New Year Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Certified Ethical Hacker Exam (CEHv13) Question and Answers

Certified Ethical Hacker Exam (CEHv13)

Last Update Jan 14, 2026
Total Questions : 873

We are offering FREE 312-50v13 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare 312-50v13 free exam questions and then go for complete pool of Certified Ethical Hacker Exam (CEHv13) test questions that will help you more.

312-50v13 pdf

312-50v13 PDF

$36.75  $104.99
312-50v13 Engine

312-50v13 Testing Engine

$43.75  $124.99
312-50v13 PDF + Engine

312-50v13 PDF + Testing Engine

$57.75  $164.99
Questions 1

You discover multiple NetBIOS responses during an nbtscan, but only one host returns a <1B> entry. What does this indicate?

Options:

A.  

It is the local system

B.  

It is a rogue DHCP server

C.  

It is the domain master browser / Primary Domain Controller (PDC)

D.  

NetBIOS over TCP/IP is disabled

Discussion 0
Questions 2

Which command can be used to show the current TCP/IP connections?

Options:

A.  

Netsh

B.  

Netstat

C.  

Net use connection

D.  

Net use

Discussion 0
Questions 3

Which of the following Google advanced search operators helps an attacker in gathering information about websites that are similar to a specified target URL?

Options:

A.  

inurl:

B.  

related:

C.  

info:

D.  

site:

Discussion 0
Questions 4

Being a Certified Ethical Hacker (CEH), a company has brought you on board to evaluate the safety measures in place for their network system. The company uses a network time protocol server in the demilitarized zone.

During your enumeration, you decide to run a ntptrace command. Given the syntax: ntptrace [-n] [-m maxhosts] [servername/IP_address], which command usage would best serve your objective to find where the NTP server obtains the time from and to trace the list of NTP servers connected to the network?

Options:

A.  

ntptrace -m 5 192.168.1.1

B.  

tptrace 192.1681.

C.  

ntptrace -n localhost

D.  

ntptrace -n -m 5 192.168.1.1

Discussion 0
Questions 5

You are performing a penetration test for a client and have gained shell access to a Windows machine on the internal network. You intend to retrieve all DNS records for the internal domain. If the DNS server is at 192.168.10.2 and the domain name is abccorp.local, what command would you type at the nslookup prompt to attempt a zone transfer?

Options:

A.  

list server=192.168.10.2 type=all

B.  

is-d abccorp.local

C.  

lserver 192.168.10.2 -t all

D.  

ls -d abccorp.local

Discussion 0
Questions 6

This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-2S6. MMAC-SHA384, and ECDSA using a 384-bit elliptic curve. Which is this wireless security protocol?

Options:

A.  

WPA2 Personal

B.  

WPA3-Personal

C.  

WPA2-Enterprise

D.  

WPA3-Enterprise

Discussion 0
Questions 7

A global media streaming platform experiences traffic surges every 10 minutes, with spikes over 300 Gbps followed by quiet intervals. Which DDoS attack explains this behavior?

Options:

A.  

UDP flood sustained attack

B.  

Recursive HTTP GET flood

C.  

Permanent DoS (PDoS)

D.  

Pulse Wave attack

Discussion 0
Questions 8

What kind of detection technique is used in antivirus software that collects data from multiple protected systems and performs analysis in a cloud-based environment?

Options:

A.  

VCloud based

B.  

Honeypot based

C.  

Behavior based

D.  

Heuristics based

Discussion 0
Questions 9

While testing a web application that relies on JavaScript-based client-side security controls, which method is most effective for bypassing these controls without triggering server-side alerts?

Options:

A.  

Reverse-engineering the proprietary encryption algorithm

B.  

Disabling JavaScript in the browser and submitting invalid data

C.  

Injecting malicious JavaScript into the login page

D.  

Using a proxy tool to intercept and modify client-side requests

Discussion 0
Questions 10

What is the main difference between ethical hacking and malicious hacking?

Options:

A.  

Ethical hacking is illegal, while malicious hacking is legal

B.  

Ethical hackers use different tools than malicious hackers

C.  

Ethical hacking is performed with permission, while malicious hacking is unauthorized

D.  

Ethical hackers always work alone, while malicious hackers work in teams

Discussion 0
Questions 11

Which Nmap switch helps evade IDS or firewalls?

Options:

A.  

-n/-R

B.  

-0N/-0X/-0G

C.  

-T

D.  

-D

Discussion 0
Questions 12

A vulnerability has a score of 9.8. What does this rating help explain?

Options:

A.  

It quantifies impact and exploitability to prioritize remediation

B.  

It measures authentication errors

C.  

It generates exploit payloads

D.  

It classifies attacks qualitatively

Discussion 0
Questions 13

During a targeted phishing campaign, a malicious HTML attachment reconstructs malware locally using obfuscated JavaScript without making external network calls, bypassing firewalls and IDS inspection. Which evasion technique is being employed?

Options:

A.  

HTML smuggling

B.  

Port forwarding

C.  

Cross-site scripting

D.  

HTTP header spoofing

Discussion 0
Questions 14

While browsing his Facebook feed, Matt sees a picture one of his friends posted with the caption, "Learn more about your friends!", along with a number of personal questions. Matt is suspicious and texts his friend, who confirms that he did indeed post it. With assurance that the post is legitimate, Matt responds to the questions in the post. A few days later, Matt's bank account has been accessed, and the password has been changed. What most likely happened?

Options:

A.  

Matt inadvertently provided the answers to his security questions when responding to the post.

B.  

Matt's bank account login information was brute forced.

C.  

Matt inadvertently provided his password when responding to the post.

D.  

Matt's computer was infected with a keylogger.

Discussion 0
Questions 15

One of your team members has asked you to analyze the following SOA record.

What is the TTL?

Rutgers.edu. SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.)

Options:

A.  

200303028

B.  

3600

C.  

604800

D.  

2400

E.  

60

F.  

4800

Discussion 0
Questions 16

A "Server-Side Includes" attack refers to the exploitation of a web application by injecting scripts in HTML pages or executing arbitrary code remotely.

Which web-page file type, if it exists on the web server, is a strong indication that the server is vulnerable to this kind of attack?

Options:

A.  

.stm

B.  

.html

C.  

.rss

D.  

.cms

Discussion 0
Questions 17

Which of the following provides a security professional with most information about the system’s security posture?

Options:

A.  

Phishing, spamming, sending trojans

B.  

Social engineering, company site browsing, tailgating

C.  

Wardriving, warchalking, social engineering

D.  

Port scanning, banner grabbing, service identification

Discussion 0
Questions 18

A company’s Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application.

What kind of Web application vulnerability likely exists in their software?

Options:

A.  

Cross-site scripting vulnerability

B.  

SQL injection vulnerability

C.  

Web site defacement vulnerability

D.  

Gross-site Request Forgery vulnerability

Discussion 0
Questions 19

Which type of security feature stops vehicles from crashing through the doors of a building?

Options:

A.  

Bollards

B.  

Receptionist

C.  

Mantrap

D.  

Turnstile

Discussion 0
Questions 20

You must map open ports and services while remaining stealthy and avoiding IDS detection. Which scanning technique is best?

Options:

A.  

FIN Scan

B.  

TCP Connect Scan

C.  

ACK Scan

D.  

Stealth Scan (SYN Scan)

Discussion 0
Questions 21

A penetration tester targets a company's executive assistants by referencing upcoming board meetings in an email requesting access to confidential agendas. What is the most effective social engineering technique to obtain the necessary credentials without raising suspicion?

Options:

A.  

Create a personalized email referencing specific meetings and request access

B.  

Call posing as a trusted IT support to verify credentials

C.  

Send a mass phishing email with a fake meeting link

D.  

Develop a fake LinkedIn profile to connect and request information

Discussion 0
Questions 22

You are analyzing traffic on the network with Wireshark. You want to routinely run a cron job which will run the capture against a specific set of IPs - 192.168.8.0/24. What command would you use?

Options:

A.  

wireshark --fetch '192.168.8*'

B.  

wireshark --capture --local masked 192.168.8.0 ---range 24

C.  

tshark -net 192.255.255.255 mask 192.168.8.0

D.  

sudo tshark -f "net 192.168.8.0/24"

Discussion 0
Questions 23

Gilbert, a web developer, uses a centralized web API to reduce complexity and increase the Integrity of updating and changing data. For this purpose, he uses a web service that uses HTTP methods such as PUT. POST. GET. and DELETE and can improve the overall performance, visibility, scalability, reliability, and portability of an application. What is the type of web-service API mentioned in the above scenario?

Options:

A.  

JSON-RPC

B.  

SOAP API

C.  

RESTful API

D.  

REST API

Discussion 0
Questions 24

Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days, Bob denies that he had ever sent a mail. What do you want to "know" to prove yourself that it was Bob who had sent the mail?

Options:

A.  

Authentication

B.  

Confidentiality

C.  

Integrity

D.  

Non-Repudiation

Discussion 0
Questions 25

A known vulnerability exists on a production server, but patching is delayed due to operational constraints. What immediate action can reduce risk without disrupting operations?

Options:

A.  

Conduct a full penetration test

B.  

Shut down the server

C.  

Monitor traffic continuously

D.  

Implement Virtual Patching

Discussion 0
Questions 26

An Internet Service Provider (ISP) has a need to authenticate users connecting via analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network.

Which AAA protocol is the most likely able to handle this requirement?

Options:

A.  

TACACS+

B.  

DIAMETER

C.  

Kerberos

D.  

RADIUS

Discussion 0
Questions 27

A future-focused security audit discusses risks where attackers collect encrypted data today, anticipating they will be able to decrypt it later using quantum computers. What is this threat commonly known as?

Options:

A.  

Saving data today for future quantum decryption

B.  

Breaking RSA using quantum algorithms

C.  

Flipping qubit values to corrupt output

D.  

Replaying intercepted quantum messages

Discussion 0
Questions 28

Within the context of Computer Security, which of the following statements describes Social Engineering best?

Options:

A.  

Social Engineering is the act of publicly disclosing information

B.  

Social Engineering is the means put in place by human resource to perform time accounting

C.  

Social Engineering is the act of getting needed information from a person rather than breaking into a system

D.  

Social Engineering is a training program within sociology studies

Discussion 0
Questions 29

What is the role of test automation in security testing?

Options:

A.  

It is an option but it tends to be very expensive.

B.  

It should be used exclusively. Manual testing is outdated because of low speed and possible test setup inconsistencies.

C.  

Test automation is not usable in security due to the complexity of the tests.

D.  

It can accelerate benchmark tests and repeat them with a consistent test setup. But it cannot replace manual testing completely.

