

A.  

Installing a web application firewall

B.  

limiting the number of concurrent connections to the server

C.  

Encrypting the company’s website with SSL/TLS

D.  

Regularly updating and patching the server software

Discussion 0
Questions 95

A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named "nc." The FTP server's access logs show that the anonymous user account logged in to the server, uploaded the files, and extracted the contents of the tarball and ran the script using a function provided by the FTP server's software. The “ps” command shows that the “nc” file is running as process, and the netstat command shows the “nc” process is listening on a network port.

What kind of vulnerability must be present to make this remote attack possible?

Options:

A.  

File system permissions

B.  

Privilege escalation

C.  

Directory traversal

D.  

Brute force login

Discussion 0
Questions 96

Your network infrastructure is under a SYN flood attack. The attacker has crafted an automated botnet to

simultaneously send 's' SYN packets per second to the server. You have put measures in place to manage ‘f

SYN packets per second, and the system is designed to deal with this number without any performance issues.

If 's' exceeds ‘f', the network infrastructure begins to show signs of overload. The system's response time

increases exponentially (24k), where 'k' represents each additional SYN packet above the ff limit. Now, considering 's=500' and different 'f values, in which scenario is the server most likely to experience overload and significantly increased response times?

Options:

A.  

f=510: The server can handle 510 SYN packets per second, which is greater than what the attacker is sending. The system stays stable, and the response time remains unaffected

B.  

f=495: The server can handle 495 SYN packets per second. The response time drastically rises (245 = 32 times the normal), indicating a probable system overload

C.  

f=S05: The server can handle 505 SYN packets per second. In this case, the response time increases but not as drastically (245 = 32 times the normal), and the systern might still function, albeit slowly

D.  

f=420: The server can handle 490 SYN packets per second. With 's' exceeding ‘f by 10, the response time shoots up (2410 = 1024 times the usual response time), indicating a system overload

Discussion 0
Questions 97

Which definition among those given below best describes a covert channel?

Options:

A.  

A server program using a port that is not well known.

B.  

Making use of a protocol in a way it is not intended to be used.

C.  

It is the multiplexing taking place on a communication link.

D.  

It is one of the weak channels used by WEP which makes it insecure

Discussion 0
Questions 98

During the process of encryption and decryption, what keys are shared?

Options:

A.  

Private keys

B.  

User passwords

C.  

Public keys

D.  

Public and private keys

Discussion 0
Questions 99

Calvin, a grey-hat hacker, targets a web application that has design flaws in its authentication mechanism. He enumerates usernames from the login form of the web application, which requests users to feed data and specifies the incorrect field in case of invalid credentials. Later, Calvin uses this information to perform social engineering.

Which of the following design flaws in the authentication mechanism is exploited by Calvin?

Options:

A.  

Insecure transmission of credentials

B.  

Verbose failure messages

C.  

User impersonation

D.  

Password reset mechanism

Discussion 0
Questions 100

Annie, a cloud security engineer, uses the Docker architecture to employ a client/server model in the application she is working on. She utilizes a component that can process API requests and handle various Docker objects, such as containers, volumes. Images, and networks. What is the component of the Docker architecture used by Annie in the above scenario?

Options:

A.  

Docker client

B.  

Docker objects

C.  

Docker daemon

D.  

Docker registries

Discussion 0
Questions 101

You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?

Options:

A.  

hping2 host.domain.com

B.  

hping2 --set-ICMP host.domain.com

C.  

hping2 -i host.domain.com

D.  

hping2 -1 host.domain.com

Discussion 0
Questions 102

The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?

Options:

A.  

Network Sniffer

B.  

Vulnerability Scanner

C.  

Intrusion Prevention Server

D.  

Security Information and Event Monitoring (SIEM)

Discussion 0
Questions 103

Which type of security feature stops vehicles from crashing through the doors of a building?

Options:

A.  

Bollards

B.  

Receptionist

C.  

Mantrap

D.  

Turnstile

Discussion 0
Questions 104

Yancey is a network security administrator for a large electric company. He becomes disgruntled after learning that he will be laid off and decides to sabotage the company by placing logic bombs, backdoors, and other malware in the system. He does not care if his actions lead to jail time.

What would Yancey be considered?

Options:

A.  

Yancey would be considered a Suicide Hacker

B.  

Since he does not care about going to jail, he would be considered a Black Hat

C.  

Because Yancey works for the company currently; he would be a White Hat

D.  

