Pre-Summer Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Certified Ethical Hacker Exam (CEHv13) Question and Answers

Certified Ethical Hacker Exam (CEHv13)

Last Update Apr 15, 2026
Total Questions : 584

We are offering FREE 312-50v13 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare 312-50v13 free exam questions and then go for complete pool of Certified Ethical Hacker Exam (CEHv13) test questions that will help you more.

312-50v13 pdf

312-50v13 PDF

$36.75  $104.99
312-50v13 Engine

312-50v13 Testing Engine

$43.75  $124.99
312-50v13 PDF + Engine

312-50v13 PDF + Testing Engine

$57.75  $164.99
Questions 1

A penetration tester evaluates a company ' s secure web application, which uses HTTPS, secure cookie flags, and strict session management to prevent session hijacking. To bypass these protections and hijack a legitimate user ' s session without detection, which advanced technique should the tester employ?

Options:

A.  

Utilize a session fixation attack by forcing a known session ID during login

B.  

Perform a Cross-Site Scripting (XSS) attack to steal the session token

C.  

Exploit a timing side-channel vulnerability to predict session tokens

D.  

Implement a Man-in-the-Middle (MitM) attack by compromising a trusted certificate authority

Discussion 0
Questions 2

An ethical hacker needs to gather detailed information about a company ' s internal network without initiating any direct interaction that could be logged or raise suspicion. Which approach should be used to obtain this information covertly?

Options:

A.  

Analyze the company ' s SSL certificates for internal details

B.  

Examine email headers from past communications with the company

C.  

Inspect public WHOIS records for hidden network data

D.  

Utilize network scanning tools to map the company ' s IP range

Discussion 0
Questions 3

During a black-box internal penetration test, a security analyst identifies an SNMPv2-enabled Linux server using the default community string “public.” The analyst wants to enumerate running processes. Which Nmap command retrieves this information?

Options:

A.  

nmap -sU -p 161 --script snmp-sysdescr

B.  

nmap -sU -p 161 --script snmp-win32-services

C.  

nmap -sU -p 161 --script snmp-processes

D.  

nmap -sU -p 161 --script snmp-interfaces

Discussion 0
Questions 4

A regional law firm authorizes a wireless resilience evaluation after employees report intermittent connectivity disruptions in conference rooms. An ethical hacker assigned to the assessment analyses client behaviour while transmitting carefully crafted 802.11 management frames toward the organization ' s primary access point. Each transmission immediately causes several connected laptops to lose association with the network, requiring users to reconnect manually. Connectivity interruptions occur only when the crafted frames are sent. Identify the wireless attack illustrated by this activity.

Options:

A.  

Eavesdropping Attack

B.  

Jamming Attack

C.  

Evil Twin Attack

D.  

Deauthentication Attack

Discussion 0
Questions 5

During a security review for a healthcare provider in Denver, Colorado, Ava examines the header of a suspicious message to map the sender ' s outbound email infrastructure. Her goal is to identify which specific system on the sender ' s side processed the message so the team can understand where the transmission originated within that environment. Which detail from the email header should she examine to determine this?

Options:

A.  

Date and time of message sent

B.  

Sender ' s mail server

C.  

Sender ' s IP address

D.  

Authentication system used by sender ' s mail server

Discussion 0
Questions 6

During a penetration test for a global e-commerce platform in Dallas, ethical hacker Maria simulates a large-scale DoS campaign. Instead of sending attack traffic directly, she forges requests to multiple open services across the internet. These services unknowingly reply to the victim system, multiplying the amount of traffic hitting the target. Within minutes, the victim ' s server is overwhelmed by a flood of responses, even though Maria ' s own machine generated only a small amount of traffic.

Which attack technique is Maria most likely demonstrating?

Options:

A.  

Smurf Attack

B.  

Distributed Reflection Denial-of-Service (DRDoS)

C.  

Botnet

D.  

NTP Amplification Attack

Discussion 0
Questions 7

A penetration tester completes a vulnerability scan showing multiple low-risk findings and one high-risk vulnerability tied to outdated server software. What should the tester prioritize as the next step?

Options:

A.  

Perform a brute-force attack on the server to gain access

B.  

Ignore the high-risk vulnerability and proceed with testing other systems

C.  

Focus on exploiting the low-risk vulnerabilities first

D.  

Verify if the high-risk vulnerability is exploitable by checking for known exploits

Discussion 0
Questions 8

An attacker performs DNS cache snooping using dig +norecurse. The DNS server returns NOERROR but no answer. What does this indicate?

Options:

A.  

The domain has expired

B.  

The record was cached and returned

C.  

The DNS server failed

D.  

No recent client from that network accessed the domain

Discussion 0
Questions 9

In a bustling tech firm in Seattle, Michael, an ethical hacker, is conducting a security assessment to identify potential risks. During his evaluation, he notices that sensitive employee details and system configurations have been exposed through public forums, likely due to careless online behavior. His manager suspects this could lead to unauthorized access or data theft. As part of his testing, what type of threat should Michael focus on to simulate the adversary ' s method of gathering this exposed information?

Options:

A.  

Corporate Espionage

B.  

Social Engineering

C.  

System and Network Attacks

D.  

Information Leakage

Discussion 0
Questions 10

You are a cybersecurity analyst at a global banking corporation and suspect a backdoor attack due to abnormal outbound traffic during non-working hours, unexplained reboots, and modified system files. Which combination of measures would be most effective to accurately identify and neutralize the backdoor while ensuring system integrity?

Options:

A.  

Review firewall logs, analyze traffic, and immediately reboot systems

B.  

Monitor system and file activity, apply anomaly detection, and use advanced anti-malware tools

C.  

Enforce strong passwords, MFA, and regular vulnerability assessments

D.  

Apply ACLs, patch systems, and audit user privileges

Discussion 0
Questions 11

During a red team exercise at a technology consulting firm in San Francisco, analyst Evelyn deploys a malicious payload disguised within a software update installer. When the target runs the installer, the main application functions normally, but behind the scenes, additional malware components are silently placed on the system without the user ' s knowledge. These hidden components later activate to establish remote access for the red team.

Which technique was most likely used to deliver the hidden malware?

Options:

A.  

Downloader

B.  

Wrapper

C.  

Injector

D.  

Dropper

Discussion 0
Questions 12

A multinational corporation recently survived a severe Distributed Denial-of-Service (DDoS) attack and has implemented enhanced security measures. During an audit, you discover that the organization uses both hardware- and cloud-based solutions to distribute incoming traffic in order to absorb and mitigate DDoS attacks while ensuring legitimate traffic remains available. What type of DDoS mitigation strategy is the company utilizing?

Options:

A.  

Black Hole Routing

B.  

Load Balancing

C.  

Rate Limiting

D.  

Sinkholing

Discussion 0
Questions 13

During a black-box penetration test, an attacker runs the following command:

nmap -p25 --script smtp-enum-users --script-args EXPN,RCPT < target IP >

The script successfully returns multiple valid usernames. Which server misconfiguration is being exploited?

Options:

A.  

The SMTP server allows authentication without credentials

B.  

The SMTP server has disabled STARTTLS, allowing plaintext enumeration

C.  

SMTP user verification commands are exposed without restrictions

D.  

DNS MX records point to an internal mail relay

Discussion 0
Questions 14

An ethical hacker audits a hospital’s wireless network secured with WPA using TKIP and successfully performs packet injection and decryption attacks. Which WPA vulnerability most likely enabled this?

Options:

A.  

Use of weak Initialization Vectors (IVs)

B.  

Dependence on weak passwords

C.  

Lack of AES-based encryption

D.  

Predictable Group Temporal Key (GTK)

Discussion 0
Questions 15

During a stealth assessment, an attacker exploits intermittent delays in ARP responses from a target system. By injecting fake ARP replies before legitimate ones, the attacker temporarily redirects traffic to their own device, allowing intermittent packet capture. What type of sniffing attack is occurring?

Options:

A.  

Passive sniffing on a switched network

B.  

Duplicate IP conflict resolution attack

C.  

Switch port stealing via timing-based ARP spoofing

D.  

ARP poisoning for MiTM interception

Discussion 0
Questions 16

A penetration tester is conducting a security assessment for a client and needs to capture sensitive information transmitted across multiple VLANs without being detected by the organization ' s security monitoring systems. The network employs strict VLAN segmentation and port security measures. Which advanced sniffing technique should the tester use to discreetly intercept and analyze traffic across all VLANs?

Options:

A.  

Deploy a rogue DHCP server to redirect network traffic

B.  

Exploit a VLAN hopping vulnerability to access multiple VLANs

C.  

Implement switch port mirroring on all VLANs

D.  

Use ARP poisoning to perform a man-in-the-middle attack

Discussion 0
Questions 17

A penetration tester discovers that a web application uses unsanitized user input to dynamically generate file paths. The tester identifies that the application is vulnerable to Remote File Inclusion (RFI). Which action should the tester take to exploit this vulnerability?

Options:

A.  

Inject a SQL query into the input field to perform SQL injection

B.  

Use directory traversal to access sensitive system files on the server

C.  

Provide a URL pointing to a remote malicious script to include it in the web application

D.  

Upload a malicious shell to the server and execute commands remotely

Discussion 0
Questions 18

Bluetooth devices are suspected of being targeted by a Bluesnarfing attack. What is the most effective countermeasure?

Options:

A.  

Disable discoverable mode

B.  

Update firmware regularly

C.  

Increase Bluetooth PIN complexity

D.  

Encrypt Bluetooth traffic

Discussion 0
Questions 19

A payload causes a significant delay in response without visible output when testing an Oracle-backed application. What SQL injection technique is being used?

Options:

A.  

Time-based SQL injection using WAITFOR DELAY

B.  

Heavy query-based SQL injection

C.  

Union-based SQL injection

D.  

Out-of-band SQL injection

Discussion 0
Questions 20

A penetration tester evaluates a company ' s susceptibility to advanced social engineering attacks targeting its executive team. Using detailed knowledge of recent financial audits and ongoing projects, the tester crafts a highly credible pretext to deceive executives into revealing their network credentials. What is the most effective social engineering technique the tester should employ to obtain the necessary credentials without raising suspicion?

Options:

A.  

Send a mass phishing email with a link to a fake financial report

B.  

Create a convincing fake email from the CFO asking for immediate credential verification

C.  

Conduct a phone call posing as an external auditor requesting access to financial systems

D.  

Develop a spear-phishing email that references specific financial audit details and requests login confirmation

Discussion 0
Questions 21

At a power distribution facility in Phoenix, Arizona, ethical hacker Sameer Das is performing an OT security assessment. He demonstrates that a programmable controller accepts modifications delivered over the network without checking the origin or cryptographic validity of the package. By uploading altered instructions, he changes how the controller processes commands during operations. Which IoT/OT threat best represents this technique?

Options:

A.  

Firmware update attack

B.  

Forged malicious device

C.  

Remote access using backdoor

D.  

Exploit kits

Discussion 0
Questions 22

During a cybersecurity awareness drill at Quantum Analytics in San Francisco, California, the ethical hacking team tests the company’s defenses against social media-based threats. Nadia creates a fake LinkedIn profile posing as a senior HR manager from Quantum Analytics, using a stolen company logo and publicly available employee details. Nadia sends connection requests to several employees, including data analyst Priya Sharma, inviting them to join a private group called Quantum Analytics Innovation Hub. The group’s page prompts members to share their work email and department role for exclusive project updates.