Discussion 0
Questions 30

As a cybersecurity professional at XYZ Corporation, you are tasked with investigating anomalies in system logs that suggest potential unauthorized activity. System administrators have detected repeated failed login attempts on a critical server, followed by a sudden surge in outbound data traffic. These indicators suggest a possible compromise. Given the sensitive nature of the system and the sophistication of the threat, what should be your initial course of action?

Options:

A.  

Conduct real-time monitoring of the server, analyze logs for abnormal patterns, and identify the nature of the activity to formulate immediate countermeasures.

B.  

Conduct a comprehensive audit of all outbound traffic and analyze destination IP addresses to map the attacker’s network.

C.  

Immediately reset all server credentials and instruct all users to change their passwords.

D.  

Immediately disconnect the affected server from the network to prevent further data exfiltration.

Discussion 0
Questions 31

Robin, an attacker, is attempting to bypass the firewalls of an organization through the DNS tunneling method in order to exfiltrate data. He is using the NSTX tool for bypassing the firewalls. On which of the following ports should Robin run the NSTX tool?

Options:

A.  

Port 53

B.  

Port 23

C.  

Port 50

D.  

Port 80

Discussion 0
Questions 32

Windows LAN Manager (LM) hashes are known to be weak.

Which of the following are known weaknesses of LM? (Choose three.)

Options:

A.  

Converts passwords to uppercase.

B.  

Hashes are sent in clear text over the network.

C.  

Makes use of only 32-bit encryption.

D.  

Effective length is 7 characters.

Discussion 0
Questions 33

Which advanced session-hijacking technique is hardest to detect and mitigate?

Options:

A.  

Covert XSS attack

B.  

Man-in-the-Browser (MitB) attack

C.  

Passive sniffing on Wi-Fi

D.  

Session fixation

Discussion 0
Questions 34

Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two. What would you call this attack?

Options:

A.  

Interceptor

B.  

Man-in-the-middle

C.  

ARP Proxy

D.  

Poisoning Attack

Discussion 0
Questions 35

The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate the SLE, ARO, and ALE. Assume the EF = 1(100%). What is the closest approximate cost of this replacement and recovery operation per year?

Options:

A.  

$1320

B.  

$440

C.  

$100

D.  

$146

Discussion 0
Questions 36

You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has Snort installed, and the second machine (192.168.0.150) has Kiwi Syslog installed. You perform a SYN scan in your network, and you notice that Kiwi Syslog is not receiving the alert message from Snort. You decide to run Wireshark on the Snort machine to check if the messages are going to the Kiwi Syslog machine. What Wireshark filter will show the connections from the Snort machine to Kiwi Syslog machine?

Options:

A.  

tcp.srcport==514 && ip.src==192.168.0.99

B.  

tcp.srcport==514 && ip.src==192.168.150

C.  

tcp.dstport==514 && ip.dst==192.168.0.99

D.  

tcp.dstport==514 && ip.dst==192.168.0.150

Discussion 0
Questions 37

A multinational corporation recently survived a severe Distributed Denial-of-Service (DDoS) attack and has implemented enhanced security measures. During an audit, you discover that the organization uses both hardware- and cloud-based solutions to distribute incoming traffic in order to absorb and mitigate DDoS attacks while ensuring legitimate traffic remains available. What type of DDoS mitigation strategy is the company utilizing?

Options:

A.  

Black Hole Routing

B.  

Load Balancing

C.  

Rate Limiting

D.  

Sinkholing

Discussion 0
Questions 38

Harry. a professional hacker, targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection. What is the APT lifecycle phase that Harry is currently executing?

Options:

A.  

Preparation

B.  

Cleanup

C.  

Persistence

D.  

initial intrusion

Discussion 0
Questions 39

An organization uses SHA-256 for data integrity checks but still experiences unauthorized data modification. Which cryptographic tool can help resolve this issue?

Options:

A.  

Asymmetric encryption

B.  

SSL/TLS certificates

C.  

Symmetric encryption

D.  

Digital signatures

Discussion 0
Questions 40

A penetration tester discovers that a web application is vulnerable to Local File Inclusion (LFI) due to improper input validation in a URL parameter. Which approach should the tester take to exploit this vulnerability?

Options:

A.  

Conduct a brute-force attack on the admin login page to gain access

B.  

Inject SQL commands into the URL parameter to test for database vulnerabilities

C.  

Perform a Cross-Site Scripting (XSS) attack by injecting malicious scripts into the URL

D.  

Use directory traversal to access sensitive files on the server, such as /etc/passwd

Discussion 0
Questions 41

Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the information, he successfully performed an attack on the target government organization without being traced. Which of the following techniques is described in the above scenario?

Options:

A.  

Dark web footprinting

B.  

VoIP footprinting

C.  

VPN footprinting

D.  

Website footprinting

Discussion 0
Questions 42

In the context of password security, a simple dictionary attack involves loading a dictionary file into a cracking application such as L0phtCrack or John the Ripper. The brute force method is slow but exhaustive. If you use both brute force and dictionary methods combined to vary words, what would you call such an attack?

Options:

A.  

Full Blown

B.  

Thorough

C.  

Hybrid

D.  

BruteDics

Discussion 0
Questions 43

The security team of Debry Inc. decided to upgrade Wi-Fi security to thwart attacks such as dictionary attacks and key recovery attacks. For this purpose, the security team started implementing cutting-edge technology that uses a modern key establishment protocol called the simultaneous authentication of equals (SAE), also known as dragonfly key exchange, which replaces the PSK concept.

What is the Wi-Fi encryption technology implemented by Debry Inc.?

Options:

A.  

WEP

B.  

WPA

C.  

WPA2

D.  

WPA3

Discussion 0
Questions 44

Which wireless security protocol replaces the personal pre-shared key (PSK) authentication with Simultaneous Authentication of Equals (SAE) and is therefore resistant to offline dictionary attacks?

Options:

A.  

WPA3-Personal

B.  

WPA2-Enterprise

C.  

Bluetooth

D.  

ZigBee

Discussion 0
Questions 45

A penetration tester evaluates a secure web application using HTTPS, secure cookies, and multi-factor authentication. To hijack a legitimate user’s session without triggering alerts, which technique should be used?

Options:

A.  

Exploit a browser zero-day vulnerability to inject malicious scripts

B.  

Implement a man-in-the-middle attack by compromising a trusted network device

C.  

Perform a Cross-Site Request Forgery (CSRF) attack to manipulate session tokens

D.  

Utilize a session token replay attack by capturing encrypted tokens

Discussion 0
Questions 46

What is the most common method to exploit the “Bash Bug” or “Shellshock” vulnerability?

Options:

A.  

SYN Flood

B.  

SSH

C.  

Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server

D.  

Manipulate format strings in text fields

Discussion 0
Questions 47

Your company performs penetration tests and security assessments for small and medium-sized businesses in the local area. During a routine security assessment, you discover information that suggests your client is involved with human trafficking.

What should you do?

Options:

A.  

Confront the client in a respectful manner and ask her about the data.

B.  

Copy the data to removable media and keep it in case you need it.

C.  

Ignore the data and continue the assessment until completed as agreed.

D.  

Immediately stop work and contact the proper legal authorities.

Discussion 0
Questions 48

A cyber attacker has initiated a series of activities against a high-profile organization following the Cyber Kill

Chain Methodology. The attacker is presently in the “Delivery” stage. As an Ethical Hacker, you are trying to

anticipate the adversary's next move. What is the most probable subsequent action from the attacker based on

the Cyber Kill Chain Methodology?

Options:

A.  

The attacker will attempt to escalate privileges to gain complete control of the compromised system.

B.  

The attacker will exploit the malicious payload delivered to the target organization and establish a foothold.

C.  

The attacker will initiate an active connection to the target system to gather more data.

D.  

The attacker will start reconnaissance to gather as much information as possible about the target.

Discussion 0
Questions 49

How can rainbow tables be defeated?

Options:

A.  

Use of non-dictionary words

B.  

All uppercase character passwords

C.  

Password salting

D.  

Lockout accounts under brute force password cracking attempts

Discussion 0
Questions 50

Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfilltrated by an attacker. AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any non-whitelisted programs, what type of malware did the attacker use to bypass the company's application whitelisting?

Options:

A.  

Phishing malware

B.  

Zero-day malware

C.  

File-less malware

D.  

Logic bomb malware

Discussion 0
Questions 51

A penetration tester is hired to legally assess the security of a company's network by identifying vulnerabilities and attempting to exploit them. What type of hacker is this?

Options:

A.  

Black Hat

B.  

Grey Hat

C.  

Script Kiddie

D.  

White Hat

Discussion 0
Questions 52

A penetration tester is assessing a company’s vulnerability to advanced social engineering attacks targeting its legal department. Using detailed knowledge of mergers and legal proceedings, the tester crafts a highly credible pretext to deceive legal employees into sharing confidential case documents. What is the most effective technique?

Options:

A.  

Send a spear-phishing email referencing specific merger details and requesting document access

B.  

Create a fake LinkedIn profile to connect with legal employees and request document sharing

C.  

Visit the office in person posing as a new legal intern to request document access

D.  

Conduct a mass phishing campaign with generic legal templates attached

Discussion 0
Questions 53

Shiela is an information security analyst working at HiTech Security Solutions. She is performing service version discovery using Nmap to obtain information about the running services and their versions on a target system.

Which of the following Nmap options must she use to perform service version discovery on the target host?

Options:

A.  

-SN

B.  

-SX

C.  

-sV

D.  

-SF

Discussion 0
Questions 54

Your network infrastructure is under a SYN flood attack. The attacker has crafted an automated botnet to

simultaneously send 's' SYN packets per second to the server. You have put measures in place to manage ‘f

SYN packets per second, and the system is designed to deal with this number without any performance issues.

If 's' exceeds ‘f', the network infrastructure begins to show signs of overload. The system's response time

increases exponentially (24k), where 'k' represents each additional SYN packet above the ff limit. Now, considering 's=500' and different 'f values, in which scenario is the server most likely to experience overload and significantly increased response times?

Options:

A.  

f=510: The server can handle 510 SYN packets per second, which is greater than what the attacker is sending. The system stays stable, and the response time remains unaffected

B.  

f=495: The server can handle 495 SYN packets per second. The response time drastically rises (245 = 32 times the normal), indicating a probable system overload

C.  

f=S05: The server can handle 505 SYN packets per second. In this case, the response time increases but not as drastically (245 = 32 times the normal), and the systern might still function, albeit slowly

D.  

f=420: The server can handle 490 SYN packets per second. With 's' exceeding ‘f by 10, the response time shoots up (2410 = 1024 times the usual response time), indicating a system overload

Discussion 0
Questions 55

Nedved is an IT Security Manager of a bank. One day, he found out there is a security breach involving a suspicious connection from the email server to an unknown IP. What is the first thing Nedved should do before contacting the incident response team?