Yancey is a Hacktivist Hacker since he is standing up to a company that is downsizing

Discussion 0
Questions 105

If you send a TCP ACK segment to a known closed port on a firewall but it does not respond with an RST, what do you know about the firewall you are scanning?

Options:

A.  

There is no firewall in place.

B.  

This event does not tell you anything about the firewall.

C.  

It is a stateful firewall

D.  

It is a non-stateful firewall.

Discussion 0
Questions 106

A pen tester is configuring a Windows laptop for a test. In setting up Wireshark, what driver and library are required to allow the NIC to work in promiscuous mode?

Options:

A.  

Libpcap

B.  

Awinpcap

C.  

Winprom

D.  

WinPcap

Discussion 0
Questions 107

What is the role of test automation in security testing?

Options:

A.  

It is an option but it tends to be very expensive.

B.  

It should be used exclusively. Manual testing is outdated because of low speed and possible test setup inconsistencies.

C.  

Test automation is not usable in security due to the complexity of the tests.

D.  

It can accelerate benchmark tests and repeat them with a consistent test setup. But it cannot replace manual testing completely.

Discussion 0
Questions 108

As a cybersecurity professional, you are responsible for securing a high-traffic web application that uses MySQL as its backend database. Recently, there has been a surge of unauthorized login attempts, and you suspect that a seasoned black-hat hacker is behind them. This hacker has shown proficiency in SQL Injection and

appears to be using the 'UNION' SQL keyword to trick the login process into returning additional data.

However, your application's security measures include filtering special characters in user inputs, a method usually effective against such attacks. In this challenging environment, if the hacker still intends to exploit this SQL Injection vulnerability, which strategy is he most likely to employ?

Options:

A.  

The hacker alters his approach and injects a ‘DROP TABLE’ statement, a move that could potentially lead to the loss of vital data stored in the application's database

B.  

The hacker tries to manipulate the 'UNION' keyword in such a way that it triggers a database error, potentially revealing valuable information about the database's structure

C.  

The hacker switches tactics and resorts to a ‘time-based blind’ SQL Injection attack, which would force the application to delay its response, thereby revealing information based on the duration of the delay

D.  

The hacker attempts to bypass the special character filter by encoding his malicious input, which could potentially enable him to successfully inject damaging SQL queries

Discussion 0
Questions 109

Alice, a professional hacker, targeted an organization's cloud services. She infiltrated the targets MSP provider by sending spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud service. Further, she accessed the target customer profiles with her MSP account, compressed the customer data, and stored them in the MSP. Then, she used this information to launch further attacks on the target organization. Which of the following cloud attacks did Alice perform in the above scenario?

Options:

A.  

Cloud hopper attack

B.  

Cloud cryptojacking

C.  

Cloudborne attack

D.  

Man-in-the-cloud (MITC) attack

Discussion 0
Questions 110

A security analyst uses Zenmap to perform an ICMP timestamp ping scan to acquire information related to the current time from the target host machine.

Which of the following Zenmap options must the analyst use to perform the ICMP timestamp ping scan?

Options:

A.  

-PY

B.  

-PU

C.  

-PP

D.  

-Pn

Discussion 0
Questions 111

An ethical hacker is hired to conduct a comprehensive network scan of a large organization that strongly suspects potential intrusions into their internal systems. The hacker decides to employ a combination of scanning tools to obtain a detailed understanding of the network. Which sequence of actions would provide the most comprehensive information about the network's status?

Options:

A.  

Initiate with Nmap for a ping sweep, then use Metasploit to scan for open ports and services, and finally use Hping3 to perform remote OS fingerprinting

B.  

Use Hping3 for an ICMP ping scan on the entire subnet, then use Nmap for a SYN scan on identified active hosts, and finally use Metasploit to exploit identified vulnerabilities

C.  

Start with Hping3 for a UDP scan on random ports, then use Nmap for a version detection scan, and finally use Metasploit to exploit detected vulnerabilities

D.  

Begin with NetScanTools Pro for a general network scan, then use Nmap for OS detection and version detection, and finally perform an SYN flooding with Hping3

Discussion 0
Questions 112

Why should the security analyst disable/remove unnecessary ISAPI filters?

Options:

A.  

To defend against social engineering attacks

B.  

To defend against webserver attacks

C.  

To defend against jailbreaking

D.  