What social engineering threat to corporate networks is Nadia’s exercise primarily simulating?

Options:

A.  

Loss of Productivity

B.  

Involuntary Data Leakage

C.  

Spam and Phishing

D.  

Network Vulnerability Exploitation

Discussion 0
Questions 23

At Liberty Mutual ' s cybersecurity operations center in Boston, network engineer Marcus is troubleshooting a critical issue during peak transaction hours. Multiple VLANs are experiencing intermittent access delays, and several endpoints including those on isolated VLANs are receiving network traffic not intended for them, raising concerns about data exposure. Marcus notices that the issue began after a newly imaged workstation used by an intern named Lisa was connected to a trunk port in the server room. Switch logs indicate abnormal traffic patterns overwhelming the network.

Which sniffing technique is Lisa ' s workstation most likely using to cause this behavior?

Options:

A.  

DNS Cache Poisoning

B.  

ARP Poisoning

C.  

MAC Flooding

D.  

Switch Port Stealing

Discussion 0
Questions 24

Using nbtstat -A < IP > , NetBIOS names including < 20 > and < 03 > are retrieved, but shared folders cannot be listed. Why?

Options:

A.  

File and printer sharing is disabled

B.  

NetBIOS runs on a non-standard port

C.  

nbtstat cannot enumerate shared folders

D.  

The host is not in an AD domain

Discussion 0
Questions 25

An attacker has partial root access to a mobile application. What control best prevents further exploitation?

Options:

A.  

Secure coding and automated reviews

B.  

Certificate pinning

C.  

Regular penetration testing

D.  

Mobile Application Management (MAM)

Discussion 0
Questions 26

A penetration tester is testing a web application ' s product search feature, which takes user input and queries the database. The tester suspects inadequate input sanitization. What is the best approach to confirm the presence of SQL injection?

Options:

A.  

Inject a script to test for Cross-Site Scripting (XSS)

B.  

Input DROP TABLE products; -- to see if the table is deleted

C.  

Enter 1 ' OR ' 1 ' = ' 1 to check if all products are returned

D.  

Use directory traversal syntax to access restricted files on the server

Discussion 0
Questions 27

A penetration tester performs a vulnerability scan on a company ' s network and identifies a critical vulnerability related to an outdated version of a database server. What should the tester prioritize as the next step?

Options:

A.  

Attempt to exploit the vulnerability using publicly available tools or exploits

B.  

Conduct a brute-force attack on the database login page

C.  

Ignore the vulnerability and move on to testing other systems

D.  

Perform a denial-of-service (DoS) attack on the database server

Discussion 0
Questions 28

In the bustling city of Chicago, Illinois, ethical hacker Sophia Nguyen is contracted by TaskFlow Systems, a U.S.-based project management provider, to review the security of its template upload feature. During testing, Sophia discovers that by modifying the input parameters in an upload request, she can trick the application into retrieving sensitive files from the server ' s local directories. This flaw allows her to view internal configuration files that should never be exposed through the web interface. She records her findings in a report for TaskFlow ' s security team.

Which vulnerability is this?

Options:

A.  

Insecure Deserialization

B.  

Cookie Poisoning

C.  

File Injection

D.  

Local File Inclusion

Discussion 0
Questions 29

A penetration tester suspects that a web application ' s product search feature is vulnerable to SQL injection. The tester needs to confirm this by manipulating the SQL query. What is the best technique to test for SQL injection?

Options:

A.  

Inject a malicious script into the search field to test for Cross-Site Scripting (XSS)

B.  

Use directory traversal syntax in the search field to access server files

C.  

Input 1 OR 1=1 in the search field to retrieve all products from the database

D.  

Insert admin ' — in the search field to attempt bypassing authentication

Discussion 0
Questions 30

During a black-box security assessment of a large enterprise network, the penetration tester scans the internal environment and identifies that TCP port 389 is open on a domain controller. Upon further investigation, the tester runs the ldapsearch utility without providing any authentication credentials and successfully retrieves a list of usernames, email addresses, and departmental affiliations from the LDAP directory. The tester notes that this sensitive information was disclosed without triggering any access control mechanisms or requiring login credentials. Based on this behavior, what type of LDAP access mechanism is most likely being exploited?

Options:

A.  

LDAP over SSL (LDAPS)

B.  

Authenticated LDAP with Kerberos

C.  

Anonymous LDAP binding

D.  

LDAP via RADIUS relay

Discussion 0
Questions 31

An Android device has an unpatched permission-handling flaw and updated antivirus. What is the most effective undetected exploitation approach?

Options:

A.  

SMS phishing

B.  

Rootkit installation

C.  

Custom exploit with obfuscation

D.  

Metasploit payload

Discussion 0
Questions 32

At a private aerospace research facility in Mesa, Arizona, an executive raises concerns after sensitive discussion points from speakerphone meetings begin surfacing externally. The device shows no indicators of active audio recording, and application permission history does not reflect recent camera or microphone authorization changes. A forensic mobile analysis identifies that an installed application has been continuously reading motion sensor output while the phone ' s loudspeaker is active. The collected sensor data was later transmitted to a remote server, where acoustic characteristics were reconstructed from the recorded measurements. Identify the attack technique responsible for this compromise.

Options:

A.  

Spearphone Attack

B.  

Storm Breaker Abuse

C.  

Android Camera Hijack Attack

D.  

Camfecting

Discussion 0
Questions 33

A penetration tester is assessing an organization ' s cloud infrastructure and discovers misconfigured IAM policies on storage buckets. The IAM settings grant read and write permissions to any authenticated user. What is the most effective way to exploit this misconfiguration?

Options:

A.  

Use leaked API keys to access the cloud storage buckets and exfiltrate data

B.  

Execute a SQL injection attack on the organization ' s website to retrieve sensitive information

C.  

Create a personal cloud account to authenticate and access the misconfigured storage buckets

D.  

Perform a Cross-Site Scripting (XSS) attack on the cloud management portal to gain access

Discussion 0
Questions 34

You are a security analyst conducting a footprinting exercise for a new client to gather information without direct interaction. After using search engines and public databases, you consider using Google Hacking (Google Dorking) techniques to uncover further vulnerabilities. Which option best justifies this decision?

Options:

A.  

Google Hacking can help locate phishing websites that mimic the client’s website.

B.  

Google Hacking can help discover hidden organizational data from the Deep Web.

C.  

Google Hacking can help identify weaknesses in the client’s website code.

D.  

Google Hacking can assist in mapping the client’s internal network structure.

Discussion 0
Questions 35

You are Maya, a security engineer at HarborPoint Cloud Services in Chicago, Illinois, performing a post-incident hardening review after an internal audit flagged multiple services that rely on legacy public-key algorithms. The engineering team must prioritize actions company-wide to reduce long-term risk from future quantum-capable adversaries while development continues on a large refactor of several services. Which proactive control should Maya recommend as the highest-priority change to embed into the organization ' s development lifecycle to improve future resistance to quantum-based attacks?

Options:

A.  

Include quantum-resistance checks in SDLC and code review processes

B.  

Encrypt stored data with quantum-resistant algorithms

C.  

Use quantum-specific firewalls to protect quantum communication channels

D.  

Break data into fragments and distribute it across multiple locations

Discussion 0
Questions 36

During a red team engagement at a healthcare provider in Miami, ethical hacker Rachel suspects that a compromised workstation is running a sniffer in promiscuous mode. To confirm her suspicion, she sends specially crafted ICMP packets with a mismatched MAC address but a correct IP destination. Minutes later, the suspected machine responds to the probe even though ordinary systems would ignore it.

Which detection technique is Rachel most likely using to validate the presence of a sniffer?

Options:

A.  

Ping Method

B.  

ARP Method

C.  

DNS Method

D.  

Nmap sniffer-detect (NSE)

Discussion 0
Questions 37

A penetration tester evaluates an industrial control system (ICS) that manages critical infrastructure. The tester discovers that the system uses weak default passwords for remote access. What is the most effective method to exploit this vulnerability?

Options:

A.  

Perform a brute-force attack to guess the system ' s default passwords

B.  

Execute a Cross-Site Request Forgery (CSRF) attack to manipulate system settings

C.  

Conduct a denial-of-service (DoS) attack to disrupt the system temporarily

D.  

Use the default passwords to gain unauthorized access to the ICS and control system operations

Discussion 0
Questions 38

A Certified Ethical Hacker (CEH) is auditing a company’s web server that employs virtual hosting. The server hosts multiple domains and uses a web proxy to maintain anonymity and prevent IP blocking. The CEH discovers that the server’s document directory (containing critical HTML files) is named “certrcx” and stored in /admin/web. The server root (containing configuration, error, executable, and log files) is also identified. The CEH also notes that the server uses a virtual document tree for additional storage. Which action would most likely increase the security of the web server?

Options:

A.  

Moving the document root directory to a different disk

B.  

Regularly updating and patching the server software

C.  

Changing the server’s IP address regularly

D.  

Implementing an open-source web server architecture such as LAMP

Discussion 0
Questions 39

During a red team engagement, an ethical hacker discovers that a thermostat accepts older firmware versions without verifying their authenticity. By loading a deprecated version containing known vulnerabilities, the tester gains unauthorized access to the broader network. Which IoT security issue is most accurately demonstrated in this scenario?

Options:

A.  

Lack of secure update mechanisms

B.  

Denial-of-service through physical tampering

C.  

Insecure network service exposure

D.  

Use of insecure third-party components

Discussion 0
Questions 40

Attackers persisted by modifying legitimate system utilities and services. What key step helps prevent similar threats?

Options:

A.  

Weekly off-site backups

B.  

Monitor file hashes of sensitive executables

C.  

Update antivirus and firewalls

D.  

Disable unused ports

Discussion 0
Questions 41

A financial institution ' s online banking platform is experiencing intermittent downtime caused by a sophisticated DDoS attack that combines SYN floods and HTTP GET floods from a distributed botnet. Standard firewalls and load balancers cannot mitigate the attack without affecting legitimate users. To protect their infrastructure and maintain service availability, which advanced mitigation strategy should the institution implement?

Options:

A.  

Configure firewalls to block all incoming SYN and HTTP requests from external IPs

B.  

Increase server bandwidth and apply basic rate limiting on incoming traffic

C.  

Deploy an Intrusion Prevention System (IPS) with deep packet inspection capabilities

D.  

Utilize a cloud-based DDoS protection service that offers multi-layer traffic scrubbing and auto-scaling

Discussion 0
Questions 42

Abnormal DNS resolution behavior is detected on an internal network. Users are redirected to altered login pages. DNS replies come from an unauthorized internal IP and are faster than legitimate responses. ARP spoofing alerts are also detected. What sniffing-based attack is most likely occurring?

Options:

A.  

Internet DNS spoofing

B.  

Intranet DNS poisoning via local spoofed responses

C.  

Proxy-based DNS redirection

D.  

Upstream DNS cache poisoning

Discussion 0
Questions 43

You suspect a Man-in-the-Middle (MitM) attack inside the network. Which network activity would help confirm this?

Options:

A.  

Sudden increase in traffic

B.  