Options:

A.  

Leave it as it is and contact the incident response team right away

B.  

Block the connection to the suspicious IP Address from the firewall

C.  

Disconnect the email server from the network

D.  

Migrate the connection to the backup email server

Discussion 0
Questions 56

As a part of an ethical hacking exercise, an attacker is probing a target network that is suspected to employ various honeypot systems for security. The attacker needs to detect and bypass these honeypots without alerting the target. The attacker decides to utilize a suite of techniques. Which of the following techniques would NOT assist in detecting a honeypot?

Options:

A.  

Probing system services and observing the three-way handshake

B.  

Using honeypot detection tools like Send-Safe Honeypot Hunter

C.  

Implementing a brute force attack to verify system vulnerability

D.  

Analyzing the MAC address to detect instances running on VMware

Discussion 0
Questions 57

A penetration tester performs a vulnerability scan on a company’s web server and identifies several medium-risk vulnerabilities related to misconfigured settings. What should the tester do to verify the vulnerabilities?

Options:

A.  

Use publicly available tools to exploit the vulnerabilities and confirm their impact

B.  

Ignore the vulnerabilities since they are medium-risk

C.  

Perform a brute-force attack on the web server's login page

D.  

Conduct a denial-of-service (DoS) attack to test the server's resilience

Discussion 0
Questions 58

You have been hired as an intern at a start-up company. Your first task is to help set up a basic web server for the company’s new website. The team leader has asked you to make sure the server is secure from common - threats. Based on your knowledge from studying for the CEH exam, which of the following actions should be

your priority to secure the web server?

Options:

A.  

Installing a web application firewall

B.  

limiting the number of concurrent connections to the server

C.  

Encrypting the company’s website with SSL/TLS

D.  

Regularly updating and patching the server software

Discussion 0
Questions 59

A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?

Options:

A.  

Perform a vulnerability scan of the system.

B.  

Determine the impact of enabling the audit feature.

C.  

Perform a cost/benefit analysis of the audit feature.

D.  

Allocate funds for staffing of audit log review.

Discussion 0
Questions 60

PGP, SSL, and IKE are all examples of which type of cryptography?

Options:

A.  

Digest

B.  

Secret Key

C.  

Public Key

D.  

Hash Algorithm

Discussion 0
Questions 61

A web server experienced a DDoS attack that specifically targeted the application layer. Which type of DDoS attack was most likely used?

Options:

A.  

HTTP flood attack

B.  

ICMP flood attack

C.  

UDP flood attack

D.  

SYN flood attack

Discussion 0
Questions 62

A WPA2-PSK wireless network is tested. Which method would allow identification of a key vulnerability?

Options:

A.  

De-authentication attack to capture the four-way handshake

B.  

MITM to steal the PSK directly

C.  

Jamming to force PSK disclosure

D.  

Rogue AP revealing PSK

Discussion 0
Questions 63

An organization decided to harden its security against web-application and web-server attacks. John, a security personnel in the organization, employed a security scanner to automate web-application security testing and to guard the organization's web infrastructure against web-application threats. Using that tool, he also wants to detect XSS, directory transversal problems, fault injection, SQL injection, attempts to execute commands, and several other attacks. Which of the following security scanners will help John perform the above task?

Options:

A.  

AlienVault®OSSIM™

B.  

Syhunt Hybrid

C.  

Saleae Logic Analyzer

D.  

Cisco ASA

Discussion 0
Questions 64

What is the purpose of a DNS AAAA record?

Options:

A.  

Authorization, Authentication and Auditing record

B.  

Address prefix record

C.  

Address database record

D.  

IPv6 address resolution record

Discussion 0
Questions 65

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, small sized packets to the target computer, making it very difficult for an IDS to detect the attack signatures. Which tool can be used to perform session splicing attacks?

Options:

A.  

tcpsplice

B.  

Burp

C.  

Hydra

D.  

Whisker

Discussion 0
Questions 66

which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth?

Options:

A.  

Bluesmacking

B.  

Bluebugging

C.  

Bluejacking

D.  

Bluesnarfing

Discussion 0
Questions 67

You are a cybersecurity consultant for a healthcare organization that utilizes Internet of Medical Things (loMT) devices, such as connected insulin pumps and heart rate monitors, to provide improved patientcare. Recently, the organization has been targeted by ransomware attacks. While the IT infrastructure was unaffected due to robust security measures, they are worried that the loMT devices could be potential entry points for future

attacks. What would be your main recommendation to protect these devices from such threats?

Options:

A.  

Implement multi-factor authentication for all loMT devices.

B.  

Disable all wireless connectivity on loMT devices.

C.  

Use network segmentation to isolate loMT devices from the main network.

D.  

Regularly change the IP addresses of all loMT devices.

Discussion 0
Questions 68

In the field of cryptanalysis, what is meant by a “rubber-hose" attack?

Options:

A.  

Attempting to decrypt cipher text by making logical assumptions about the contents of the original plain text.

B.  

Extraction of cryptographic secrets through coercion or torture.

C.  

Forcing the targeted key stream through a hardware-accelerated device such as an ASI

C.  

D.  

A backdoor placed into a cryptographic algorithm by its creator.

Discussion 0
Questions 69

Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed.

What is the port scanning technique used by Sam to discover open ports?

Options:

A.  

Xmas scan

B.  

IDLE/IPID header scan

C.  

TCP Maimon scan

D.  

ACK flag probe scan

Discussion 0
Questions 70

A penetration tester suspects that a web application's login form is vulnerable to SQL injection due to improper sanitization of user input. What is the most appropriate approach to test for SQL injection in the login form?

Options:

A.  

Inject JavaScript into the input fields to test for Cross-Site Scripting (XSS)

B.  

Enter ' OR '1'='1 in the username and password fields to bypass authentication

C.  

Perform a directory traversal attack to access sensitive files

D.  

Use a brute-force attack on the login page to guess valid credentials

Discussion 0
Questions 71

An ethical hacker is scanning a target network. They initiate a TCP connection by sending an SYN packet to a target machine and receiving a SYN/ACK packet in response. But instead of completing the three-way handshake with an ACK packet, they send an RST packet. What kind of scan is the ethical hacker likely performing and what is their goal?

Options:

A.  

They are performing an SYN scan to stealthily identify open ports without fully establishing a connection

B.  

They are performing a TCP connect scan to identify open ports on the target machine

C.  

They are performing a vulnerability scan to identify any weaknesses in the target system

D.  

They are performing a network scan to identify live hosts and their IP addresses

Discussion 0
Questions 72

During a black-box penetration test, an attacker runs the following command:

nmap -p25 --script smtp-enum-users --script-args EXPN,RCPT

The script successfully returns multiple valid usernames. Which server misconfiguration is being exploited?

Options:

A.  

The SMTP server allows authentication without credentials

B.  

The SMTP server has disabled STARTTLS, allowing plaintext enumeration

C.  

SMTP user verification commands are exposed without restrictions

D.  

DNS MX records point to an internal mail relay

Discussion 0
Questions 73

Which of the following steps for risk assessment methodology refers to vulnerability identification?

Options:

A.  

Determines if any flaws exist in systems, policies, or procedures

B.  

Assigns values to risk probabilities; Impact values

C.  

Determines risk probability that vulnerability will be exploited (High, Medium, Low)

D.  

Identifies sources of harm to an IT system (Natural, Human, Environmental)

Discussion 0
Questions 74

SQL injection (SQLi) attacks attempt to inject SQL syntax into web requests, which may Bypass authentication and allow attackers to access and/or modify data attached to a web application.

Which of the following SQLI types leverages a database server's ability to make DNS requests to pass data to an attacker?

Options:

A.  

Union-based SQLI

B.  

Out-of-band SQLI

C.  

ln-band SQLI

D.  

Time-based blind SQLI

Discussion 0
Questions 75

Which Nmap option would you use if you were not concerned about being detected and wanted to perform a very fast scan?

Options:

A.  

-T5

B.  

-O

C.  

-T0

D.  

-A

Discussion 0
Questions 76

An ethical hacker is conducting a penetration test on a company’s network with full knowledge and permission from the organization. What is this type of hacking called?

Options:

A.  

Blue Hat Hacking

B.  

Grey Hat Hacking

C.  

Black Hat Hacking

D.  

White Hat Hacking

Discussion 0
Questions 77

A malicious user has acquired a Ticket Granting Service from the domain controller using a valid user's Ticket Granting Ticket in a Kerberoasting attack. He exhorted the TGS tickets from memory for offline cracking. But the attacker was stopped before he could complete his attack. The system administrator needs to investigate and remediate the potential breach. What should be the immediate step the system administrator takes?

Options:

A.  

Perform a system reboot to clear the memory

B.  

Delete the compromised user's account

C.  

Change the NTLM password hash used to encrypt the ST

D.  

invalidate the TGS the attacker acquired

Discussion 0
Questions 78

Malware infecting multiple systems remains dormant until triggered and changes its code or encryption with each infection to evade detection. Which malware type best fits this description, and what is the most effective mitigation?

Options:

A.  

Rootkit – use anti-rootkit tools and patch systems

B.  

Adware – deploy anti-adware tools and train users

C.  

Worm – isolate infected systems and scan the network

D.  

Polymorphic malware – use behavior-based detection and ensure systems are patched

Discussion 0
Questions 79

Morris, a professional hacker, performed a vulnerability scan on a target organization by sniffing the traffic on the network lo identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are currently accessing the network. What is the type of vulnerability assessment that Morris performed on the target organization?

Options:

A.  

internal assessment

B.  

Passive assessment

C.  

External assessment

D.  

Credentialed assessment

Discussion 0
Questions 80

In the process of implementing a network vulnerability assessment strategy for a tech company, the security

analyst is confronted with the following scenarios:

1) A legacy application is discovered on the network, which no longer receives updates from the vendor.

2) Several systems in the network are found running outdated versions of web browsers prone to distributed

attacks.

3) The network firewall has been configured using default settings and passwords.

4) Certain TCP/IP protocols used in the organization are inherently insecure.

The security analyst decides to use vulnerability scanning software. Which of the following limitations of vulnerability assessment should the analyst be most cautious about in this context?

Options:

A.  

Vulnerability scanning software is limited in its ability to perform live tests on web applications to detect errors or unexpected behavior

B.  