To defend against wireless attacks

Discussion 0
Questions 113

A large e-commerce organization is planning to implement a vulnerability assessment solution to enhance its security posture. They require a solution that imitates the outside view of attackers, performs well-organized inference-based testing, scans automatically against continuously updated databases, and supports multiple networks. Given these requirements, which type of vulnerability assessment solution would be most appropriate?

Options:

A.  

Inference-based assessment solution

B.  

Service-based solution offered by an auditing firm

C.  

Tree-based assessment approach

D.  

Product-based solution installed on a private network

Discussion 0
Questions 114

Under what conditions does a secondary name server request a zone transfer from a primary name server?

Options:

A.  

When a primary SOA is higher than a secondary SOA

B.  

When a secondary SOA is higher than a primary SOA

C.  

When a primary name server has had its service restarted

D.  

When a secondary name server has had its service restarted

E.  

When the TTL falls to zero

Discussion 0
Questions 115

Given below are different steps involved in the vulnerability-management life cycle:

Remediation

Identify assets and create a baseline

Verification

Monitor

Vulnerability scan

Risk assessment

Identify the correct sequence of steps involved in vulnerability management.

Options:

A.  

2 → 5 → 6 → 1 → 3 → 4

B.  

2 → 1 → 5 → 6 → 4 → 3

C.  

2 → 4 → 5 → 3 → 6 → 1

D.  

1 → 2 → 3 → 4 → 5 → 6

Discussion 0
Questions 116

Rebecca, a security professional, wants to authenticate employees who use web services for safe and secure communication. In this process, she employs a component of the Web Service Architecture, which is an extension of SOAP, and it can maintain the integrity and confidentiality of SOAP messages.

Which of the following components of the Web Service Architecture is used by Rebecca for securing the communication?

Options:

A.  

WSDL

B.  

WS Work Processes

C.  

WS-Policy

D.  

WS-Security

Discussion 0
Questions 117

Sam is working as a system administrator In an organization. He captured the principal characteristics of a vulnerability and produced a numerical score to reflect Its severity using CVSS v3.0 to property assess and prioritize the organization's vulnerability management processes. The base score that Sam obtained after performing cvss rating was 4.0. What is the CVSS severity level of the vulnerability discovered by Sam in the above scenario?

Options:

A.  

Medium

B.  

Low

C.  

Critical

D.  

High

Discussion 0
Questions 118

An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victim’s profile to a text file and then submit the data to the attacker’s database.

< iframe src=““http://www.vulnweb.com/updateif.php”” style=““display:none”” > < /iframe >

What is this type of attack (that can use either HTTP GET or HTTP POST) called?

Options:

A.  

Browser Hacking

B.  

Cross-Site Scripting

C.  

SQL Injection

D.  

Cross-Site Request Forgery

Discussion 0
Questions 119

Which results will be returned with the following Google search query?

site:target.com –site:Marketing.target.com accounting

Options:

A.  

Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting.

B.  

Results matching all words in the query.

C.  

Results for matches on target.com and Marketing.target.com that include the word “accounting”

D.  

Results matching “accounting” in domain target.com but not on the site Marketing.target.com

Discussion 0
Questions 120

Which of the following web vulnerabilities would an attacker be attempting to exploit if they delivered the following input?

Options:

A.  

XXE

B.  

SQLi

C.  

IDOR

D.  

XSS

Discussion 0
Questions 121

Gregory, a professional penetration tester working at Sys Security Ltd., is tasked with performing a security test of web applications used in the company. For this purpose, Gregory uses a tool to test for any security loopholes by hijacking a session between a client and server. This tool has a feature of intercepting proxy that can be used to inspect and modify the traffic between the browser and target application. This tool can also perform customized attacks and can be used to test the randomness of session tokens. Which of the following tools is used by Gregory in the above scenario?

Options:

A.  

Nmap

B.  

Burp Suite

C.  

CxSAST

D.  

Wireshark

Discussion 0
Questions 122

Ron, a security professional, was pen testing web applications and SaaS platforms used by his company. While testing, he found a vulnerability that allows hackers to gain unauthorized access to API objects and perform actions such as view, update, and delete sensitive data of the company. What is the API vulnerability revealed in the above scenario?

Options:

A.  

Code injections

B.  

Improper use of CORS

C.  

No ABAC validation

D.  