Multiple login attempts from one IP

C.  

IP addresses resolving to multiple MAC addresses

D.  

Abnormal DNS request volumes

Discussion 0
Questions 44

You are instructed to perform a TCP NULL scan. In the context of TCP NULL scanning, which response indicates that a port on the target system is closed?

Options:

A.  

ICMP error message

B.  

TCP SYN/ACK packet

C.  

No response

D.  

TCP RST packet

Discussion 0
Questions 45

An ethical hacker audits a hospital’s wireless network secured with WPA using TKIP and successfully performs packet injection and decryption attacks. Which WPA vulnerability most likely enabled this?

Options:

A.  

Use of weak Initialization Vectors (IVs)

B.  

Dependence on weak passwords

C.  

Lack of AES-based encryption

D.  

Predictable Group Temporal Key (GTK)

Discussion 0
Questions 46

A tester evaluates a login form that constructs SQL queries using unsanitized user input. By submitting 1 OR ' T ' = ' T ' ; --, the tester gains unauthorized access to the application. What type of SQL injection has occurred?

Options:

A.  

Tautology-based SQL injection

B.  

Error-based SQL injection

C.  

Union-based SQL injection

D.  

Time-based blind SQL injection

Discussion 0
Questions 47

A penetration tester is tasked with mapping an organization ' s network while avoiding detection by sophisticated intrusion detection systems (IDS). The organization employs advanced IDS capable of recognizing common scanning patterns. Which scanning technique should the tester use to effectively discover live hosts and open ports without triggering the IDS?

Options:

A.  

Execute a FIN scan by sending TCP packets with the FIN flag set

B.  

Use an Idle scan leveraging a third-party zombie host

C.  

Conduct a TCP Connect scan using randomized port sequences

D.  

Perform an ICMP Echo scan to ping all network devices

Discussion 0
Questions 48

You are Michael, an ethical hacker at a New York–based e-commerce company performing a security review of their payment-signing service. While observing the signing process (without access to private keys), you note the service generates a fresh random value for each signature operation, the signature algorithm uses modular arithmetic in a subgroup defined by public domain parameters, and signatures are verified with a public verification key rather than by decrypting the message. Which asymmetric algorithm best matches the signing mechanism you observed?

Options:

A.  

DSA

B.  

RSA

C.  

Diffie-Hellman

D.  

ElGamal

Discussion 0
Questions 49

A security analyst is tasked with gathering detailed information about an organization ' s network infrastructure without making any direct contact that could be logged or trigger alarms. Which method should the analyst use to obtain this information covertly?

Options:

A.  

Examine leaked documents or data dumps related to the organization

B.  

Use network mapping tools to scan the organization ' s IP range

C.  

Initiate social engineering attacks to elicit information from employees

D.  

Perform a DNS brute-force attack to discover subdomains

Discussion 0
Questions 50

During a physical penetration test simulating a social engineering attack, a threat actor walks into the lobby of a target organization dressed as a field technician from a known external vendor. Carrying a fake ID badge and referencing a known company name, the attacker confidently claims they’ve been dispatched to perform a routine server room upgrade. Using internal-sounding terminology and referencing real employee names gathered via OSINT, the individual conveys urgency. The receptionist, recognizing the vendor name and the convincing language, allows access without verifying the credentials.

Options:

A.  

Perceived authority and reliance on third-party familiarity

B.  

Leaked credentials on public networks and forums

C.  

Trust in physical security logs used by security teams

D.  

Misconfigured network segmentation allowing unauthorized access

Discussion 0
Questions 51

You are Ethan Brooks, an ethical hacker at Vanguard Security Solutions, hired to perform a wireless penetration test for Pacific Logistics, a shipping company in Seattle, Washington. Your task is to identify all Wi-Fi networks in range without alerting the network administrators. Using a laptop with a Wi-Fi card, you monitor radio channels to detect access points and their BSSIDs without sending any probe requests or injecting data packets.

Based on the described method, which Wi-Fi discovery technique are you employing?

Options:

A.  

Network Discovery Software

B.  

Passive Footprinting

C.  

Wash Command

D.  

Active Footprinting

Discussion 0
Questions 52

A penetration tester is assessing an IoT thermostat used in a smart home system. The device communicates with a cloud server for updates and commands. The tester discovers that communication between the device and the cloud server is not encrypted. What is the most effective way to exploit this vulnerability?

Options:

A.  

Conduct a Cross-Site Scripting (XSS) attack on the thermostat’s web interface

B.  

Perform a brute-force attack on the thermostat’s local admin login

C.  

Execute a SQL injection attack on the cloud server ' s login page

D.  

Use a man-in-the-middle (MitM) attack to intercept and manipulate unencrypted communication

Discussion 0
Questions 53

On July 25, 2025, during a penetration test at Horizon Financial Services in Chicago, Illinois, cybersecurity specialist Laura Bennett is analyzing an attack simulation targeting the company ' s online banking portal. The system logs reveal a coordinated barrage of traffic from multiple compromised systems, orchestrated through a central command-and-control server, flooding the portal and rendering it unavailable to legitimate users. The attack leverages a network of infected devices, likely recruited via malicious links on social media.

What is the structure or concept most likely used to launch this coordinated attack?

Options:

Discussion 0
Questions 54

A penetration tester discovers that a web application uses unsanitized user input to dynamically generate file paths. The tester identifies that the application is vulnerable to Remote File Inclusion (RFI). Which action should the tester take to exploit this vulnerability?

Options:

A.  

Inject a SQL query into the input field to perform SQL injection

B.  

Use directory traversal to access sensitive system files on the server

C.  

Provide a URL pointing to a remote malicious script to include it in the web application

D.  

Upload a malicious shell to the server and execute commands remotely

Discussion 0
Questions 55

On July 25, 2025, during a security assessment at Apex Technologies in Boston, Massachusetts, ethical hacker Sophia Patel conducts a penetration test to evaluate the company’s defenses against a simulated DDoS attack targeting their e-commerce platform. The simulated attack floods the platform with traffic from multiple sources, attempting to overwhelm server resources. The IT team activates a specific tool that successfully mitigates this attack by distributing traffic across multiple servers and filtering malicious requests. Sophia’s test aims to verify the effectiveness of this tool in maintaining service availability.

Which DoS DDoS protection tool is most likely being utilized by the IT team in this scenario?

Options:

A.  

Web Application Firewall WAF

B.  

Load Balancer

C.  

Intrusion Prevention System IPS

D.  

Firewall

Discussion 0
Questions 56

“ShadowFlee” is fileless malware using PowerShell and legitimate tools. Which strategy offers the most focused countermeasure?

Options:

A.  

Restrict and monitor script and system tool execution

B.  

Isolate systems and inspect traffic

C.  

Schedule frequent reboots

D.  

Clean temporary folders

Discussion 0
Questions 57

During a penetration test at TechTrend Innovations in California, ethical hacker Jake Henderson reviews the company ' s web server exposure to network-based threats. He finds that the server is running with multiple open services and protocols that are not required for its operation, such as NetBIOS and SMB. Jake explains to the IT team that attackers could exploit these unnecessary services to gain unauthorized access to the server.

Which hardening measure should the IT team implement to mitigate this risk?

Options:

A.  

Use a dedicated machine as a web server

B.  

Conduct risk assessment for patching

C.  

Eliminate unnecessary files

D.  

Block all unnecessary ports, ICMP traffic, and protocols

Discussion 0
Questions 58

A company’s online service is under a multi-vector DoS attack using SYN floods and HTTP GET floods. Firewalls and IDS cannot stop the outage. What advanced defense should the company implement?

Options:

A.  

Configure the firewall to block all incoming SYN packets from external IPs

B.  

Use DDoS mitigation services that offer multi-layer protection

C.  

Deploy a Web Application Firewall (WAF) with anomaly detection

D.  

Increase server bandwidth and apply basic rate limiting

Discussion 0
Questions 59

During a red team exercise at a financial institution in New York, penetration tester Bob investigates irregularities in time synchronization across critical servers. While probing one server, he decides to use a diagnostic command that allows him to directly interact with the NTP daemon and query its internal state. This command enables him to perform monitoring and retrieve statistics, but it is primarily focused on controlling and checking the operation of the NTP service rather than listing peers with delay, offset, and jitter values.

Which command should Bob use to accomplish this?

Options:

A.  

ntpq -p [host]

B.  

ntptrace [-m maxhosts] [servername/IP_address]

C.  

ntpdc [-ilnps] [-c command] [host]

D.  

ntpq [-inp] [-c command] [host]...

Discussion 0
Questions 60

During a targeted phishing campaign, a malicious HTML attachment reconstructs malware locally using obfuscated JavaScript without making external network calls, bypassing firewalls and IDS inspection. Which evasion technique is being employed?

Options:

A.  

HTML smuggling

B.  

Port forwarding

C.  

Cross-site scripting

D.  

HTTP header spoofing

Discussion 0
Questions 61

You are Alex, a forensic responder at HarborHealth in Seattle, Washington. During a live incident response you must secure an enterprise Windows server ' s system partition and attached data volumes without rebooting user machines or disrupting domain authentication. The IT team prefers a solution that integrates with Windows platform features (including hardware-backed startup protection and centralized key escrow via Active Directory/management policies) and provides transparent full-disk protection for the OS volume. Which disk-encryption solution should you deploy?

Options:

A.  

FileVault

B.  

BitLocker Drive Encryption

C.  

VeraCrypt

D.  

Rohos Disk Encryption

Discussion 0
Questions 62

As an IT security analyst, you perform network scanning using ICMP Echo Requests. During the scan, several IP addresses do not return Echo Replies, yet other network services remain operational. How should this situation be interpreted?

Options:

A.  

The non-responsive IP addresses indicate severe network congestion.

B.  

A firewall or security control is likely blocking ICMP Echo Requests.

C.  

The lack of Echo Replies indicates an active security breach.

D.  

The IP addresses are unused and available for reassignment.

Discussion 0
Questions 63

A red team operator wants to obtain credentials from a Windows machine without touching LSASS memory due to security controls and Credential Guard. They use SSPI to generate NetNTLM responses in the logged-in user context and collect those responses for offline cracking. Which attack technique is being used?

Options:

A.  

Internal Monologue attack technique executed through OS authentication protocol manipulations

B.  

Replay attack attempt by reusing captured authentication traffic sequences

C.  

Hash injection approach using credential hashes for authentication purposes

D.  

Pass-the-ticket attack method involving forged tickets for network access

Discussion 0
Questions 64

During a penetration test at a healthcare provider in Phoenix, ethical hacker Sofia crafts a stream of IP packets with manipulated offset fields and overlapping payload offsets so that the records server ' s protocol stack repeatedly attempts to reconstruct the original datagrams. The repeated reconstruction attempts consume CPU and memory, causing the system to crash intermittently and disrupt patient portal access, even though overall bandwidth remains normal. Packet analysis shows deliberately malformed offsets that trigger processing errors rather than a simple flood of traffic.

Which type of attack is Sofia most likely simulating?

Options:

A.  

Fragmentation Attack

B.  

ICMP Flood

C.  

Teardrop Attack

D.  

Ping of Death

Discussion 0
Questions 65

A penetration tester identifies malware on a system that hides its presence and gives an attacker access to administrative functions without being detected. What type of malware is this?