Vulnerability scanning software cannot define the impact of an identified vulnerability on different business operations

C.  

Vulnerability scanning software is limited in its ability to detect vulnerabilities at a given point in time

D.  

Vulnerability scanning software is not immune to software engineering flaws that might lead to serious vulnerabilities being missed

Discussion 0
Questions 81

What would be the fastest way to perform content enumeration on a given web server by using the Gobuster tool?

Options:

A.  

Performing content enumeration using the bruteforce mode and 10 threads

B.  

Shipping SSL certificate verification

C.  

Performing content enumeration using a wordlist

D.  

Performing content enumeration using the bruteforce mode and random file extensions

Discussion 0
Questions 82

An ethical hacker is testing a web application of a financial firm. During the test, a 'Contact Us' form's input field is found to lack proper user input validation, indicating a potential Cross-Site Scripting (XSS) vulnerability. However, the application has a stringent Content Security Policy (CSP) disallowing inline scripts and scripts from external domains but permitting scripts from its own domain. What would be the hacker's next step to confirm the XSS vulnerability?

Options:

A.  

Try to disable the CSP to bypass script restrictions

B.  

Inject a benign script inline to the form to see if it executes

C.  

Utilize a script hosted on the application's domain to test the form

D.  

Load a script from an external domain to test the vulnerability

Discussion 0
Questions 83

Which action would most effectively increase the security of a virtual-hosted web server?

Options:

A.  

Implement LAMP architecture

B.  

Change IP addresses regularly

C.  

Regularly update and patch server software

D.  

Move document root to another disk

Discussion 0
Questions 84

Attacker Lauren has gained the credentials of an organization's internal server system, and she was often logging in during irregular times to monitor the network activities. The organization was skeptical about the login times and appointed security professional Robert to determine the issue. Robert analyzed the compromised device to find incident details such as the type of attack, its severity, target, impact, method of propagation, and vulnerabilities exploited. What is the incident handling and response (IH&R) phase, in which Robert has determined these issues?

Options:

A.  

Preparation

B.  

Eradication

C.  

Incident recording and assignment

D.  

Incident triage

Discussion 0
Questions 85

An attacker runs the netcat tool to transfer a secret file between two hosts.

He is worried about information being sniffed on the network.

How would the attacker use netcat to encrypt the information before transmitting onto the wire?

Options:

A.  

Machine A: netcat -l -p -s password 1234 < testfile Machine B: netcat 1234

B.  

Machine A: netcat -l -e magickey -p 1234 < testfile Machine B: netcat 1234

C.  

Machine A: netcat -l -p 1234 < testfile -pw password Machine B: netcat 1234 -pw password

D.  

Use cryptcat instead of netcat

Discussion 0
Questions 86

A penetration tester discovers that a web application uses unsanitized user input to dynamically generate file paths. The tester identifies that the application is vulnerable to Remote File Inclusion (RFI). Which action should the tester take to exploit this vulnerability?

Options:

A.  

Inject a SQL query into the input field to perform SQL injection

B.  

Use directory traversal to access sensitive system files on the server

C.  

Provide a URL pointing to a remote malicious script to include it in the web application

D.  

Upload a malicious shell to the server and execute commands remotely

Discussion 0
Questions 87

Which tool can be used to silently copy files from USB devices?

Options:

A.  

USB Grabber

B.  

USB Snoopy

C.  

USB Sniffer

D.  

USB Dumper

Discussion 0
Questions 88

Which social engineering attack involves impersonating a co-worker or authority figure to extract confidential information?

Options:

A.  

Phishing

B.  

Pretexting

C.  

Quid pro quo

D.  

Baiting

Discussion 0
Questions 89

A penetration tester is evaluating a web application that does not properly validate the authenticity of HTTP requests. The tester suspects the application is vulnerable to Cross-Site Request Forgery (CSRF). Which approach should the tester use to exploit this vulnerability?

Options:

A.  

Execute a directory traversal attack to access restricted server files

B.  

Create a malicious website that sends a crafted request on behalf of the user when visited

C.  

Perform a brute-force attack on the application’s login page to guess weak credentials

D.  

Inject a SQL query into the input fields to perform SQL injection

Discussion 0
Questions 90

During a penetration testing assignment, a Certified Ethical Hacker (CEH) used a set of scanning tools to create a profile of the target organization. The CEH wanted to scan for live hosts, open ports, and services on a target network. He used Nmap for network inventory and Hping3 for network security auditing. However, he wanted to spoof IP addresses for anonymity during probing. Which command should the CEH use to perform this task?

Options:

A.  

Hping3 -110.0.0.25 --ICMP

B.  

Nmap -sS -Pn -n -vw --packet-trace -p- --script discovery -T4

C.  

Hping3 -S 192.168.1.1 -a 192.168.1.254 -p 22 -flood

D.  

Hping3-210.0.0.25-p 80

Discussion 0
Questions 91

You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?

Options:

A.  

hping2 host.domain.com

B.  

hping2 --set-ICMP host.domain.com

C.  

hping2 -i host.domain.com

D.  

hping2 -1 host.domain.com

Discussion 0
Questions 92

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

Options:

A.  

ESP transport mode

B.  

ESP confidential

C.  

AH permiscuous

D.  

AH Tunnel mode

Discussion 0
Questions 93

What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?

Options:

A.  

110

B.  

135

C.  

139

D.  

161

E.  

445

F.  

1024

Discussion 0
Questions 94

In an intricate web application architecture using an Oracle database, you, as a security analyst, have identified a potential SQL Injection attack surface. The database consists of 'x' tables, each with y columns. Each table contains z1 records. An attacker, well-versed in SQLi techniques, crafts 'u' SQL payloads, each attempting to extract maximum data from the database. The payloads include UNION SELECT' statements and 'DBMS_XSLPPOCESSOR.READ2CLOB' to read sensitive files. The attacker aims to maximize the total data extracted E=xyz'u'. Assuming 'x=4\ y=2\ and varying z' and 'u\ which situation is likely to result in the highest extracted data volume?

Options:

A.  

z=400. u=4: The attacker constructs A SQLpayloads, each focusing on tables with 400 records, influencing all columns of all tables

B.  

z=550, u=Z Here, the attacker formulates 2 SQL payloads and directs them towards tables containing 550 records, impacting all columns and tables

C.  

z=600. u=2: The attacker devises 2 SQL payloads. each aimed at tables holding 600 records, affecting all columns across all tables

D.  

Az=500. u=3: The attacker creates 3 SQL payloads and targets tables with 500 records each, exploiting all columns and tables

Discussion 0
Questions 95

A penetration tester is conducting an external assessment of a corporate web server. They start by accessing https://www.targetcorp.com/robots.txt and observe multiple Disallow entries that reference directories such as /admin-panel/, /backup/, and /confidentialdocs/. When the tester directly visits these paths via a browser, they find that access is not restricted by authentication and gain access to sensitive files, including server configuration and unprotected credentials. Which stage of the web server attack methodology is demonstrated in this scenario?

Options:

A.  

Injecting malicious SQL queries to access sensitive database records

B.  

Performing a cross-site request forgery (CSRF) attack to manipulate user actions

C.  

Gathering information through exposed indexing instructions

D.  

Leveraging the directory traversal flaw to access critical server files

Discussion 0
Questions 96

which of the following information security controls creates an appealing isolated environment for hackers to prevent them from compromising critical targets while simultaneously gathering information about the hacker?

Options:

A.  

intrusion detection system

B.  

Honeypot

C.  

BotnetD Firewall

Discussion 0
Questions 97

What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?

Options:

A.  

Man-in-the-middle attack

B.  

Meet-in-the-middle attack

C.  

Replay attack

D.  

Traffic analysis attack

Discussion 0
Questions 98

An ethical hacker is hired to evaluate the defenses of an organization's database system which is known to employ a signature-based IDS. The hacker knows that some SQL Injection evasion techniques may allow him

to bypass the system's signatures. During the operation, he successfully retrieved a list of usernames from the database without triggering an alarm by employing an advanced evasion technique. Which of the following

could he have used?

Options:

A.  

Utilizing the char encoding function to convert hexadecimal and decimal values into characters that pass-through SQL engine parsing

B.  

Using the URL encoding method to replace characters with their ASCII codes in hexadecimal form

C.  

Implementing sophisticated matches such as “OR ‘john' = john" in place of classical matches like "OR 1-1"

D.  

Manipulating white spaces in SQL queries to bypass signature detection

Discussion 0
Questions 99

A penetration tester observes that traceroutes to various internal devices always show 10.10.10.1 as the second-to-last hop, regardless of the destination subnet. What does this pattern most likely indicate?

Options:

A.  

DNS poisoning at the local resolver used by the compromised host

B.  

Loopback misconfiguration at the destination endpoints

C.  

A core router facilitating communication across multiple internal subnets

D.  

Presence of a transparent proxy device acting as a forwarder

Discussion 0
Questions 100

A penetration tester is tasked with mapping an organization's network while avoiding detection by sophisticated intrusion detection systems (IDS). The organization employs advanced IDS capable of recognizing common scanning patterns. Which scanning technique should the tester use to effectively discover live hosts and open ports without triggering the IDS?

Options:

A.  

Execute a FIN scan by sending TCP packets with the FIN flag set

B.  

Use an Idle scan leveraging a third-party zombie host

C.  

Conduct a TCP Connect scan using randomized port sequences

D.  

Perform an ICMP Echo scan to ping all network devices

Discussion 0
Questions 101

Which type of attack attempts to overflow the content-addressable memory (CAM) table in an Ethernet switch?

Options:

A.  

Evil twin attack

B.  

DNS cache flooding

C.  

MAC flooding

D.  

DDoS attack

Discussion 0
Questions 102

Ron, a security professional, was pen testing web applications and SaaS platforms used by his company. While testing, he found a vulnerability that allows hackers to gain unauthorized access to API objects and perform actions such as view, update, and delete sensitive data of the company. What is the API vulnerability revealed in the above scenario?

Options:

A.  

Code injections

B.  

Improper use of CORS

C.  

No ABAC validation

D.  

Business logic flaws

Discussion 0
Questions 103

James is working as an ethical hacker at Technix Solutions. The management ordered James to discover how vulnerable its network is towards footprinting attacks. James took the help of an open-source framework for performing automated reconnaissance activities. This framework helped James in gathering information using free tools and resources.

What is the framework used by James to conduct footprinting and reconnaissance activities?

Options:

A.  

WebSploit Framework

B.  

Browser Exploitation Framework

C.  

OSINT framework

D.  