Business logic flaws

Discussion 0
Questions 123

Boney, a professional hacker, targets an organization for financial benefits. He performs an attack by sending his session ID using an MITM attack technique. Boney first obtains a valid session ID by logging into a service and later feeds the same session 10 to the target employee. The session ID links the target employee to Boneys account page without disclosing any information to the victim. When the target employee clicks on the link, all the sensitive payment details entered in a form are linked to Boneys account. What is the attack performed by Boney in the above scenario?

Options:

A.  

Session donation attack

B.  

Session fixation attack

C.  

Forbidden attack

D.  

CRIME attack

Discussion 0
Questions 124

As a security analyst for Sky Secure Inc., you are working with a client that uses a multi-cloud strategy, utilizing services from several cloud providers. The client wants to implement a system that will provide unified security management across all their cloud platforms. They need a solution that allows them to consistently enforce security policies, identify and respond to threats, and maintain visibility of all their cloud resources. Which of the following should you recommend as the best solution?

Options:

A.  

Use a hardware-based firewall to secure all cloud resources.

B.  

implement separate security management tools for each cloud platform.

C.  

Use a Cloud Access Security Broker (CASB).

D.  

Rely on the built-in security features of each cloud platform.

Discussion 0
Questions 125

DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?

Options:

A.  

Spanning tree

B.  

Dynamic ARP Inspection (DAI)

C.  

Port security

D.  

Layer 2 Attack Prevention Protocol (LAPP)

Discussion 0
Questions 126

An attacker decided to crack the passwords used by industrial control systems. In this process, he employed a loop strategy to recover these passwords. He used one character at a time to check whether the first character entered is correct; if so, he continued the loop for consecutive characters. If not, he terminated the loop. Furthermore, the attacker checked how much time the device took to finish one complete password authentication process, through which he deduced how many characters entered are correct.

What is the attack technique employed by the attacker to crack the passwords of the industrial control systems?

Options:

A.  

Side-channel attack

B.  

Denial-of-service attack

C.  

HMI-based attack

D.  

Buffer overflow attack

Discussion 0
Questions 127

what is the correct way of using MSFvenom to generate a reverse TCP shellcode for windows?

Options:

A.  

msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f c

B.  

msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f c

C.  

msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe

D.  

msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe

Discussion 0
Questions 128

Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed.

What is the port scanning technique used by Sam to discover open ports?

Options:

A.  

Xmas scan

B.  

IDLE/IPID header scan

C.  

TCP Maimon scan

D.  

ACK flag probe scan

Discussion 0
Questions 129

A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not responding to the association requests being sent by the wireless client. What is a possible source of this problem?

Options:

A.  

The WAP does not recognize the client’s MAC address

B.  

The client cannot see the SSID of the wireless network

C.  

Client is configured for the wrong channel

D.  

The wireless client is not configured to use DHCP

Discussion 0
Questions 130

Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?

Options:

A.  

To determine who is the holder of the root account

B.  

To perform a DoS

C.  

To create needless SPAM

D.  

To illicit a response back that will reveal information about email servers and how they treat undeliverable mail

E.  

To test for virus protection

Discussion 0
Questions 131

Which of the following describes the characteristics of a Boot Sector Virus?

Options:

A.  

Modifies directory table entries so that directory entries point to the virus code instead of the actual program.

B.  

Moves the MBR to another location on the RAM and copies itself to the original location of the MBR.

C.  

Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR.

D.  

Overwrites the original MBR and only executes the new virus code.

Discussion 0
Questions 132

jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However. Jane has a long, complex password on her router. What attack has likely occurred?

Options:

A.  

Wireless sniffing

B.  

Piggybacking

C.  

Evil twin

D.  

Wardriving

Discussion 0
Questions 133

Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches.

If these switches' ARP cache is successfully flooded, what will be the result?

Options:

A.  

The switches will drop into hub mode if the ARP cache is successfully flooded.

B.  

If the ARP cache is flooded, the switches will drop into pix mode making it less susceptible to attacks.

C.  

Depending on the switch manufacturer, the device will either delete every entry in its ARP cache or reroute packets to the nearest switch.

D.  

The switches will route all traffic to the broadcast address created collisions.

Discussion 0
Questions 134

An attacker scans a host with the below command. Which three flags are set?

# nmap -sX host.domain.com

Options:

A.  

This is SYN scan. SYN flag is set.

B.  

This is Xmas scan. URG, PUSH and FIN are set.

C.  

This is ACK scan. ACK flag is set.

D.  

This is Xmas scan. SYN and ACK flags are set.