Options:

A.  

Virus

B.  

Keylogger

C.  

Ransomware

D.  

Rootkit

Discussion 0
Questions 66

During a penetration test at a financial services company in Denver, ethical hacker Jason demonstrates how employees could be tricked by a rogue DHCP server. To help the client prevent such attacks in the future, Jason shows the administrators how to configure their Cisco switches to reject DHCP responses from untrusted ports. He explains that this global setting must be activated before more granular controls can be applied.

Which switch command should Jason recommend to implement this defense?

Options:

A.  

Switch(config)# ip dhcp snooping

B.  

Switch(config)# ip arp inspection vlan 10

C.  

Switch(config)# ip dhcp snooping vlan 10

D.  

Switch(config-if)# ip dhcp snooping trust

Discussion 0
Questions 67

During a security assessment in San Francisco, an ethical hacker is tasked with evaluating a network ' s resilience against stealthy reconnaissance attempts. The hacker needs to employ a scanning technique that leverages TCP flags to evade detection by intrusion detection systems, relying on the target ' s response behavior to infer port states without completing a full connection. Which approach best aligns with this strategy, ensuring minimal visibility during the assessment?

Options:

A.  

TCP Connect Scan

B.  

Network Scanning

C.  

FIN Scan

D.  

NULL Scan

Discussion 0
Questions 68

An attacker exploits legacy protocols to perform advanced sniffing. Which technique is the most difficult to detect and neutralize?

Options:

A.  

HTTP header overflow extraction

B.  

SMTP steganographic payloads

C.  

Covert channel via Modbus protocol manipulation

D.  

X.25 packet fragmentation

Discussion 0
Questions 69

A penetration tester performs a vulnerability scan on a company’s web server and identifies several medium-risk vulnerabilities related to misconfigured settings. What should the tester do to verify the vulnerabilities?

Options:

A.  

Use publicly available tools to exploit the vulnerabilities and confirm their impact

B.  

Ignore the vulnerabilities since they are medium-risk

C.  

Perform a brute-force attack on the web server ' s login page

D.  

Conduct a denial-of-service (DoS) attack to test the server ' s resilience

Discussion 0
Questions 70

Which scenario best describes a tailgating attack?

Options:

A.  

Following an employee through a secured door

B.  

Phishing email requesting credentials

C.  

Phone-based impersonation

D.  

Leaving a malicious USB device

Discussion 0
Questions 71

During a controlled red team engagement at a financial institution in New Jersey, ethical hacker Ryan tests the bank ' s resilience against stealth-based malware. He plants a custom malicious program on an employee workstation. After execution, he observes that the infected files continue to function normally, but his malware conceals its modifications by intercepting operating system calls. Antivirus scans repeatedly return “no threats detected,” even though the malicious code remains active and hidden on the system.

Which type of virus did Ryan most likely deploy in this assessment?

Options:

A.  

Cavity Virus

B.  

Stealth Virus

C.  

Polymorphic Virus

D.  

Macro Virus

Discussion 0
Questions 72

A penetration tester identifies malware that monitors the activities of a user and secretly collects personal information, such as login credentials and browsing habits. What type of malware is this?

Options:

A.  

Worm

B.  

Rootkit

C.  

Spyware

D.  

Ransomware

Discussion 0
Questions 73

A WPA2-PSK wireless network is tested. Which method would allow identification of a key vulnerability?

Options:

A.  

De-authentication attack to capture the four-way handshake

B.  

MITM to steal the PSK directly

C.  

Jamming to force PSK disclosure

D.  

Rogue AP revealing PSK

Discussion 0
Questions 74

On a busy Monday morning at Horizon Financial Services in Chicago, accounts assistant Clara Nguyen receives an email that appears to come from the company ' s IT department. The email, addressed specifically to Clara and mentioning her role in the accounts team, warns of a critical system vulnerability requiring immediate action. It includes a link to a login page resembling the company ' s internal portal, urging her to update her credentials to prevent account suspension. The email ' s sender address looks legitimate, but Clara notices a slight misspelling in the domain name.

What social engineering technique is being attempted against Clara?

Options:

A.  

Spear Phishing

B.  

Impersonation

C.  

Quid Pro Quo

D.  

Vishing

Discussion 0
Questions 75

A zero-day vulnerability is actively exploited in a critical web server, but no vendor patch is available. What should be the FIRST step to manage this risk?

Options:

A.  

Shut down the server

B.  

Apply a virtual patch using a WAF

C.  

Perform regular backups and prepare IR plans

D.  

Monitor for suspicious activity

Discussion 0
Questions 76

As a Certified Ethical Hacker evaluating a smart city project (traffic lights, public Wi-Fi, and water management), you find anomalous IoT network logs showing high-volume data exchange between a specific traffic light and an external IP address. Further investigation reveals an unexpectedly open port on that traffic light. What should be your subsequent course of action?

Options:

A.  

Isolate the affected traffic light from the network and perform a detailed firmware investigation

B.  

Conduct an exhaustive penetration test across the entire network to uncover hidden vulnerabilities

C.  

Analyze and modify IoT firewall rules to block further interaction with the suspicious external IP

D.  

Attempt to orchestrate a reverse connection from the traffic light to the external IP to understand the transferred data

Discussion 0
Questions 77

During a penetration test at Greenview Credit Union in Chicago, Illinois, ethical hacker Rebecca Hayes simulates an attacker who contacts employees using a voice channel. The number displayed on their devices appears identical to the institution’s official line, convincing staff that the request is legitimate. Rebecca then asks for account credentials under the pretense of a mandatory security check. Which mobile attack vector is she demonstrating?

Options:

A.  

Call Spoofing

B.  

OTP Hijacking

C.  

Bluebugging

D.  

SMiShing

Discussion 0
Questions 78

Which payload is most effective for testing time-based blind SQL injection?

Options:

A.  

AND 1=0 UNION ALL SELECT ' admin ' , ' admin

B.  

UNION SELECT NULL, NULL, NULL --

C.  

OR ' 1 ' = ' 1 ' ;

D.  

AND BENCHMARK(5000000,ENCODE( ' test ' , ' test ' ))

Discussion 0
Questions 79

You are an ethical hacker at SecureNet Solutions, conducting a penetration test for BlueRidge Manufacturing in Denver, Colorado. While auditing their wireless network, you observe that the access point uses a security protocol that employs the RC4 algorithm with a 24-bit initialization vector IV to encrypt data between network clients. Based on the observed encryption characteristics, which wireless encryption protocol is the access point using?

Options:

A.  

WPA

B.  

WPA2

C.  

WEP

D.  

WPA3

Discussion 0
Questions 80

In downtown Chicago, Illinois, security analyst Mia Torres investigates a breach at Windy City Enterprises, a logistics firm running an Apache HTTP Server. The attacker exploited a known vulnerability in an outdated version, gaining unauthorized access to customer shipment data. Mia’s analysis reveals the server lacked recent security updates, leaving it susceptible to remote code execution. Determined to prevent future incidents, Mia recommends a strategy to the IT team to address this exposure.

Which approach should Mia recommend to secure Windy City Enterprises ' Apache HTTP Server against such vulnerabilities?

Options:

A.  

Eliminate unnecessary files within the jar files

B.  

Block all unnecessary ports, ICMP traffic, and unnecessary protocols such as NetBIOS and SMB

C.  

Use a dedicated machine as a web server

D.  

Conduct an extensive risk assessment to determine which segments of the network are most vulnerable or at high risk that need to be patched first

Discussion 0
Questions 81

A future-focused security audit discusses risks where attackers collect encrypted data now, anticipating that they can decrypt it later with quantum computers. What is this threat known as?

Options:

A.  

Saving data today for future quantum decryption

B.  

Replaying intercepted quantum messages

C.  

Breaking RSA using quantum algorithms

D.  

Flipping qubit values to corrupt the output

Discussion 0
Questions 82

An ethical hacker needs to enumerate user accounts and shared resources within a company ' s internal network without raising any security alerts. The network consists of Windows servers running default configurations. Which method should the hacker use to gather this information covertly?

Options:

A.  

Deploy a packet sniffer to capture and analyze network traffic

B.  

Perform a DNS zone transfer to obtain internal domain details

C.  

Exploit null sessions to connect anonymously to the IPC$ share

D.  

Utilize SNMP queries to extract user information from network devices

Discussion 0
Questions 83

A corporation migrates to a public cloud service, and the security team identifies a critical vulnerability in the cloud provider’s API. What is the most likely threat arising from this flaw?

Options:

A.  

Distributed Denial-of-Service (DDoS) attacks on cloud servers

B.  

Unauthorized access to cloud resources

C.  

Physical security compromise of data centers

D.  

Compromise of encrypted data at rest

Discussion 0
Questions 84

During a cloud security assessment, you discover a former employee still has access to critical cloud resources months after leaving. Which practice would most effectively prevent this?

Options:

A.  

Real-time traffic analysis

B.  

Regular penetration testing

C.  

Enforcing timely user de-provisioning

D.  

Multi-cloud deployment

Discussion 0
Questions 85

During a red team assessment at a banking client in Chicago, ethical hacker David gains access to the internal LAN. He sets up a test machine and injects crafted messages into the network. Soon, all traffic between a finance workstation and the authentication server is silently routed through his system without changing switch configurations. He observes usernames and passwords passing through his interface, even though no proxy or VPN is in use.

Which sniffing technique did David most likely use?

Options:

A.  

Switch Port Stealing

B.  

ARP Spoofing

C.  

STP Attack

D.  

IRDP Spoofing

Discussion 0
Questions 86

You perform a FIN scan and observe that many ports do not respond to FIN packets. How should these results be interpreted?

Options:

A.  

Conclude the ports are closed

B.  

Escalate as an active breach

C.  

Attribute it to network congestion

D.  

Suspect firewall filtering and investigate further

Discussion 0
Questions 87

A financial technology firm in Atlanta, Georgia launches an internal investigation after multiple employees report that a popular messaging application on their Android devices has begun displaying excessive advertisements and behaving unpredictably. Security analysts discover that users had installed a utility application from a third-party marketplace weeks earlier. Further examination shows that this application silently replaced certain legitimate apps already present on the device. The compromised applications were then used to generate large volumes of advertisements and collect user data for external transmission. Based on the observed behavior, what malware is most consistent with this incident?

Options:

A.  

Mamo

B.  

Pegasus

C.  

Agent Smith

D.  

GoldPickaxe

Discussion 0
Questions 88

A known vulnerability exists on a production server, but patching is delayed due to operational constraints. What immediate action can reduce risk without disrupting operations?

Options:

A.  

Conduct a full penetration test

B.  

Shut down the server

C.  

Monitor traffic continuously

D.  

Implement Virtual Patching

Discussion 0
Questions 89

At Norwest Freight Services, a rotating audit team is asked to evaluate host exposure across multiple departments following a suspected misconfiguration incident. Simon, a junior analyst working from a trusted subnet, initiates a network-wide scan using the default configuration profile of his assessment tool. The tool completes quickly but returns only partial insights such as open service ports and version banners while deeper registry settings, user policies, and missing patches remain unreported. Midway through the report review, Simon notices that system login prompts were never triggered during scanning, and no credential failures were logged in the SIEM.