SpeedPhish Framework

Discussion 0
Questions 104

Which information CANNOT be directly obtained from DNS interrogation?

Options:

A.  

Usernames and passwords

B.  

Server geolocation (via IPs)

C.  

Subdomains of the organization

D.  

IP addresses of mail servers

Discussion 0
Questions 105

John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization. Which of the following attack techniques is used by John?

Options:

A.  

Advanced persistent theft

B.  

threat Diversion theft

C.  

Spear-phishing sites

D.  

insider threat

Discussion 0
Questions 106

Which regulation defines security and privacy controls for Federal information systems and organizations?

Options:

A.  

HIPAA

B.  

EU Safe Harbor

C.  

PCI-DSS

D.  

NIST-800-53

Discussion 0
Questions 107

A company’s online service is under a multi-vector DoS attack using SYN floods and HTTP GET floods. Firewalls and IDS cannot stop the outage. What advanced defense should the company implement?

Options:

A.  

Configure the firewall to block all incoming SYN packets from external IPs

B.  

Use DDoS mitigation services that offer multi-layer protection

C.  

Deploy a Web Application Firewall (WAF) with anomaly detection

D.  

Increase server bandwidth and apply basic rate limiting

Discussion 0
Questions 108

Which access control mechanism allows for multiple systems to use a central authentication server (CAS) that permits users to authenticate once and gain access to multiple systems?

Options:

A.  

Role Based Access Control (RBAC)

B.  

Discretionary Access Control (DAC)

C.  

Single sign-on

D.  

Windows authentication

Discussion 0
Questions 109

Attacker Steve targeted an organization's network with the aim of redirecting the company's web traffic to another malicious website. To achieve this goal, Steve performed DNS cache poisoning by exploiting the vulnerabilities In the DNS server software and modified the original IP address of the target website to that of a fake website. What is the technique employed by Steve to gather information for identity theft?

Options:

A.  

Pretexting

B.  

Pharming

C.  

Wardriving

D.  

Skimming

Discussion 0
Questions 110

in this form of encryption algorithm, every Individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?

Options:

A.  

IDEA

B.  

Triple Data Encryption standard

C.  

MDS encryption algorithm

D.  

AES

Discussion 0
Questions 111

You are a cybersecurity analyst at a global banking corporation and suspect a backdoor attack due to abnormal outbound traffic during non-working hours, unexplained reboots, and modified system files. Which combination of measures would be most effective to accurately identify and neutralize the backdoor while ensuring system integrity?

Options:

A.  

Review firewall logs, analyze traffic, and immediately reboot systems

B.  

Monitor system and file activity, apply anomaly detection, and use advanced anti-malware tools

C.  

Enforce strong passwords, MFA, and regular vulnerability assessments

D.  

Apply ACLs, patch systems, and audit user privileges

Discussion 0
Questions 112

A government agency trains a group of cybersecurity experts to carry out covert cyber missions against foreign threats and gather intelligence without being detected. These experts work exclusively for national interests. What classification best describes them?

Options:

A.  

Organized hackers

B.  

State-sponsored hackers

C.  

Hacktivists

D.  

Gray hat hackers

Discussion 0
Questions 113

You are a security analyst conducting a footprinting exercise for a new client to gather information without direct interaction. After using search engines and public databases, you consider using Google Hacking (Google Dorking) techniques to uncover further vulnerabilities. Which option best justifies this decision?

Options:

A.  

Google Hacking can help locate phishing websites that mimic the client’s website.

B.  

Google Hacking can help discover hidden organizational data from the Deep Web.

C.  

Google Hacking can help identify weaknesses in the client’s website code.

D.  

Google Hacking can assist in mapping the client’s internal network structure.

Discussion 0
Questions 114

A web server is overwhelmed by many slow, incomplete HTTP connections. What attack is occurring?

Options:

A.  

Slowloris attack

B.  

ICMP flood

C.  

UDP flood

D.  

Fragmentation attack

Discussion 0
Questions 115

Which advanced session hijacking technique is the most difficult to detect and mitigate?

Options:

A.  

Credential stuffing

B.  

Clickjacking

C.  

CSRF

D.  

Session replay attack

Discussion 0
Questions 116

A penetration tester is assessing a web application that does not properly sanitize user input in the search field. The tester suspects the application is vulnerable to a SQL injection attack. Which approach should the tester take to confirm the vulnerability?

Options:

A.  

Use directory traversal in the search field to access sensitive files on the server

B.  

Input a SQL query such as 1 OR 1=1 — into the search field to check for SQL injection

C.  

Perform a brute-force attack on the login page to identify weak passwords

D.  

Inject JavaScript into the search field to perform a Cross-Site Scripting (XSS) attack

Discussion 0
Questions 117

An attacker extracts the initial bytes from an encrypted file container and uses a tool to iterate through numeric combinations. What type of cryptanalytic technique is being utilized?

Options:

A.  

Seek identical digests across hash outputs

B.  

Test every possible password through automation

C.  

Force encryption key through quantum solving

D.  

Analyze output length to spot anomalies

Discussion 0
Questions 118

Sam is working as a system administrator In an organization. He captured the principal characteristics of a vulnerability and produced a numerical score to reflect Its severity using CVSS v3.0 to property assess and prioritize the organization's vulnerability management processes. The base score that Sam obtained after performing cvss rating was 4.0. What is the CVSS severity level of the vulnerability discovered by Sam in the above scenario?

Options:

A.  

Medium

B.  

Low

C.  

Critical

D.  

High

Discussion 0
Questions 119

Which of the following program infects the system boot sector and the executable files at the same time?

Options:

A.  

Polymorphic virus

B.  

Stealth virus

C.  

Multipartite Virus

D.  

Macro virus

Discussion 0
Questions 120

During an attempt to perform an SQL injection attack, a certified ethical hacker is focusing on the

identification of database engine type by generating an ODBC error. The ethical hacker, after injecting various payloads, finds that the web application returns a standard, generic error message that does not reveal any detailed database information. Which of the following techniques would the hacker consider next to obtain useful information about the underlying database?

Options:

A.  

Use the UNION operator to combine the result sets of two or more SELECT statements

B.  

Attempt to compromise the system through OS-level command shell execution

C.  

Try to insert a string value where a number is expected in the input field

D.  

Utilize a blind injection technique that uses time delays or error signatures to extract information

Discussion 0
Questions 121

Which best describes the role of a penetration tester?

Options:

A.  

Unauthorized malicious hacker

B.  

Malware distributor

C.  

Authorized security professional who exploits vulnerabilities

D.  

Malicious code developer

Discussion 0
Questions 122

Password cracking programs reverse the hashing process to recover passwords. (True/False.)

Options:

A.  

True

B.  

False

Discussion 0
Questions 123

env x='(){ :;};echo exploit' bash –c 'cat /etc/passwd'

What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?

Options:

A.  

Removes the passwd file

B.  

Changes all passwords in passwd

C.  

Add new user to the passwd file

D.  

Display passwd content to prompt

Discussion 0
Questions 124

An attacker plans to compromise IoT devices to pivot into OT systems. What should be the immediate action?

Options:

A.  

Perform penetration testing

B.  

Secure IoT–OT communications with encryption and authentication

C.  

Deploy ML-based threat prediction

D.  

Deploy an IPS

Discussion 0
Questions 125

A penetration tester is performing the footprinting process and is reviewing publicly available information about an organization by using the Google search engine.

Which of the following advanced operators would allow the pen tester to restrict the search to the organization’s web domain?

Options:

A.  

[allinurl:]

B.  

[location:]

C.  

[site:]

D.  

[link:]

Discussion 0
Questions 126

Which technique is least useful during passive reconnaissance?

Options:

A.  

WHOIS lookup

B.  

Search engines

C.  

Social media monitoring

D.  

Nmap scanning

Discussion 0
Questions 127

An experienced cyber attacker has created a fake Linkedin profile, successfully impersonating a high-ranking official from a well-established company, to execute a social engineering attack. The attacker then connected with other employees within the organization, receiving invitations to exclusive corporate events and gaining

access to proprietary project details shared within the network. What advanced social engineering technique has the attacker primarily used to exploit the system and what is the most likely immediate threat to the organization?

Options:

A.  

Pretexting and Network Vulnerability

B.  

Spear Phishing and Spam

C.  

Whaling and Targeted Attacks

D.  

Baiting and Involuntary Data Leakage

Discussion 0
Questions 128

As part of a college project, you have set up a web server for hosting your team's application. Given your interest in cybersecurity, you have taken the lead in securing the server. You are aware that hackers often attempt to exploit server misconfigurations. Which of the following actions would best protect your web server from potential misconfiguration-based attacks?

Options:

A.  

Performing regular server configuration audits

B.  

Enabling multi-factor authentication for users

C.  

Implementing a firewall to filter traffic

D.  

Regularly backing up server data

Discussion 0
Questions 129

What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?

Options:

A.  

 Session hijacking

B.  

 Firewalking

C.  

 Man-in-the-middle attack

D.  

 Network sniffing

Discussion 0
Questions 130

Which method of password cracking takes the most time and effort?

Options:

A.  

Dictionary attack

B.  

Shoulder surfing

C.  

Rainbow tables

D.  

Brute force

Discussion 0
Questions 131

Gregory, a professional penetration tester working at Sys Security Ltd., is tasked with performing a security test of web applications used in the company. For this purpose, Gregory uses a tool to test for any security loopholes by hijacking a session between a client and server. This tool has a feature of intercepting proxy that can be used to inspect and modify the traffic between the browser and target application. This tool can also perform customized attacks and can be used to test the randomness of session tokens. Which of the following tools is used by Gregory in the above scenario?

Options:

A.  

Nmap

B.  

Burp Suite

C.  

CxSAST

D.  

Wireshark

Discussion 0
Questions 132

Josh has finished scanning a network and has discovered multiple vulnerable services. He knows that several of these usually have protections against external sources but are frequently susceptible to internal users. He decides to draft an email, spoof the sender as the internal IT team, and attach a malicious file disguised as a financial spreadsheet. Before Josh sends the email, he decides to investigate other methods of getting the file onto the system. For this particular attempt, what was the last stage of the cyber kill chain that Josh performed?

Options:

A.  

Exploitation

B.  

Weaponization

C.  

Delivery

D.  

Reconnaissance

Discussion 0
Questions 133

Every company needs a formal written document that outlines acceptable usage of systems, prohibited actions, and disciplinary consequences. Employees must sign this policy before using company systems.

What is this document called?

Options:

A.  

Information Audit Policy (IAP)

B.  

Information Security Policy (ISP)

C.  

Penetration Testing Policy (PTP)

D.  