Discussion 0
Questions 135

You are a security officer of a company. You had an alert from IDS that indicates that one PC on your Intranet is connected to a blacklisted IP address (C2 Server) on the Internet. The IP address was blacklisted just before the alert. You are starting an investigation to roughly analyze the severity of the situation. Which of the following is appropriate to analyze?

Options:

A.  

IDS log

B.  

Event logs on domain controller

C.  

Internet Firewall/Proxy log

D.  

Event logs on the PC

Discussion 0
Questions 136

Which of the following is the primary objective of a rootkit?

Options:

A.  

It opens a port to provide an unauthorized service

B.  

It creates a buffer overflow

C.  

It replaces legitimate programs

D.  

It provides an undocumented opening in a program

Discussion 0
Questions 137

A penetration tester is tasked with gathering information about the subdomains of a target organization's website. The tester needs a versatile and efficient solution for the task. Which of the following options would be the most effective method to accomplish this goal?

Options:

A.  

Employing a tool like Sublist3r, which is designed to enumerate the subdomains of websites using OSINT

B.  

Analyzing Linkedin profiles to find employees of the target company and their job titles

C.  

Utilizing the Harvester tool to extract email addresses related to the target domain using a search engine like Google or Bing

D.  

Using a people search service, such as Spokeo or Intelius, to gather information about the employees of the target organization

Discussion 0
Questions 138

Peter, a system administrator working at a reputed IT firm, decided to work from his home and login remotely. Later, he anticipated that the remote connection could be exposed to session hijacking. To curb this possibility, he implemented a technique that creates a safe and encrypted tunnel over a public network to securely send and receive sensitive information and prevent hackers from decrypting the data flow between the endpoints.

What is the technique followed by Peter to send files securely through a remote connection?

Options:

A.  

DMZ

B.  

SMB signing

C.  

VPN

D.  

Switch network

Discussion 0
Questions 139

Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students.

He identified this when the IDS alerted for malware activities in the network. What should Bob do to avoid this problem?

Options:

A.  

Disable unused ports in the switches

B.  

Separate students in a different VLAN

C.  

Use the 802.1x protocol

D.  

Ask students to use the wireless network

Discussion 0
Questions 140

MX record priority increases as the number increases. (True/False.)

Options:

A.  

True

B.  

False

Discussion 0
Questions 141

Take a look at the following attack on a Web Server using obstructed URL:

Take a look at the following attack on a Web Server using an obfuscated URL:

How would you protect from these attacks?

Options:

A.  

Configure the Web Server to deny requests involving "hex encoded" characters

B.  

Create rules in IDS to alert on strange Unicode requests

C.  

Use SSL authentication on Web Servers

D.  

Enable Active Scripts Detection at the firewall and routers

Discussion 0
Questions 142

A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which of the following has occurred?

Options:

A.  

The computer is not using a private IP address.

B.  

The gateway is not routing to a public IP address.

C.  

The gateway and the computer are not on the same network.

D.  

The computer is using an invalid IP address.

Discussion 0
Questions 143

What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?

Options:

A.  

 Session hijacking

B.  

 Firewalking

C.  

 Man-in-the-middle attack

D.  

 Network sniffing

Discussion 0
Questions 144

ping - * 6 192.168.0.101

Output:

Pinging 192.168.0.101 with 32 bytes of data:

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

...

Packets: Sent = 6, Received = 6, Lost = 0 (0% loss)

What does the option * indicate?

Options:

A.  

t

B.  

s

C.  

a

D.  

n

Discussion 0
Questions 145

Which of the following is considered an exploit framework and has the ability to perform automated attacks on services, ports, applications and unpatched security flaws in a computer system?

Options:

A.  

Wireshark

B.  

Maltego

C.  

Metasploit

D.  

Nessus

Discussion 0
Questions 146

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as?

Options:

A.  

Exploration

B.  

Investigation

C.  

Reconnaissance

D.  

Enumeration

Discussion 0
Questions 147

Firewalk has just completed the second phase (the scanning phase), and a technician receives the output shown below. What conclusions can be drawn based on these scan results?

TCP port 21 no response

TCP port 22 no response

TCP port 23 Time-to-live exceeded

Options:

A.  

The lack of response from ports 21 and 22 indicate that those services are not running on the destination server

B.  

The scan on port 23 was able to make a connection to the destination host prompting the firewall to respond with a TTL error

C.  