Which type of vulnerability scan BEST explains the behavior observed in Simon’s assessment?

Options:

A.  

Unauthenticated Scanning

B.  

Authenticated Scanning

C.  

Internal Scan

D.  

Credentialed Scanning

Discussion 0
Questions 90

A penetration tester is evaluating a secure web application that uses HTTPS, secure cookie flags, and regenerates session IDs only during specific user actions. To hijack a legitimate user ' s session without triggering security alerts, which advanced session hijacking technique should the tester employ?

Options:

A.  

Perform a man-in-the-middle attack by exploiting certificate vulnerabilities

B.  

Use a session fixation attack by setting a known session ID before the user logs in

C.  

Conduct a session token prediction attack by analyzing session ID patterns

D.  

Implement a Cross-Site Scripting (XSS) attack to steal session tokens

Discussion 0
Questions 91

Which scenario best describes a slow, stealthy scanning technique?

Options:

A.  

FIN scanning

B.  

TCP connect scanning

C.  

Xmas scanning

D.  

Zombie-based idle scanning

Discussion 0
Questions 92

During a routine security audit, administrators found that cloud storage backups were illegally accessed and modified. What countermeasure would most directly mitigate such incidents in the future?

Options:

A.  

Deploying biometric entry systems

B.  

Implementing resource auto-scaling

C.  

Regularly conducting SQL injection testing

D.  

Adopting the 3-2-1 backup model

Discussion 0
Questions 93

A multinational healthcare provider headquartered in Boston, Massachusetts relies on federated authentication to allow employees to access multiple cloud-hosted applications using a single sign-on portal. During an authorized red team engagement, a security consultant gains access to the organization ' s identity infrastructure and extracts signing material used in trust relationships between the internal identity provider and external cloud services. Using this material, the consultant generates authentication responses that grant administrative-level access to several cloud applications without interacting with user credentials or triggering multifactor authentication challenges. The access appears legitimate within the cloud service logs. Which cloud attack technique best aligns with this behavior?

Options:

A.  

Golden SAML Attack

B.  

Man-in-the-Cloud (MITC) Attack

C.  

Cloud Hopper Attack

D.  

Living off the Cloud (LotC) Attack

Discussion 0
Questions 94

Sarah, a cybersecurity analyst at a US-based e-commerce company in New York, is tasked with evaluating the company ' s transition to a cloud-based infrastructure to support its growing online platform. The company aims to optimize resource allocation to handle fluctuating customer demand during peak shopping seasons, such as Black Friday. Sarah must recommend a key characteristic of cloud computing that ensures resources are efficiently shared across multiple users while maintaining scalability.

Which cloud computing characteristic should Sarah recommend ensuring efficient resource sharing and scalability for the e-commerce platform?

Options:

A.  

Measured service

B.  

Broad network access

C.  

Resource pooling

D.  

On-demand self-service

Discussion 0
Questions 95

During a red team exercise at Horizon Financial Services in Chicago, ethical hacker Clara crafts an email designed to trick the company’s CEO. The message, disguised as an urgent memo from the legal department, warns of a pending lawsuit and includes a link to a fake internal portal requesting the executive’s credentials. Unlike generic phishing, this attack is tailored specifically toward a high-ranking individual with decision-making authority.

Options:

A.  

Whaling

B.  

Spear Phishing

C.  

Clone Phishing

D.  

Consent Phishing

Discussion 0
Questions 96

A global media streaming platform experiences traffic surges every 10 minutes, with spikes over 300 Gbps followed by quiet intervals. Which DDoS attack explains this behavior?

Options:

A.  

UDP flood sustained attack

B.  

Recursive HTTP GET flood

C.  

Permanent DoS (PDoS)

D.  

Pulse Wave attack

Discussion 0
Questions 97

In a highly secure online banking environment, customers report unauthorized access to their accounts despite robust authentication controls. Investigation reveals attackers are using advanced session hijacking techniques to perform fraudulent transactions. Which advanced session-hijacking attack, resembling a scenario-based attack, presents the greatest challenge to detect and mitigate?

Options:

A.  

Covert Cross-Site Scripting (XSS) attack injecting malicious scripts into banking pages

B.  

Man-in-the-Browser (MitB) attack using malicious browser extensions to intercept sessions

C.  

Session fixation attack manipulating HTTP session identifiers

D.  

Passive sniffing attack capturing encrypted session tokens over unsecured Wi-Fi

Discussion 0
Questions 98

During an internal red team engagement, an operator discovers that TCP port 389 is open on a target system identified as a domain controller. To assess the extent of LDAP exposure, the operator runs the command ldapsearch -h < Target IP > -x -s base namingcontexts and receives a response revealing the base distinguished name (DN): DC=internal,DC=corp. This naming context indicates the root of the LDAP directory structure. With this discovery, the operator plans the next step to continue LDAP enumeration and expand visibility into users and objects in the domain. What is the most logical next action?

Options:

A.  

Launch a brute-force attack against user passwords via SMB

B.  

Conduct an ARP scan on the local subnet

C.  

Attempt an RDP login to the domain controller

D.  

Use the base DN in a filter to enumerate directory objects

Discussion 0
Questions 99

During a high-stakes engagement, a penetration tester abuses MS-EFSRPC to force a domain controller to authenticate to an attacker-controlled server. The tester captures the NTLM hash and relays it to AD CS to obtain a certificate granting domain admin privileges. Which network-level hijacking technique is illustrated?

Options:

A.  

Hijacking sessions using a PetitPotam relay attack

B.  

Exploiting vulnerabilities in TLS compression via a CRIME attack

C.  

Stealing session tokens using browser-based exploits

D.  

Employing a session donation method to transfer tokens

Discussion 0
Questions 100

Which WPA vulnerability allowed packet injection and decryption attacks?

Options:

A.  

Lack of AES encryption

B.  

Predictable GTK

C.  

Weak Initialization Vectors (IVs)

D.  

Weak passwords

Discussion 0
Questions 101

A penetration tester is conducting an external assessment of a corporate web server. They start by accessing https://www.targetcorp.com/robots.txt and observe multiple Disallow entries that reference directories such as /admin-panel/, /backup/, and /confidentialdocs/. When the tester directly visits these paths via a browser, they find that access is not restricted by authentication and gain access to sensitive files, including server configuration and unprotected credentials. Which stage of the web server attack methodology is demonstrated in this scenario?

Options:

A.  

Injecting malicious SQL queries to access sensitive database records

B.  

Performing a cross-site request forgery (CSRF) attack to manipulate user actions

C.  

Gathering information through exposed indexing instructions

D.  

Leveraging the directory traversal flaw to access critical server files

Discussion 0
Questions 102

An attacker places a malicious VM on the same physical server as a target VM in a multi-tenant cloud environment. The attacker then extracts cryptographic keys using CPU timing analysis. What type of attack was conducted?

Options:

A.  

Side-channel attack

B.  

Cloud cryptojacking

C.  

Cache poisoned denial of service (CPDoS)

D.  

Metadata spoofing

Discussion 0
Questions 103

You are Riley, an incident responder at NovaEx Crypto in San Antonio, Texas, tasked with investigating a recent double-spend reported by a retail merchant that accepts the exchange ' s token. Your telemetry shows that a reseller node used by the merchant received blocks only from a small, fixed set of peers for several hours and accepted a conflicting history that later allowed the attacker to reverse a confirmed payment. The attacker appears to have controlled which peers that node communicated with and supplied it a private chain until they were ready to reveal it. Which blockchain attack does this behavior most closely describe?

Options:

A.  

Finney Attack

B.  

DeFi Sandwich Attack

C.  

51% Attack

D.  

Eclipse Attack

Discussion 0
Questions 104

In a tense red team exercise at a mid-sized university in Austin, Texas, an ethical hacker named Jake targeted a legacy Linux server in the engineering department. Late one afternoon, he discovered TCP port 2049 was open during his first sweep, suggesting hidden file-sharing capabilities. Intrigued, Jake used a standard utility to request a list of remote file systems shared across the network, aiming to map accessible resources. Meanwhile, he idly checked for Telnet access and probed a time-sync service out of routine, but both proved fruitless on this host.

Which enumeration method is actively demonstrated in this scenario?

Options:

A.  

NFS Enumeration

B.  

SNMP Enumeration

C.  

NetBIOS Enumeration

D.  

NTP Enumeration

Discussion 0
Questions 105

You are an ethical hacker at Vanguard Cyber Defense, hired by Sunrise Logistics, a freight management company in Houston, Texas, to evaluate the security of their shipment tracking portal. During your engagement, you analyze how the application handles user-submitted data. You observe the behavior of the shipment search feature and monitor the HTTP GET requests being sent to the server. Your objective is to determine how user input is processed by the backend system and whether those parameters can be used to manipulate SQL queries. Based on this activity, which step of the SQL injection methodology are you performing?

Options:

A.  

Advanced SQL Injection

B.  

Launching SQL Injection Attacks

C.  

Database Enumeration

D.  

Identifying Data Entry Paths

Discussion 0
Questions 106

During a penetration test at a retail company in Seattle, Washington, an ethical hacker needs to disguise her scans so they appear to originate from a specific hardware vendor. The organization uses MAC-based logging, and by assigning a vendor-associated identifier, she can make her traffic blend in with legitimate devices on the network. Which Nmap command should she use to achieve this?

Options:

A.  

nmap -sT -Pn --spoof-mac 00:11:22 10.10.1.11

B.  

nmap -sT -Pn --spoof-mac Dell 10.10.1.11

C.  

nmap -sT -Pn --spoof-mac 0 10.10.1.11

D.  

nmap -sT -Pn --spoof-mac 00:01:02:25:56:AE 10.10.1.11

Discussion 0
Questions 107

During a red team assessment, an ethical hacker must map a large multinational enterprise’s external attack surface. Due to strict rules of engagement, no active scans may be used. The goal is to identify publicly visible subdomains to uncover forgotten or misconfigured services. Which method should the ethical hacker use to passively enumerate the organization’s subdomains?

Options:

A.  

Leverage tools like Netcraft or DNSdumpster to gather subdomain information

B.  

Attempt to guess admin credentials and access the company’s DNS portal

C.  

Conduct a brute-force DNS subdomain enumeration

D.  

Request internal DNS records using spoofed credentials

Discussion 0
Questions 108

Which advanced session-hijacking technique is hardest to detect and mitigate?

Options:

A.  

Covert XSS attack

B.  

Man-in-the-Browser (MitB) attack

C.  

Passive sniffing on Wi-Fi

D.  

Session fixation

Discussion 0
Questions 109

A penetration tester intercepts HTTP requests between a user and a vulnerable web server. The tester observes that the session ID is embedded in the URL, and the web application does not regenerate the session upon login. Which session hijacking technique is most likely to succeed in this scenario?

Options:

A.  

Injecting JavaScript to steal session cookies via cross-site scripting

B.  

DNS cache poisoning to redirect users to fake sites

C.  

Session fixation by pre-setting the token in a URL

D.  

Cross-site request forgery exploiting user trust in websites

Discussion 0
Questions 110

An attacker examines differences in ciphertext outputs resulting from small changes in the input to deduce key patterns in a symmetric algorithm. What method is being employed?

Options:

A.  