Company Compliance Policy (CCP)

Discussion 0
Questions 134

Consider the following Nmap output:

What command-line parameter could you use to determine the type and version number of the web server?

Options:

A.  

-sv

B.  

-Pn

C.  

-V

D.  

-ss

Discussion 0
Questions 135

You are a security officer of a company. You had an alert from IDS that indicates that one PC on your Intranet is connected to a blacklisted IP address (C2 Server) on the Internet. The IP address was blacklisted just before the alert. You are starting an investigation to roughly analyze the severity of the situation. Which of the following is appropriate to analyze?

Options:

A.  

IDS log

B.  

Event logs on domain controller

C.  

Internet Firewall/Proxy log

D.  

Event logs on the PC

Discussion 0
Questions 136

Which of the following is not a Bluetooth attack?

Options:

A.  

Bluedriving

B.  

Bluesmacking

C.  

Bluejacking

D.  

Bluesnarfing

Discussion 0
Questions 137

During a security assessment, an attacker identifies a flaw in a multi-user file system. The system first verifies access rights to a temporary file created by a user. However, immediately after this verification, and before the file is processed, the attacker manages to swap the original file with a malicious version. This manipulation happens in the brief interval between the system's access verification and the moment it handles the file, resulting in the malicious file being treated as legitimate. Which vulnerability is the attacker exploiting?

Options:

A.  

Time-of-validation/time-of-execution issue in resource management logic.

B.  

Improper certificate validation in trusted communication channels.

C.  

Integer overflow during arithmetic computations with limited memory bounds.

D.  

Null pointer dereference leading to unexpected application behavior.

Discussion 0
Questions 138

A BLE attack captured LL_ENC_REQ and LL_ENC_RSP packets but not the LTK. What is the next step?

Options:

A.  

Decrypt pcap using -o option

B.  

Attack cannot continue without LTK

C.  

Use hcitool inq

D.  

Use Btlejacking

Discussion 0
Questions 139

Gerard, a disgruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attacks and bring down its reputation in the market. To launch the attacks process, he performed DNS footprinting to gather information about ONS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names. IP addresses. DNS records, and network Who is records. He further exploited this information to launch other sophisticated attacks. What is the tool employed by Gerard in the above scenario?

Options:

A.  

Knative

B.  

zANTI

C.  

Towelroot

D.  

Bluto

Discussion 0
Questions 140

Geena, a cloud architect, uses a master component in the Kubernetes cluster architecture that scans newly generated pods and allocates a node to them. This component can also assign nodes based on factors such as the overall resource requirement, data locality, software/hardware/policy restrictions, and internal workload interventions.

Which of the following master components is explained in the above scenario?

Options:

A.  

Kube-controller-manager

B.  

Kube-scheduler

C.  

Kube-apiserver

D.  

Etcd cluster

Discussion 0
Questions 141

Fleet vehicles with smart locking systems were compromised after attackers captured unique signals from key fobs. What should the security team prioritize to confirm and prevent this attack?

Options:

A.  

Secure firmware updates

B.  

Increase physical surveillance

C.  

Deploy anti-malware on smartphones

D.  

Monitor wireless signals for jamming or interference

Discussion 0
Questions 142

While using your bank’s online servicing you notice the following string in the URL bar:

"http://www.MyPersonalBank.com/account?id=368940911028389 &Damount=10980&Camount=21"

You observe that if you modify the Damount & Camount values and submit the request, that data on the web page reflects the changes.

Which type of vulnerability is present on this site?

Options:

A.  

Cookie Tampering

B.  

SQL Injection

C.  

Web Parameter Tampering

D.  

XSS Reflection

Discussion 0
Questions 143

You discover an unpatched Android permission-handling vulnerability on a device with fully updated antivirus software. What is the most effective exploitation approach that avoids antivirus detection?

Options:

A.  

Develop a custom exploit using obfuscation techniques

B.  

Use Metasploit to deploy a known payload

C.  

Install a rootkit to manipulate the device

D.  

Use SMS phishing to trick the user

Discussion 0
Questions 144

What piece of hardware on a computer's motherboard generates encryption keys and only releases a part of the key so that decrypting a disk on a new piece of hardware is not possible?

Options:

A.  

CPU

B.  

GPU

C.  

UEFI

D.  

TPM

Discussion 0
Questions 145

An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?

Options:

A.  

He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.

B.  

He will activate OSPF on the spoofed root bridge.

C.  

He will repeat this action so that it escalates to a DoS attack.

D.  

He will repeat the same attack against all L2 switches of the network.

Discussion 0
Questions 146

Ethical hacker jane Smith is attempting to perform an SQL injection attach. She wants to test the response time of a true or false response and wants to use a second command to determine whether the database will return true or false results for user IDs. which two SQL Injection types would give her the results she is looking for?

Options:

A.  

Out of band and boolean-based

B.  

Time-based and union-based

C.  

union-based and error-based

D.  

Time-based and boolean-based

Discussion 0
Questions 147

Attacker Rony Installed a rogue access point within an organization's perimeter and attempted to Intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack. What is the type of vulnerability assessment performed by Johnson in the above scenario?

Options:

A.  

Distributed assessment

B.  

Wireless network assessment

C.  

Host-based assessment

D.  

Application assessment

Discussion 0
Questions 148

What hacking attack is challenge/response authentication used to prevent?

Options:

A.  

Replay attacks

B.  

Scanning attacks

C.  

Session hijacking attacks

D.  

Password cracking attacks

Discussion 0
Questions 149

A penetration tester is tasked with gathering information about the subdomains of a target organization's website. The tester needs a versatile and efficient solution for the task. Which of the following options would be the most effective method to accomplish this goal?

Options:

A.  

Employing a tool like Sublist3r, which is designed to enumerate the subdomains of websites using OSINT

B.  

Analyzing Linkedin profiles to find employees of the target company and their job titles

C.  

Utilizing the Harvester tool to extract email addresses related to the target domain using a search engine like Google or Bing

D.  

Using a people search service, such as Spokeo or Intelius, to gather information about the employees of the target organization

Discussion 0
Questions 150

An organization is performing a vulnerability assessment tor mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests. What is the type of vulnerability assessment solution that James employed in the above scenario?

Options:

A.  

Product-based solutions

B.  

Tree-based assessment

C.  

Service-based solutions

D.  

inference-based assessment

Discussion 0
Questions 151

What did the following commands determine?

[Image Output of USER2SID and SID2USER showing that SID ending in -500 corresponds to user Joe on domain EARTH]

Options:

A.  

That the Joe account has a SID of 500

B.  

These commands demonstrate that the guest account has NOT been disabled

C.  

These commands demonstrate that the guest account has been disabled

D.  

That the true administrator is Joe

E.  

Issued alone, these commands prove nothing

Discussion 0
Questions 152

A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.

Which cryptography attack is the student attempting?

Options:

A.  

Man-in-the-middle attack

B.  

Brute-force attack

C.  

Dictionary attack

D.  

Session hijacking

Discussion 0
Questions 153

Options:

A.  

Vulnerability Scanning

B.  

Penetration Testing

C.  

Security Policy Implementation

D.  

Designing Network Security

Discussion 0
Questions 154

You perform a SYN (half-open) scan and receive a SYN/ACK packet in response. How should this result be interpreted?

Options:

A.  

The target IP is not reachable

B.  

The scanned port is open

C.  

The scanned port is filtered

D.  

The scanned port is closed

Discussion 0
Questions 155

Why should the security analyst disable/remove unnecessary ISAPI filters?

Options:

A.  

To defend against social engineering attacks

B.  

To defend against webserver attacks

C.  

To defend against jailbreaking

D.  

To defend against wireless attacks

Discussion 0
Questions 156

User A is writing a sensitive email message to user B outside the local network. User A has chosen to use PKI to secure his message and ensure only user B can read the sensitive email. At what layer of the OSI layer does the encryption and decryption of the message take place?

Options:

A.  

Application

B.  

Transport

C.  

Session

D.  

Presentation

Discussion 0
Questions 157

Annie, a cloud security engineer, uses the Docker architecture to employ a client/server model in the application she is working on. She utilizes a component that can process API requests and handle various Docker objects, such as containers, volumes. Images, and networks. What is the component of the Docker architecture used by Annie in the above scenario?

Options:

A.  

Docker client

B.  

Docker objects

C.  

Docker daemon

D.  

Docker registries

Discussion 0
Questions 158

Which advanced session hijacking technique is hardest to detect and mitigate in a remote-access environment?

Options:

A.  

Session sidejacking over public Wi-Fi

B.  

ARP spoofing on local networks

C.  

Brute-force session guessing

D.  

Cookie poisoning

Discussion 0
Questions 159

Henry Is a cyber security specialist hired by BlackEye - Cyber security solutions. He was tasked with discovering the operating system (OS) of a host. He used the Unkornscan tool to discover the OS of the target system. As a result, he obtained a TTL value, which Indicates that the target system is running a Windows OS. Identify the TTL value Henry obtained, which indicates that the target OS is Windows.

Options:

A.  

64

B.  

128

C.  

255

D.  

138

Discussion 0
Questions 160

Don, a student, came across a gaming app in a third-party app store and Installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after Installing the app. What is the attack performed on Don in the above scenario?

Options:

A.  

SMS phishing attack

B.  

SIM card attack

C.  

Agent Smith attack

D.  

Clickjacking

Discussion 0
Questions 161

You are the lead cybersecurity analyst at a multinational corporation that uses a hybrid encryption system to secure inter-departmental communications. The system uses RSA encryption for key exchange and AES for data encryption, taking advantage of the strengths of both asymmetric and symmetric encryption. Each RSA key pair has a size of 'n' bits, with larger keys providing more security at the cost of slower performance. The

time complexity of generating an RSA key pair is O(n*2), and AES encryption has a time complexity of O(n). An attacker has developed a quantum algorithm with time complexity O((log n)*2) to crack RSA encryption. Given *n=4000' and variable ‘AES key size’, which scenario is likely to provide the best balance of security and

performance? which scenario would provide the best balance of security and performance?

Options:

A.  

Data encryption with 3DES using a 168-bit key: Offers high security but slower performance due to 3DES's inherent inefficiencies.

B.  

Data encryption with Blowfish using a 448-bit key: Offers high security but potential compatibility issues due to Blowfish's less widespread use.

C.  

Data encryption with AES-128: Provides moderate security and fast encryption, offering a balance between the two.

D.  

Data encryption with AES-256: Provides high security with better performance than 3DES, but not as fast as other AES key sizes.

Discussion 0
Questions 162

Mirai malware targets IoT devices. After infiltration, it uses them to propagate and create botnets that are then used to launch which types of attack?