The scan on port 23 passed through the filtering device. This indicates that port 23 was not blocked at the firewall

D.  

The firewall itself is blocking ports 21 through 23 and a service is listening on port 23 of the target host

Discussion 0
Questions 148

CyberTech Inc. recently experienced SQL injection attacks on its official website. The company appointed Bob, a security professional, to build and incorporate defensive strategies against such attacks. Bob adopted a practice whereby only a list of entities such as the data type, range, size, and value, which have been approved for secured access, is accepted. What is the defensive technique employed by Bob in the above scenario?

Options:

A.  

Output encoding

B.  

Enforce least privileges

C.  

Whitelist validation

D.  

Blacklist validation

Discussion 0
Questions 149

How can rainbow tables be defeated?

Options:

A.  

Use of non-dictionary words

B.  

All uppercase character passwords

C.  

Password salting

D.  

Lockout accounts under brute force password cracking attempts

Discussion 0
Questions 150

What port number is used by LDAP protocol?

Options:

A.  

110

B.  

389

C.  

464

D.  

445

Discussion 0
Questions 151

Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days, Bab denies that he had ever sent a mail. What do you want to ““know”” to prove yourself that it was Bob who had send a mail?

Options:

A.  

Non-Repudiation

B.  

Integrity

C.  

Authentication

D.  

Confidentiality

Discussion 0
Questions 152

During a recent vulnerability assessment of a major corporation's IT systems, the security team identified several potential risks. They want to use a vulnerability scoring system to quantify and prioritize these vulnerabilities. They decide to use the Common Vulnerability Scoring System (CVSS). Given the characteristics of the identified vulnerabilities, which of the following statements is the most accurate regarding the metric

types used by CVSS to measure these vulnerabilities?

Options:

A.  

Temporal metric represents the inherent qualities of a vulnerability

B.  

Base metric represents the inherent qualities of a vulnerability

C.  

Environmental metric involves the features that change during the lifetime of the vulnerability

D.  

Temporal metric involves measuring vulnerabilities based on a_ specific environment or implementation

Discussion 0
Questions 153

Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is encrypted. What is the name of the command used by SMTP to transmit email over TLS?

Options:

A.  

OPPORTUNISTICTLS

B.  

UPGRADETLS

C.  

FORCETLS

D.  

STARTTLS

Discussion 0
Questions 154

These hackers have limited or no training and know how to use only basic techniques or tools. What kind of hackers are we talking about?

Options:

A.  

Black-Hat Hackers

B.  

Script Kiddies

C.  

White-Hat Hackers

D.  

Gray-Hat Hackers

Discussion 0
Questions 155

which type of virus can change its own code and then cipher itself multiple times as it replicates?

Options:

A.  

Stealth virus

B.  

Tunneling virus

C.  

Cavity virus

D.  

Encryption virus

Discussion 0
Questions 156

What is the purpose of a DNS AAAA record?

Options:

A.  

Authorization, Authentication and Auditing record

B.  

Address prefix record

C.  

Address database record

D.  

IPv6 address resolution record

Discussion 0
Questions 157

Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

Options:

A.  

113

B.  

69

C.  

123

D.  

161

Discussion 0
Questions 158

In order to tailor your tests during a web-application scan, you decide to determine which web-server version is hosting the application. On using the sV flag with Nmap. you obtain the following response:

80/tcp open http-proxy Apache Server 7.1.6

what Information-gathering technique does this best describe?

Options:

A.  

WhOiS lookup

B.  

Banner grabbing

C.  

Dictionary attack

D.  

Brute forcing

Discussion 0
Questions 159

Nicolas just found a vulnerability on a public-facing system that is considered a zero-day vulnerability. He sent an email to the owner of the public system describing the problem and how the owner can protect themselves from that vulnerability. He also sent an email to Microsoft informing them of the problem that their systems are exposed to. What type of hacker is Nicolas?

Options:

A.  

Red hat

B.  

white hat

C.  

Black hat

D.  

Gray hat

Discussion 0
Questions 160

You're the security manager for a tech company that uses a database to store sensitive customer data. You have implemented countermeasures against SQL injection attacks. Recently, you noticed some suspicious

activities and suspect an attacker is using SQL injection techniques. The attacker is believed to use different forms of payloads in his SQL queries. In the case of a successful SQL injection attack, which of the following

payloads would have the most significant impact?

Options:

A.  