Differential cryptanalysis on input-output differences

B.  

Timing attack to infer key bits based on processing time

C.  

Brute-force attack to try every possible key

D.  

Chosen-ciphertext attack to decrypt arbitrary ciphertexts

Discussion 0
Questions 111

A penetration tester evaluates a secure web application using HTTPS, secure cookies, and multi-factor authentication. To hijack a legitimate user’s session without triggering alerts, which technique should be used?

Options:

A.  

Exploit a browser zero-day vulnerability to inject malicious scripts

B.  

Implement a man-in-the-middle attack by compromising a trusted network device

C.  

Perform a Cross-Site Request Forgery (CSRF) attack to manipulate session tokens

D.  

Utilize a session token replay attack by capturing encrypted tokens

Discussion 0
Questions 112

During an internal security assessment of a medium-sized enterprise network, a security analyst notices an unusual spike in ARP traffic. Closer inspection reveals that one particular MAC address is associated with multiple IP addresses across different subnets. The ARP packets were unsolicited replies rather than requests, and several employees from different departments have reported intermittent connection drops, failed logins, and broken intranet sessions. The analyst suspects an intentional interference on the local network segment. What is the most likely cause of this abnormal behavior?

Options:

A.  

ARP poisoning causing routing inconsistencies

B.  

DHCP snooping improperly configured

C.  

Legitimate ARP table refresh on all clients

D.  

Port security restricting all outbound MAC responses

Discussion 0
Questions 113

During a penetration test at Cascade Financial in Seattle, ethical hacker Elena Vasquez probes the input handling of the company’s web server. She discovers that a single crafted request is processed as two separate ones, allowing her to inject malicious data into the server’s communication. This type of attack falls into the same category of input validation flaws as cross-site scripting (XSS), cross-site request forgery (CSRF), and SQL injection.

Which type of web server attack is Elena most likely demonstrating?

Options:

A.  

HTTP Response Splitting Attack

B.  

Password Cracking Attack

C.  

Directory Traversal Attack

D.  

Web Cache Poisoning Attack

Discussion 0
Questions 114

During an internal security assessment of a medium-sized enterprise network, a security analyst notices an unusual spike in ARP traffic. Closer inspection reveals that one particular MAC address is associated with multiple IP addresses across different subnets. The ARP packets were unsolicited replies rather than requests, and several employees from different departments have reported intermittent connection drops, failed logins, and broken intranet sessions. The analyst suspects an intentional interference on the local network segment. What is the most likely cause of this abnormal behavior?

Options:

A.  

ARP poisoning causing routing inconsistencies

B.  

DHCP snooping improperly configured

C.  

Legitimate ARP table refresh on all clients

D.  

Port security restricting all outbound MAC responses

Discussion 0
Questions 115

You are a wireless auditor at SeaFront Labs in San Diego, California, engaged to review the radio-layer protections used by a biotech research facility. While capturing traffic in monitor mode, you observe frames that include a CCMP-like header and AES-based encryption, and you note the use of a four-way handshake with a packet number (PN) for replay protection — features that were introduced to replace older TKIP/RC4 approaches. Based on these observed characteristics, which wireless encryption protocol is the access point most likely using?

Options:

A.  

WPA2

B.  

WPA

C.  

WPA3

D.  

WEP

Discussion 0
Questions 116

During an investigation, an ethical hacker discovers that a web application’s API has been compromised, leading to unauthorized access and data manipulation. The attacker is using webhooks and a webshell. To prevent further exploitation, which of the following actions should be taken?

Options:

A.  

Implement a Web Application Firewall (WAF) with rules to block webshell traffic and increase the logging verbosity of webhooks.

B.  

Perform regular code reviews for the webhooks and modify the API to block connections from unknown IP addresses.

C.  

Harden the web server security, add multi-factor authentication for API users, and restrict the execution of scripts server-side.

D.  

Implement input validation on all API endpoints, review webhook payloads, and schedule regular scanning for webshells.

Discussion 0
Questions 117

A penetration tester is assessing a web application that uses dynamic SQL queries for searching users in the database. The tester suspects the search input field is vulnerable to SQL injection. What is the best approach to confirm this vulnerability?

Options:

A.  

Input DROP TABLE users; -- into the search field to test if the database query can be altered

B.  

Inject JavaScript into the search field to test for Cross-Site Scripting (XSS)

C.  

Use a directory traversal attack to access server configuration files

D.  

Perform a brute-force attack on the user login page to guess weak passwords

Discussion 0
Questions 118

As a cybersecurity analyst conducting passive reconnaissance, you aim to gather information without interacting directly with the target system. Which technique is least likely to assist in this process?

Options:

A.  

Using a tool like Nmap to scan the organization’s public IP range

B.  

Inspecting the WHOIS database for domain registration details

C.  

Using search engines and public data sources

D.  

Monitoring publicly available social media and professional profiles

Discussion 0
Questions 119

During a penetration test at a regional bank in Richmond, ethical hacker Thomas is tasked with identifying weaknesses in how employee credentials are transmitted. He sets up Wireshark on a mirrored port and captures HTTP login sessions from the customer services VLAN. To quickly reconstruct entire conversations between browsers and the server, Thomas uses a feature that reassembles packet data into a readable stream, allowing him to view usernames and passwords directly in plain text.

Which Wireshark feature is Thomas most likely using in this case?

Options:

A.  

Filtering by IP Address

B.  

Display Filtering by Protocol

C.  

Monitoring the Specific Ports

D.  

Follow TCP Stream

Discussion 0
Questions 120

Dr. Evelyn Reed, a cybersecurity expert, was called in to investigate a series of unusual activities at " Global Innovations Inc. " The first red flag was a surge in spear-phishing emails targeting senior management, disguised as urgent internal memos. Soon after, the company ' s web server showed unexpected outbound traffic to unfamiliar IP addresses. A network audit revealed that multiple underutilized printers and routers had unauthorized firmware installed. Further review uncovered inconsistencies in file access logs linked to the R & D department, including unusually large data transfers occurring during non-business hours. Dr. Reed also noted the attackers appeared to have intimate knowledge of the organization ' s internal data structure.

Which phase of the Advanced Persistent Threat (APT) lifecycle is Global Innovations Inc. most likely experiencing, given the combination of these incidents?

Options:

A.  

Initial Intrusion

B.  

Expansion

C.  

Search and Exfiltration

D.  

Persistence

Discussion 0
Questions 121

A corporation uses both hardware-based and cloud-based solutions to distribute incoming traffic and absorb DDoS attacks, ensuring legitimate requests remain unaffected. Which DDoS mitigation strategy is being utilized?

Options:

A.  

Black Hole Routing

B.  

Load Balancing

C.  

Sinkholing

D.  

Rate Limiting

Discussion 0
Questions 122

During a red team operation on a segmented enterprise network, the testers discover that the organization’s perimeter devices deeply inspect only connection-initiation packets (such as TCP SYN and HTTP requests). Response packets and ACK packets within established sessions, however, are minimally inspected. The red team needs to covertly transmit payloads to an internal compromised host by blending into normal session traffic. Which approach should they take to bypass these defensive mechanisms?

Options:

A.  

Port knocking

B.  

SYN scanning

C.  

ICMP flooding

D.  

ACK tunneling

Discussion 0
Questions 123

During a penetration test at a financial services firm in Boston, ethical hacker Daniel simulates a DDoS against the customer portal. To handle the surge, the IT team sets a rule that caps the number of requests a single user can make per second; aggressive connections are delayed or dropped while most legitimate customers continue to use the service.

Which countermeasure strategy is the IT team primarily using?

Options:

A.  

Rate Limiting

B.  

Shutting Down Services

C.  

Absorb the Attack

D.  

Degrading Services

Discussion 0
Questions 124

During a cryptographic audit of a legacy system, a security analyst observes that an outdated block cipher is leaking key-related information when analyzing large sets of plaintext–ciphertext pairs. What approach might an attacker exploit here?

Options:

A.  

Launch a key replay through IV duplication

B.  

Use linear approximations to infer secret bits

C.  

Modify the padding to obtain plaintext

D.  

Attack the hash algorithm for collisions

Discussion 0
Questions 125

At Norwest Freight Services, Simon, a junior analyst, is tasked with running a vulnerability scan on several departmental servers. This time, he is provided with administrator-level credentials to input into the scanner. The scan takes significantly longer than usual but returns detailed results, including weak registry permissions, outdated patches, and insecure configuration files that would not have been visible to an outsider. SIEM logs confirm that successful logins occurred during the scanning process.

Which type of vulnerability scan best explains the behavior observed in Simon ' s assessment?

Options:

A.  

External Scanning

B.  

Credentialed Scanning

C.  

Internal Scanning

D.  

Non-Credentialed Scanning

Discussion 0
Questions 126

Attackers abused Android Debug Bridge (ADB) to issue unauthorized commands. What is the strongest countermeasure?

Options:

A.  

Enforce VPN usage

B.  

Adopt biometric authentication

C.  

Disable ADB except in strictly controlled environments

D.  

Frequently update MDM systems

Discussion 0
Questions 127

Emily, a security engineer at a Chicago-based healthcare provider, is auditing the organization ' s new cloud environment after a breach where sensitive patient records were exposed. Her investigation reveals that the root cause was the lack of encryption during data transmission between end-user devices and cloud storage. To mitigate this issue and align with HIPAA compliance requirements, Emily must prioritize addressing the correct cloud computing security risk.

Which cloud computing threat should Emily address to mitigate the risk of sensitive data being exposed during transmission?

Options:

A.  

Multi-Tenancy and Physical Security

B.  

Incidence Analysis and Forensic Support

C.  

Service and Data Integration

D.  

Infrastructure Security

Discussion 0
Questions 128

A malware analyst finds JavaScript and /OpenAction keywords in a suspicious PDF using pdfid. What should be the next step to assess the potential impact?

Options:

A.  

Upload the file to VirusTotal

B.  

Extract and analyze stream objects using PDFStreamDumper

C.  

Compute file hashes for signature matching

Discussion 0
Questions 129

At Bayview University in San Francisco, California, ethical hacker Sofia Patel is evaluating security controls on Android 11 tablets used by staff. To simulate an attack, she installs KingoRoot.apk directly on one of the devices. The application leverages system vulnerabilities to elevate privileges without requiring a computer connection. Based on the module, which feature of this rooting approach makes the attack effective?

Options:

A.  

It uses a tethered jailbreak to restart the device with patched kernel functions

B.  

It is an APK that can run directly on the device without a PC

C.  

It relies on weak SSL validation to bypass application controls

D.  

It exploits Bluetooth pairing flaws to gain device-level privileges

Discussion 0
Questions 130

John, a penetration tester at a Los Angeles-based online gaming company, is analyzing the company ' s cloud infrastructure after a recent security breach caused unexpected downtime and delayed alerts. His investigation reveals that the attackers remained undetected, due to the absence of mechanisms that track function-level activity and capture anomalous events. The backend architecture for matchmaking and in-game purchases is serverless, increasing the importance of robust security measures.

So, which cloud computing threat should John prioritize to prevent similar breaches?

Options:

A.  

Insufficient logging and monitoring

B.  

Privilege escalation

C.  

Loss of governance

D.  