Options:

A.  

MITM attack

B.  

Birthday attack

C.  

DDoS attack

D.  

Password attack

Discussion 0
Questions 163

Daniel Is a professional hacker who Is attempting to perform an SQL injection attack on a target website. www.movlescope.com. During this process, he encountered an IDS that detects SQL Injection attempts based on predefined signatures. To evade any comparison statement, he attempted placing characters such as ‘ 'or '1'='1" In any bask injection statement such as "or 1=1." Identify the evasion technique used by Daniel in the above scenario.

Options:

A.  

Null byte

B.  

IP fragmentation

C.  

Char encoding

D.  

Variation

Discussion 0
Questions 164

Which technique is most likely used to evade detection by an Intrusion Detection System (IDS)?

Options:

A.  

Fragmenting malicious packets into smaller segments

B.  

Using self-replicating malware

C.  

Sending phishing emails

D.  

Flooding the IDS with ping requests

Discussion 0
Questions 165

During a review for DoS threats, several IP addresses generate excessive traffic. Packet inspection shows the TCP three-way handshake is never completed, leaving many connections in a SYN_RECEIVED state and consuming server resources without completing sessions. What type of DoS attack is most likely occurring?

Options:

A.  

SYN Flood

B.  

Ping of Death

C.  

UDP Flood

D.  

Smurf Attack

Discussion 0
Questions 166

Peter, a system administrator working at a reputed IT firm, decided to work from his home and login remotely. Later, he anticipated that the remote connection could be exposed to session hijacking. To curb this possibility, he implemented a technique that creates a safe and encrypted tunnel over a public network to securely send and receive sensitive information and prevent hackers from decrypting the data flow between the endpoints.

What is the technique followed by Peter to send files securely through a remote connection?

Options:

A.  

DMZ

B.  

SMB signing

C.  

VPN

D.  

Switch network

Discussion 0
Questions 167

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient’s consent, similar to email spamming?

Options:

A.  

Bluesmacking

B.  

BlueSniffing

C.  

Bluejacking

D.  

Bluesnarfing

Discussion 0
Questions 168

When a security analyst prepares for the formal security assessment, what of the following should be done in order to determine inconsistencies in the secure assets database and verify that system is compliant to the minimum security baseline?

Options:

A.  

Data items and vulnerability scanning

B.  

Interviewing employees and network engineers

C.  

Reviewing the firewalls configuration

D.  

Source code review

Discussion 0
Questions 169

jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However. Jane has a long, complex password on her router. What attack has likely occurred?

Options:

A.  

Wireless sniffing

B.  

Piggybacking

C.  

Evil twin

D.  

Wardriving

Discussion 0
Questions 170

An ethical hacker is testing the security of a website's database system against SQL Injection attacks. They discover that the IDS has a strong signature detection mechanism to detect typical SQL injection patterns.

Which evasion technique can be most effectively used to bypass the IDS signature detection while performing a SQL Injection attack?

Options:

A.  

Implement case variation by altering the case of SQL statements

B.  

Employ IP fragmentation to obscure the attack payload

C.  

Use Hex encoding to represent the SQL query string

D.  

Leverage string concatenation to break identifiable keywords

Discussion 0
Questions 171

Study the following log extract and identify the attack.

[Image shows an HTTP GET request with encoded traversal strings, such as

Options:

A.  

Hexcode Attack

B.  

Cross Site Scripting

C.  

Multiple Domain Traversal Attack

D.  

Unicode Directory Traversal Attack

Discussion 0
Questions 172

Richard, an attacker, aimed to hack loT devices connected to a target network. In this process. Richard recorded the frequency required to share information between connected devices. After obtaining the frequency, he captured the original data when commands were initiated by the connected devices. Once the original data were collected, he used free tools such as URH to segregate the command sequence. Subsequently, he started injecting the segregated command sequence on the same frequency into the loT network, which repeats the captured signals of the devices. What Is the type of attack performed by Richard In the above scenario?

Options:

A.  

Side-channel attack

B.  

Replay attack

C.  

CrypTanalysis attack

D.  

Reconnaissance attack

Discussion 0
Questions 173

During a security assessment, a consultant investigates how the application handles requests from authenticated users. They discover that once a user logs in, the application does not verify the origin of subsequent requests. To exploit this, the consultant creates a web page containing a malicious form that submits a funds transfer request to the application. A logged-in user, believing the page is part of a promotional campaign, fills out the form and submits it. The application processes the request successfully without any reauthentication or user confirmation, completing the transaction under the victim’s session. Which session hijacking technique is being used in this scenario?

Options:

A.  

Hijacking a user session using a session fixation attack

B.  

Hijacking a user session using a session replay attack

C.  

Hijacking a user session using a cross-site request forgery attack

D.  

Hijacking a user session using a cross-site script attack

Discussion 0
Questions 174

The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE’s Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the Transport Layer Security (TLS) protocols defined in RFC6520.

What type of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?

Options:

A.  

Public

B.  

Private

C.  

Shared

D.  

Root

Discussion 0
Questions 175

Allen, a professional pen tester, was hired by xpertTech solutWns to perform an attack simul-ation on the organization's network resources. To perform the attack, he took advantage of the NetBIOS API and targeted the NetBIOS service. B/enumerating NetBIOS, he found that port 139 was open and could see the resources that could be accessed or viewed on a remote system. He came across many NetBIOS codes during enumeration.

identify the NetBIOS code used for obtaining the messenger service running for the logged-in user?

Options:

A.  

<1B>

B.  

<00>

C.  

<03>

D.  

<20>

Discussion 0
Questions 176

During LDAP-based enumeration, you observe that some critical information cannot be retrieved. What is the most likely reason?

Options:

A.  

LDAP directory data is protected by Access Control Lists (ACLs)

B.  

LDAP is running on a non-standard port

C.  

Hosts are in a different subnet

D.  

Network congestion is causing dropped requests

Discussion 0
Questions 177

As an IT security analyst, you perform network scanning using ICMP Echo Requests. During the scan, several IP addresses do not return Echo Replies, yet other network services remain operational. How should this situation be interpreted?

Options:

A.  

The non-responsive IP addresses indicate severe network congestion.

B.  

A firewall or security control is likely blocking ICMP Echo Requests.

C.  

The lack of Echo Replies indicates an active security breach.

D.  

The IP addresses are unused and available for reassignment.

Discussion 0
Questions 178

Given the complexities of an organization’s network infrastructure, a threat actor has exploited an unidentified vulnerability, leading to a major data breach. As a Certified Ethical Hacker (CEH), you are tasked with enhancing

the organization's security stance. To ensure a comprehensive security defense, you recommend a certain security strategy. Which of the following best represents the strategy you would likely suggest and why?

Options:

A.  

Develop an in-depth Risk Management process, involving identification, assessment, treatment, tracking, and review of risks to control the potential effects on the organization.

B.  

Establish a Defense-in-Depth strategy, incorporating multiple layers of security measures to increase the complexity and decrease the likelihood of a successful attack.

C.  

Adopt a Continual/Adaptive Security Strategy involving ongoing prediction, prevention, detection, and response actions to ensure comprehensive computer network defense.

D.  

Implement an Information Assurance (IA) policy focusing on ensuring the integrity, availability, confidentiality, and authenticity of information systems.

Discussion 0
Questions 179

You are a cybersecurlty consultant for a smart city project. The project involves deploying a vast network of loT devices for public utilities like traffic control, water supply, and power grid management The city administration is concerned about the possibility of a Distributed Denial of Service (DDoS) attack crippling these critical services. They have asked you for advice on how to prevent such an attack. What would be your primary recommendation?

Options:

A.  

Implement regular firmware updates for all loT devices.

B.  

A Deploy network intrusion detection systems (IDS) across the loT network.

C.  

Establish strong, unique passwords for each loT device.

D.  

Implement IP address whitelisting for all loT devices.

Discussion 0
Questions 180

Which of the following statements about a zone transfer is correct? (Choose three.)

Options:

A.  

A zone transfer is accomplished with the DNS

B.  

A zone transfer is accomplished with the nslookup service

C.  

A zone transfer passes all zone information that a DNS server maintains

D.  

A zone transfer passes all zone information that a nslookup server maintains

E.  

A zone transfer can be prevented by blocking all inbound TCP port 53 connections

F.  

Zone transfers cannot occur on the Internet

Discussion 0
Questions 181

A penetration tester evaluates an industrial control system (ICS) that manages critical infrastructure. The tester discovers that the system uses weak default passwords for remote access. What is the most effective method to exploit this vulnerability?

Options:

A.  

Perform a brute-force attack to guess the system's default passwords

B.  

Execute a Cross-Site Request Forgery (CSRF) attack to manipulate system settings

C.  

Conduct a denial-of-service (DoS) attack to disrupt the system temporarily

D.  

Use the default passwords to gain unauthorized access to the ICS and control system operations

Discussion 0
Questions 182

John is investigating web-application firewall logs and observers that someone is attempting to inject the following:

char buff[10];

buff[>o] - 'a':

What type of attack is this?

Options:

A.  

CSRF

B.  

XSS

C.  

Buffer overflow

D.  

SQL injection

Discussion 0
Questions 183

While evaluating a smart card implementation, a security analyst observes that an attacker is measuring fluctuations in power consumption and timing variations during encryption operations on the chip. The attacker uses this information to infer secret keys used within the device. What type of exploitation is being carried out?

Options:

A.  

Disrupt control flow to modify instructions

B.  

Observe hardware signals to deduce secrets

C.  

Crack hashes using statistical collisions

D.  

Force session resets through input flooding

Discussion 0
Questions 184

Which protocol is used for setting up secure channels between two devices, typically in VPNs?

Options:

A.  

PEM

B.  

ppp

C.  

IPSEC

D.  

SET

Discussion 0
Questions 185

A user on your Windows 2000 network has discovered that he can use L0phtCrack to sniff the SMB exchanges which carry user logons. The user is plugged into a hub with 23 other systems.

However, he is unable to capture any logons though he knows that other users are logging in.

What do you think is the most likely reason behind this?

Options:

A.  

There is a NIDS present on that segment.

B.  

Kerberos is preventing it.

C.  

Windows logons cannot be sniffed.

D.  

L0phtCrack only sniffs logons to web servers.

Discussion 0
Questions 186

A penetration tester is running a vulnerability scan on a company’s network. The scan identifies an open port with a high-severity vulnerability linked to outdated software. What is the most appropriate next step for the tester?

Options:

A.  

Execute a denial-of-service (DoS) attack on the open port

B.  