‘OR 'T="1: This payload manipulates the WHERE clause of an SQL statement, allowing the attacker to view unauthorized data

B.  

‘OR username LIKE '%: This payload uses the LIKE operator to search for a specific pattern in a column

C.  

OR ‘a’='a; DROP TABLE members; --: This payload combines the manipulation of the WHERE clausewith a destructive action, causing data loss

D.  

UNION SELECT NULL, NULL, NULL -- : This payload manipulates the UNION SQL operator, enabling the attacker to retrieve data from different database tables

Discussion 0
Questions 161

Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"?

Options:

A.  

Overloading Port Address Translation

B.  

Dynamic Port Address Translation

C.  

Dynamic Network Address Translation

D.  

Static Network Address Translation

Discussion 0
Questions 162

Attacker Simon targeted the communication network of an organization and disabled the security controls of NetNTLMvl by modifying the values of LMCompatibilityLevel, NTLMMinClientSec, and RestrictSendingNTLMTraffic. He then extracted all the non-network logon tokens from all the active processes to masquerade as a legitimate user to launch further attacks. What is the type of attack performed by Simon?

Options:

A.  

Internal monologue attack

B.  

Combinator attack

C.  

Rainbow table attack

D.  

Dictionary attack

Discussion 0
Questions 163

Bella, a security professional working at an it firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames. and passwords are shared In plaintext, paving the way for hackers 10 perform successful session hijacking. To address this situation. Bella Implemented a protocol that sends data using encryption and digital certificates. Which of the following protocols Is used by Bella?

Options:

A.  

FTP

B.  

HTTPS

C.  

FTPS

D.  

IP

Discussion 0
Questions 164

An attacker can employ many methods to perform social engineering against unsuspecting employees, including scareware.

What is the best example of a scareware attack?

Options:

A.  

A pop-up appears to a user stating, "You have won a free cruise! Click here to claim your prize!"

B.  

A banner appears to a user stating, "Your account has been locked. Click here to reset your password and unlock your account."

C.  

A banner appears to a user stating, "Your Amazon order has been delayed. Click here to find out your new delivery date."

D.  

A pop-up appears to a user stating, "Your computer may have been infected with spyware. Click here to install an anti-spyware tool to resolve this issue."

Discussion 0
Questions 165

What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stacheldraht have in common?

Options:

A.  

All are hacking tools developed by the Legion of Doom

B.  

All are tools that can be used not only by hackers, but also security personnel

C.  

All are DDOS tools

D.  

All are tools that are only effective against Windows

E.  

All are tools that are only effective against Linux

Discussion 0
Questions 166

Which of the following LM hashes represent a password of less than 8 characters? (Choose two.)

Options:

A.  

BA810DBA98995F1817306D272A9441BB

B.  

44EFCE164AB921CQAAD3B435B51404EE

C.  

0182BD0BD4444BF836077A718CCDF409

D.  

CEC52EB9C8E3455DC2265B23734E0DAC

E.  

B757BF5C0D87772FAAD3B435B51404EE

F.  

E52CAC67419A9A224A3B108F3FA6CB6D

Discussion 0
Questions 167

You are a penetration tester tasked with testing the wireless network of your client Brakeme SA. You are attempting to break into the wireless network with the SSID "Brakeme-lnternal." You realize that this network uses WPA3 encryption, which of the following vulnerabilities is the promising to exploit?

Options:

A.  

Dragonblood

B.  

Cross-site request forgery

C.  

Key reinstallation attack

D.  

AP Myconfiguration

Discussion 0
Questions 168

Jacob works as a system administrator in an organization. He wants to extract the source code of a mobile application and disassemble the application to analyze its design flaws. Using this technique, he wants to fix any bugs in the application, discover underlying vulnerabilities, and improve defense strategies against attacks.

What is the technique used by Jacob in the above scenario to improve the security of the mobile application?

Options:

A.  

Reverse engineering

B.  

App sandboxing

C.  

Jailbreaking

D.  

Social engineering

Discussion 0
Questions 169

What does the –oX flag do in an Nmap scan?

Options:

A.  

Perform an eXpress scan

B.  

Output the results in truncated format to the screen

C.  

Output the results in XML format to a file

D.  

Perform an Xmas scan

Discussion 0
Questions 170

Which tier in the N-tier application architecture is responsible for moving and processing data between the tiers?

Options:

A.  

Presentation tier

B.  

Application Layer

C.  

Logic tier

D.  

Data tier

Discussion 0