Side-channel attacks

Discussion 0
Questions 131

A government agency trains a group of cybersecurity experts to carry out covert cyber missions against foreign threats and gather intelligence without being detected. These experts work exclusively for national interests. What classification best describes them?

Options:

A.  

Organized hackers

B.  

State-sponsored hackers

C.  

Hacktivists

D.  

Gray hat hackers

Discussion 0
Questions 132

You discover an unpatched Android permission-handling vulnerability on a device with fully updated antivirus software. What is the most effective exploitation approach that avoids antivirus detection?

Options:

A.  

Develop a custom exploit using obfuscation techniques

B.  

Use Metasploit to deploy a known payload

C.  

Install a rootkit to manipulate the device

D.  

Use SMS phishing to trick the user

Discussion 0
Questions 133

A penetration tester observes that traceroutes to various internal devices always show 10.10.10.1 as the second-to-last hop, regardless of the destination subnet. What does this pattern most likely indicate?

Options:

A.  

DNS poisoning at the local resolver used by the compromised host

B.  

Loopback misconfiguration at the destination endpoints

C.  

A core router facilitating communication across multiple internal subnets

D.  

Presence of a transparent proxy device acting as a forwarder

Discussion 0
Questions 134

A penetration tester is assessing a mobile application and discovers that the app is vulnerable to improper session management. The session tokens are not invalidated upon logout, allowing the tokens to be reused. What is the most effective way to exploit this vulnerability?

Options:

A.  

Perform a replay attack by using the same session token after the user logs out

B.  

Use a Cross-Site Request Forgery (CSRF) attack to steal the session tokens

C.  

Use a brute-force attack to guess valid session tokens

D.  

Execute a SQL injection attack to retrieve session tokens from the database

Discussion 0
Questions 135

At a cybersecurity consultancy firm in Boston, senior analyst Amanda Liu is called in to assess a malware outbreak affecting a regional healthcare provider. Despite using updated antivirus tools, the security team notices inconsistent detection across infected endpoints. Amanda discovers that while the malicious behavior is consistent, system file tampering and suspicious outbound traffic, each malware sample has a slightly different code structure and fails traditional hash-based comparison. Static analysis reveals that the underlying logic remains unchanged, but the code patterns vary unpredictably across infections. What type of virus is most likely responsible for this behavior?

Options:

A.  

Cavity virus

B.  

Macro virus

C.  

Polymorphic virus

D.  

Stealth virus

Discussion 0
Questions 136

You must map open ports and services while remaining stealthy and avoiding IDS detection. Which scanning technique is best?

Options:

A.  

FIN Scan

B.  

TCP Connect Scan

C.  

ACK Scan

D.  

Stealth Scan (SYN Scan)

Discussion 0
Questions 137

As a security analyst, you are testing a company’s network for potential vulnerabilities. You suspect an attacker may be using MAC flooding to compromise network switches and sniff traffic. Which of the following indicators would most likely confirm your suspicion?

Options:

A.  

An increased number of ARP requests in network traffic.

B.  

Multiple MAC addresses assigned to a single IP address.

C.  

Multiple IP addresses assigned to a single MAC address.

D.  

Numerous MAC addresses associated with a single switch port.

Discussion 0
Questions 138

An attacker uses many plaintext–ciphertext pairs and applies statistical analysis to XOR combinations of specific bits. Which technique is being used?

Options:

A.  

Brute-force attack

B.  

Differential cryptanalysis

C.  

Linear cryptanalysis

D.  

Side-channel attack

Discussion 0
Questions 139

You perform a network scan using ICMP Echo Requests and observe that certain IP addresses do not return Echo Replies, while other network services remain functional. How should this situation be interpreted?

Options:

A.  

The scanned IPs are unused and available for expansion

B.  

The lack of replies indicates a major breach

C.  

A firewall or security control is blocking ICMP Echo Requests

D.  

The non-responsive IPs indicate severe congestion

Discussion 0
Questions 140

Working as an Information Security Analyst, you are creating training material on session hijacking. Which scenario best describes a side jacking attack?

Options:

A.  

An attacker uses social engineering to trick an employee into revealing their password.

B.  

An attacker intercepts network traffic, captures unencrypted session cookies, and uses these to impersonate the user.

C.  

An attacker exploits a firewall vulnerability to gain access to internal systems.

D.  

An attacker convinces an employee to visit a malicious site that injects a script into their browser.

Discussion 0
Questions 141

You are an ethical hacker at Sentinel Cyberworks, engaged to assess the wireless defenses of HarborTrust Bank in Portland, Oregon. During your assessment, the security team shows you a production system that continuously places selected APs into a passive scan mode, aggregates alarms from multiple wireless controllers into a central engine for forensic storage, and can automatically apply countermeasures (for example, time-sliced channel scanning and remote configuration changes) across the campus when it classifies a nearby device as malicious. Based on the described capabilities, which Wi-Fi security solution is this most consistent with?

Options:

A.  

WatchGuard Wi-Fi Cloud WIPS

B.  

RFProtect

C.  

Fern WiFi Cracker

D.  

Cisco Adaptive Wireless IPS

Discussion 0
Questions 142

Which best describes the role of a penetration tester?

Options:

A.  

Unauthorized malicious hacker

B.  

Malware distributor

C.  

Authorized security professional who exploits vulnerabilities

D.  

Malicious code developer

Discussion 0
Questions 143

During an external assessment of a healthcare insurance company in Houston, a penetration tester identifies a service running on TCP port 389. When queried, the service accepts anonymous binds and reveals directory data. By structuring his search filter, the tester is able to obtain usernames, departmental details, and organizational units. This information could potentially be used for targeted password attacks or privilege escalation.

Which classification best describes this enumeration activity?

Options:

A.  

SMTP Enumeration

B.  

DNS Enumeration

C.  

LDAP Enumeration

D.  

NTP Enumeration

Discussion 0
Questions 144

A serverless application was compromised through an insecure third-party API used by a function. What is the most effective countermeasure?

Options:

A.  

Deploy a cloud-native security platform

B.  

Enforce function-level least privilege permissions

C.  

Use a CASB for third-party services

D.  

Regularly update serverless functions

Discussion 0
Questions 145

During a compliance review at a law firm in Chicago, an ethical hacker tests the firm’s secure email gateway. She observes that sensitive legal documents are being transmitted in clear text over the Internet, allowing anyone intercepting the traffic to read the contents. The firm is concerned about unauthorized individuals being able to view these communications. Which principle of information security is being violated?

Options:

A.  

Confidentiality

B.  

Integrity

C.  

Non-Repudiation

D.  

Availability

Discussion 0
Questions 146

A malware analyst is tasked with evaluating a suspicious PDF file suspected of launching attacks through embedded JavaScript. Initial scans using pdfid show the presence of /JavaScript and /OpenAction keywords. What should the analyst do next to understand the potential impact?

Options:

A.  

Upload the file to VirusTotal and rely on engine consensus

B.  

Disassemble the PDF using PE Explorer

C.  

Extract and analyze stream objects using PDFStreamDumper

D.  

Compute file hashes using HashMyFiles for signature matching

Discussion 0
Questions 147

During a red team assessment, an ethical hacker must map a large multinational enterprise’s external attack surface. Due to strict rules of engagement, no active scans may be used. The goal is to identify publicly visible subdomains to uncover forgotten or misconfigured services. Which method should the ethical hacker use to passively enumerate the organization’s subdomains?

Options:

A.  

Leverage tools like Netcraft or DNSdumpster to gather subdomain information

B.  

Attempt to guess admin credentials and access the company’s DNS portal

C.  

Conduct a brute-force DNS subdomain enumeration

D.  

Request internal DNS records using spoofed credentials

Discussion 0
Questions 148

In the crisp mountain air of Denver, Colorado, ethical hacker Lila Chen investigates the security framework of MedVault, a US-based healthcare platform used by regional clinics to manage patient data. During her assessment, Lila manipulates session parameters while navigating the patient portal’s dashboard. Her tests reveal a critical flaw: the system allows users to access sensitive medical records not associated with their own account, enabling unauthorized changes to private health data. Upon deeper inspection, Lila determines that the issue stems from the application allowing users to perform actions beyond their assigned roles rather than failures in encryption, unsafe object handling, or server configuration.

Which OWASP Top 10 2021 vulnerability is Lila most likely exploiting in MedVault’s web application?

Options:

A.  

Security Misconfiguration

B.  

Insecure Deserialization

C.  

Cryptographic Failures

D.  

Broken Access Control

Discussion 0
Questions 149

As a Certified Ethical Hacker, you are assessing a corporation’s serverless cloud architecture. The organization experienced an attack where a user manipulated a function-as-a-service (FaaS) component to execute malicious commands. The root cause was traced to an insecure third-party API used within a serverless function. What is the most effective countermeasure to strengthen the security posture?

Options:

A.  

Regularly updating serverless functions to reduce vulnerabilities.

B.  

Using a Cloud Access Security Broker (CASB) to enforce third-party policies.

C.  

Deploying a Cloud-Native Security Platform (CNSP) for full cloud protection.

D.  

Implementing function-level permissions and enforcing the principle of least privilege.

Discussion 0
Questions 150

During a penetration testing engagement at First Union Bank in Chicago, ethical hacker Rachel Morgan is assigned to assess the internal network for potential sniffing activity that could compromise sensitive customer data. While inspecting traffic in the loan processing department, Rachel observes that a workstation is receiving packets not addressed to it, raising suspicion of a sniffing tool operating in promiscuous mode. To validate her hypothesis, she prepares to conduct an active verification using a classic detection approach.

Which detection technique should Rachel use to confirm the presence of a sniffer in this case?

Options:

A.  

Sniffer detection using an NSE script to check for promiscuous mode

B.  

DNS method by monitoring reverse DNS lookup traffic

C.  

ARP method by sending non-broadcast ARP requests

D.  

Ping method by sending packets with an incorrect MAC address

Discussion 0
Questions 151

During a security assessment, a consultant investigates how the application handles requests from authenticated users. They discover that once a user logs in, the application does not verify the origin of subsequent requests. To exploit this, the consultant creates a web page containing a malicious form that submits a funds transfer request to the application. A logged-in user, believing the page is part of a promotional campaign, fills out the form and submits it. The application processes the request successfully without any reauthentication or user confirmation, completing the transaction under the victim’s session. Which session hijacking technique is being used in this scenario?

Options:

A.  

Hijacking a user session using a session fixation attack

B.  

Hijacking a user session using a session replay attack

C.  

Hijacking a user session using a cross-site request forgery attack

D.  

Hijacking a user session using a cross-site script attack

Discussion 0
Questions 152

A Nessus scan reveals a critical SSH vulnerability (CVSS 9.0) allowing potential remote code execution on a Linux server. What action should be immediately prioritized?

Options:

A.  

Redirect SSH traffic to another server

B.  

Treat the finding as a possible false positive

C.  

Immediately apply vendor patches and reboot during scheduled downtime

D.  

Temporarily isolate the affected server, conduct a forensic audit, and then patch

Discussion 0
Questions 153

During a security audit, a penetration tester observes abnormal redirection of all traffic for a financial institution’s primary domain. Users are being redirected to a phishing clone of the website. Investigation shows the authoritative DNS server was compromised and its zone records modified to point to the attacker’s server. This demonstrates total manipulation of domain-level resolution, not cache poisoning or client-side attacks. Which technique is being used in this scenario?

Options:

A.  

Establish covert communication using DNS tunneling over standard DNS queries

B.  

Perform DNS rebinding to manipulate browser-origin interactions

C.  

Carry out DNS server hijacking by tampering with the legitimate name-resolution infrastructure

D.  

Initiate a DNS amplification attack using recursive servers

Discussion 0
Questions 154

During a security evaluation of a smart agriculture setup, an analyst investigates a cloud-managed irrigation controller. The device is found to transmit operational commands and receive firmware updates over unencrypted HTTP. Additionally, it lacks mechanisms to verify the integrity or authenticity of those updates. This vulnerability could allow an adversary to intercept communications or inject malicious firmware, leading to unauthorized control over the device ' s behavior or denial of essential functionality. Which IoT threat category does this situation best illustrate?

Options:

A.  

Insecure default settings

B.  

Insecure ecosystem interfaces

C.  

Insufficient privacy protection

D.  

Insecure network services

Discussion 0
Questions 155

A penetration tester is assessing a company ' s executive team for vulnerability to sophisticated social engineering attacks by impersonating a trusted vendor and leveraging internal communications. What is the most effective social engineering technique to obtain sensitive executive credentials without being detected?

Options:

A.  

Develop a fake social media profile to connect with executives and request private information

B.  

Conduct a phone call posing as the CEO to request immediate password changes

C.  

Create a targeted spear-phishing email that references recent internal projects and requests credential verification

D.  

Send a mass phishing email with a malicious link disguised as a company-wide update

Discussion 0
Questions 156

You are a security analyst at Sentinel IT Services, monitoring the web application of GreenValley Credit Union in Portland, Oregon. During a log analysis, you identify an SQL injection attempt on the customer login portal, where the attacker inputs a malicious string to manipulate the query logic. The application mitigates this by replacing special characters with their escaped equivalents to prevent query manipulation before the query is executed, ensuring the SQL statement remains unchanged. Based on the observed defense mechanism, which SQL injection countermeasure is the application employing?

Options:

A.  

Perform user input validation

B.  

Encoding the single quote

C.  

Restrict database access

D.  

Use parameterized queries or prepared statements

Discussion 0
Questions 157

While assessing a web server, a tester sends malformed HTTP requests and compares responses to identify the server type and version. What technique is being employed?

Options:

A.  

Fingerprinting server identity using banner-grabbing techniques

B.  

Sending phishing emails to extract web server login credentials

C.  

Conducting session fixation using malformed cookie headers

D.  

Injecting scripts into headers for persistent XSS attacks

Discussion 0
Questions 158

During a penetration test at Cascade Financial in Seattle, ethical hacker Elena Vasquez probes the input handling of the company ' s web server. She discovers that a single crafted request is processed as two separate ones, allowing her to inject malicious data into the server ' s communication. This type of attack falls into the same category of input validation flaws as cross-site scripting (XSS), cross-site request forgery (CSRF), and SQL injection. Which type of web server attack is Elena most likely demonstrating?

Options:

A.  

Password Cracking Attack

B.  

HTTP Response Splitting Attack

C.  

Directory Traversal Attack

D.  

Web Cache Poisoning Attack

Discussion 0
Questions 159

At a government research lab, cybersecurity officer Nikhil is compiling a vulnerability assessment report after scanning the internal subnet. As part of his documentation, he lists the IP addresses of all scanned hosts and specifies which machines are affected. He includes tables categorizing discovered vulnerabilities by type such as outdated software, default credentials, and open ports.

Which section of the vulnerability assessment report is Nikhil working on?

Options:

A.  

Findings

B.  

Risk Assessment

C.  

Supporting Information

D.  

Assessment Overview

Discussion 0
Questions 160

A penetration tester is assessing a company’s vulnerability to advanced social engineering attacks targeting its legal department. Using detailed knowledge of mergers and legal proceedings, the tester crafts a highly credible pretext to deceive legal employees into sharing confidential case documents. What is the most effective technique?

Options:

A.  

Send a spear-phishing email referencing specific merger details and requesting document access

B.  

Create a fake LinkedIn profile to connect with legal employees and request document sharing

C.  

Visit the office in person posing as a new legal intern to request document access

D.  

Conduct a mass phishing campaign with generic legal templates attached

Discussion 0
Questions 161

While analyzing suspicious network activity, you observe a slow, stealthy scanning technique that is difficult to trace back to the attacker. Which scenario best describes the scanning technique being used?

Options:

A.  

The attacker sends FIN packets to infer port states based on responses

B.  

The attacker uses a “zombie” machine to perform scans, hiding their true identity

C.  

The attacker performs full TCP connect scans on all ports

D.  

The attacker sends packets with all TCP flags set

Discussion 0
Questions 162

Fleet vehicles with smart locking systems were compromised after attackers captured unique signals from key fobs. What should the security team prioritize to confirm and prevent this attack?

Options:

A.  

Secure firmware updates

B.  

Increase physical surveillance

C.  

Deploy anti-malware on smartphones

D.  

Monitor wireless signals for jamming or interference

Discussion 0
Questions 163

Multiple internal workstations and IoT devices are compromised and transmitting large volumes of traffic to numerous external targets under botnet control. Which type of denial-of-service attack best describes this situation?

Options:

A.  

An attack where compromised internal devices participate in a botnet and flood external targets

B.  

An attack relying on spoofed IP addresses to trick external servers

C.  

A direct botnet flood without spoofing intermediary services

D.  

An internal amplification attack using spoofed DNS responses

Discussion 0
Questions 164

During a security assessment of a metropolitan public transportation terminal, a penetration tester examines a network-connected IoT surveillance camera system used for 24/7 video monitoring. The camera uses outdated SSLv2 encryption to transmit video data. The tester intercepts and decrypts video streams due to the weak encryption and absence of authentication mechanisms. What IoT vulnerability is most likely being exploited in this scenario?

Options:

A.  

Insecure data transfer and storage

B.  

Jamming attack on RF communication

C.  

Credential theft via web application

D.  

Replay attack on wireless signals

Discussion 0
Questions 165

A penetration tester targets a company ' s executive assistants by referencing upcoming board meetings in an email requesting access to confidential agendas. What is the most effective social engineering technique to obtain the necessary credentials without raising suspicion?

Options:

A.  

Create a personalized email referencing specific meetings and request access

B.  

Call posing as a trusted IT support to verify credentials

C.  

Send a mass phishing email with a fake meeting link

D.  

Develop a fake LinkedIn profile to connect and request information

Discussion 0
Questions 166

Customer data in a cloud environment was exposed due to an unknown vulnerability. What is the most likely cause?

Options:

A.  

Misconfigured security groups

B.  

Brute force attack

C.  

DoS attack

D.  

Side-channel attack

Discussion 0
Questions 167

A penetration tester submits altered ciphertexts to a web server and pays close attention to how the server responds. When the server produces different error messages for certain inputs, the tester starts to infer which inputs result in valid internal processing. Which cryptanalytic method is being used in this scenario?

Options:

A.  

Exploit padding error feedback to recover data

B.  

Compare traffic timing to deduce the key

C.  

Flip bits randomly to scramble the decryption

D.  

Inspect randomness across multiple sessions

Discussion 0
Questions 168

A tester evaluates a login form that builds SQL queries using unsanitized input. By submitting a single quote ( ' ), the tester bypasses authentication and logs in. What type of SQL injection occurred?

Options:

A.  

UNION-based SQL injection

B.  

Error-based SQL injection

C.  

Time-based blind SQL injection

D.  

Tautology-based SQL injection

Discussion 0
Questions 169

An ethical hacker conducts testing with full knowledge and permission. What type of hacking is this?

Options:

A.  

Blue Hat

B.  

Grey Hat

C.  

White Hat

D.  

Black Hat

Discussion 0
Questions 170

A cybersecurity analyst monitors competitors’ web content for changes indicating strategic shifts. Which missing component is most crucial for effective passive surveillance?

Options:

A.  

Participating in competitors’ blogs and forums

B.  

Setting up Google Alerts for competitor names and keywords

C.  

Using a VPN to hide the analyst’s IP address

D.  

Hiring a third party to hack competitor databases

Discussion 0
Questions 171

During a routine security audit, administrators discover that cloud storage backups were illegally accessed and modified. Which countermeasure would most directly mitigate such incidents in the future?

Options:

A.  

Implementing resource auto-scaling

B.  

Regularly conducting SQL injection testing

C.  

Deploying biometric entry systems

D.  

Adopting the 3-2-1 backup model

Discussion 0
Questions 172

During a penetration test at a manufacturing company in Detroit, Amanda, a senior security consultant, scans several legacy Linux servers. On one host, she discovers an open port used for file transfer that allows anonymous login. Once connected, she is able to view the directory structure and check available files, which helps her identify potential sensitive information exposure. She also notices background traffic on a UDP service related to NetBIOS name lookups, but she continues probing the file transfer service to confirm user access weaknesses.

Which ports and services should Amanda prioritize for this enumeration activity?

Options:

A.  

TCP 23 and UDP 137, 138

B.  

TCP 21 and UDP 137

C.  

TCP 25 and UDP 138

D.  

TCP 139 and UDP 137, 138

Discussion 0
Questions 173

A cybersecurity research team identifies suspicious behavior on a user’s Android device. Upon investigation, they discover that a seemingly harmless app, downloaded from a third-party app store, has silently overwritten several legitimate applications such as WhatsApp and SHAREit. These fake replicas maintain the original icon and user interface but serve intrusive advertisements and covertly harvest credentials and personal data in the background. The attackers achieved this by embedding malicious code in utility apps like video editors and photo filters, which users were tricked into installing. The replacement occurred without user consent, and the malicious code communicates with a command-and-control (C & C) server to execute further instructions. What type of attack is being carried out in this scenario?

Options:

A.  

Simjacker attack

B.  

Man-in-the-Disk attack

C.  

Agent Smith attack

D.  

Camfecting attack

Discussion 0
Questions 174

A cybersecurity research team identifies suspicious behavior on a user’s Android device. Upon investigation, they discover that a seemingly harmless app, downloaded from a third-party app store, has silently overwritten several legitimate applications such as WhatsApp and SHAREit. These fake replicas maintain the original icon and user interface but serve intrusive advertisements and covertly harvest credentials and personal data in the background. The attackers achieved this by embedding malicious code in utility apps like video editors and photo filters, which users were tricked into installing. The replacement occurred without user consent, and the malicious code communicates with a command-and-control (C & C) server to execute further instructions. What type of attack is being carried out in this scenario?

Options:

A.  

Simjacker attack

B.  

Man-in-the-Disk attack

C.  

Agent Smith attack

D.  

Camfecting attack

Discussion 0
Questions 175

As a Certified Ethical Hacker assessing session management vulnerabilities in a secure web application using MFA, encrypted cookies, and a WAF, which technique would most effectively exploit a session management weakness while bypassing these defenses?

Options:

A.  

Utilizing Session Fixation to force a victim to use a known session ID

B.  

Executing a Cross-Site Request Forgery (CSRF) attack

C.  

Exploiting insecure deserialization vulnerabilities for code execution

D.  

Conducting Session Sidejacking using captured session tokens

Discussion 0