Perform a brute-force attack on the service running on the open port

C.  

Research the vulnerability and determine if it has a publicly available exploit

D.  

Ignore the vulnerability and focus on finding more vulnerabilities

Discussion 0
Questions 187

What is the most plausible attack vector an APT group would use to compromise an IoT-based environmental control system?

Options:

A.  

Exploiting zero-day firmware vulnerabilities

B.  

Using stolen user credentials

C.  

Encrypted MitM attack

D.  

DDoS attack

Discussion 0
Questions 188

When configuring wireless on his home router, Javik disables SSID broadcast. He leaves authentication “open” but sets the SSID to a 32-character string of random letters and numbers.

What is an accurate assessment of this scenario from a security perspective?

Options:

A.  

Since the SSID is required in order to connect, the 32-character string is sufficient to prevent brute-force attacks.

B.  

Disabling SSID broadcast prevents 802.11 beacons from being transmitted from the access point, resulting in a valid setup leveraging “security through obscurity”.

C.  

It is still possible for a hacker to connect to the network after sniffing the SSID from a successful wireless association.

D.  

Javik’s router is still vulnerable to wireless hacking attempts because the SSID broadcast setting can be enabled using a specially crafted packet sent to the hardware address of the access point.

Discussion 0
Questions 189

A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which of the following has occurred?

Options:

A.  

The computer is not using a private IP address.

B.  

The gateway is not routing to a public IP address.

C.  

The gateway and the computer are not on the same network.

D.  

The computer is using an invalid IP address.

Discussion 0
Questions 190

Repeated failed login attempts are followed by a sudden surge in outbound data traffic from a critical server. What should be your initial course of action?

Options:

A.  

Audit all outbound traffic and analyze destination IPs

B.  

Immediately disconnect the server from the network

C.  

Perform real-time monitoring and log analysis to understand the activity

D.  

Change server credentials and force password resets

Discussion 0
Questions 191

During a reconnaissance mission, an ethical hacker uses Maltego, a popular footprinting tool, to collect information about a target organization. The information includes the target's Internet infrastructure details (domains, DNS names, Netblocks, IP address information). The hacker decides to use social engineering

techniques to gain further information. Which of the following would be the least likely method of social engineering to yield beneficial information based on the data collected?

Options:

A.  

Shoulder surfing to observe sensitive credentials input on the target's computers

B.  

Impersonating an ISP technical support agent to trick the target into providing further network details

C.  

Dumpster diving in the target company’s trash bins for valuable printouts

D.  

Eavesdropping on internal corporate conversations to understand key topics

Discussion 0
Questions 192

An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections. When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML code?

Options:

A.  

Wireshark

B.  

Ettercap

C.  

Aircrack-ng

D.  

Tcpdump

Discussion 0
Questions 193

John is an incident handler at a financial institution. His steps in a recent incident are not up to the standards of the company. John frequently forgets some steps and procedures while handling responses as they are very stressful to perform. Which of the following actions should John take to overcome this problem with the least administrative effort?

Options:

A.  

Create an incident checklist.

B.  

Select someone else to check the procedures.

C.  

Increase his technical skills.

D.  

Read the incident manual every time it occurs.

Discussion 0
Questions 194

Mary, a penetration tester, has found password hashes in a client system she managed to breach. She needs to use these passwords to continue with the test, but she does not have time to find the passwords that correspond to these hashes. Which type of attack can she implement in order to continue?

Options:

A.  

LLMNR/NBT-NS poisoning

B.  

Internal monologue attack

C.  

Pass the ticket

D.  

Pass the hash

Discussion 0
Questions 195

Jacob works as a system administrator in an organization. He wants to extract the source code of a mobile application and disassemble the application to analyze its design flaws. Using this technique, he wants to fix any bugs in the application, discover underlying vulnerabilities, and improve defense strategies against attacks.

What is the technique used by Jacob in the above scenario to improve the security of the mobile application?

Options:

A.  

Reverse engineering

B.  

App sandboxing

C.  

Jailbreaking

D.  

Social engineering

Discussion 0
Questions 196

During a cloud security assessment, it was discovered that a former employee still had access to critical resources months after leaving the organization. Which practice would have most effectively prevented this issue?

Options:

A.  

Using multi-cloud deployment models

B.  

Implementing real-time traffic analysis

C.  

Conducting regular penetration tests

D.  

Enforcing timely user de-provisioning

Discussion 0
Questions 197

An attacker exploits medical imaging protocols to intercept patient data. Which sniffing technique is most challenging?

Options:

A.  

MRI firmware interception

B.  

Ultrasound malware

C.  

Covert channel within administrative messages

D.  

Embedding data inside CT scan images

Discussion 0
Questions 198

A penetration tester is attempting to gain access to a wireless network that is secured with WPA2 encryption. The tester successfully captures the WPA2 handshake but now needs to crack the pre-shared key. What is the most effective method to proceed?

Options:

A.  

Perform a brute-force attack using common passwords against the captured handshake

B.  

Use a dictionary attack against the captured WPA2 handshake to crack the key

C.  

Execute a SQL injection attack on the router's login page

D.  

Conduct a de-authentication attack to disconnect all clients from the network

Discussion 0
Questions 199

Tony is a penetration tester tasked with performing a penetration test. After gaining initial access to a target system, he finds a list of hashed passwords.

Which of the following tools would not be useful for cracking the hashed passwords?

Options:

A.  

John the Ripper

B.  

Hashcat

C.  

netcat

D.  

THC-Hydra

Discussion 0
Questions 200

An attacker examines differences in ciphertext outputs resulting from small changes in the input to deduce key patterns in a symmetric algorithm. What method is being employed?

Options:

A.  

Differential cryptanalysis on input-output differences

B.  

Timing attack to infer key bits based on processing time

C.  

Brute-force attack to try every possible key

D.  

Chosen-ciphertext attack to decrypt arbitrary ciphertexts

Discussion 0
Questions 201

You are investigating unauthorized access to a web application using token-based authentication. Tokens expire after 30 minutes. Server logs show multiple failed login attempts using expired tokens within a short window, followed by successful access with a valid token. What is the most likely attack scenario?

Options:

A.  

The attacker captured a valid token before expiration and reused it

B.  

The attacker brute-forced the token generation algorithm

C.  

The attacker exploited a race condition allowing expired tokens to be validated

D.  

The attacker performed a token replay attack that confused the server

Discussion 0
Questions 202

Which countermeasure best mitigates brute-force attacks on Bluetooth SSP?

Options:

A.  

Use BLE exclusively

B.  

Increase Diffie-Hellman key length

C.  

Apply rate-limiting

D.  

Device whitelisting

Discussion 0
Questions 203

A penetration tester suspects that a web application's product search feature is vulnerable to SQL injection. The tester needs to confirm this by manipulating the SQL query. What is the best technique to test for SQL injection?

Options:

A.  

Inject a malicious script into the search field to test for Cross-Site Scripting (XSS)

B.  

Use directory traversal syntax in the search field to access server files

C.  

Input 1 OR 1=1 in the search field to retrieve all products from the database

D.  

Insert admin'— in the search field to attempt bypassing authentication

Discussion 0
Questions 204

Firewalk has just completed the second phase (the scanning phase), and a technician receives the output shown below. What conclusions can be drawn based on these scan results?

TCP port 21 no response

TCP port 22 no response

TCP port 23 Time-to-live exceeded

Options:

A.  

The lack of response from ports 21 and 22 indicate that those services are not running on the destination server

B.  

The scan on port 23 was able to make a connection to the destination host prompting the firewall to respond with a TTL error

C.  

The scan on port 23 passed through the filtering device. This indicates that port 23 was not blocked at the firewall

D.  

The firewall itself is blocking ports 21 through 23 and a service is listening on port 23 of the target host

Discussion 0
Questions 205

Which of the following is assured by the use of a hash?

Options:

A.  

Authentication

B.  

Confidentiality

C.  

Availability

D.  

Integrity

Discussion 0
Questions 206

A penetration tester identifies malware on a system that hides its presence and gives an attacker access to administrative functions without being detected. What type of malware is this?

Options:

A.  

Virus

B.  

Keylogger

C.  

Ransomware

D.  

Rootkit

Discussion 0
Questions 207

Why is NTP responding with internal IP addresses and hostnames?

Options:

A.  

TCP fallback abuse

B.  

DNS poisoning

C.  

Honeypot redirection

D.  

Misconfigured NTP daemon allowing external queries

Discussion 0
Questions 208

A city’s power management system relies on SCADA infrastructure. Recent anomalies include inconsistent sensor readings and intermittent outages. Security analysts suspect a side-channel attack designed to extract sensitive information covertly from SCADA devices. Which investigative technique would best confirm this type of attack?

Options:

A.  

Measuring unusual physical or electrical fluctuations during device operation at the hardware level.

B.  

Identifying weak cryptographic configurations in device communications.

C.  

Assessing SCADA user interfaces for unauthorized access or misuse.

Discussion 0
Questions 209

Jack, a disgruntled ex-employee of Incalsol Ltd., decided to inject fileless malware into Incalsol's systems. To deliver the malware, he used the current employees' email IDs to send fraudulent emails embedded with malicious links that seem to be legitimate. When a victim employee clicks on the link, they are directed to a fraudulent website that automatically loads Flash and triggers the exploit. What is the technique used byjack to launch the fileless malware on the target systems?

Options:

A.  

In-memory exploits

B.  

Phishing

C.  

Legitimate applications

D.  

Script-based injection

Discussion 0
Questions 210

Juliet, a security researcher in an organization, was tasked with checking for the authenticity of images to be used in the organization's magazines. She used these images as a search query and tracked the original source and details of the images, which included photographs, profile pictures, and memes. Which of the following footprinting techniques did Rachel use to finish her task?

Options:

A.  

Reverse image search

B.  

Meta search engines

C.  

Advanced image search

D.  

Google advanced search

Discussion 0
Questions 211

Under what conditions does a secondary name server request a zone transfer from a primary name server?

Options:

A.  

When a primary SOA is higher than a secondary SOA

B.  

When a secondary SOA is higher than a primary SOA

C.  

When a primary name server has had its service restarted

D.  

When a secondary name server has had its service restarted

E.  

When the TTL falls to zero

Discussion 0
Questions 212

The “Gray-box testing” methodology enforces what kind of restriction?

Options:

A.  

Only the external operation of a system is accessible to the tester.

B.  

The internal operation of a system in only partly accessible to the tester.

C.  

Only the internal operation of a system is known to the tester.

D.  

The internal operation of a system is completely known to the tester.

Discussion 0
Questions 213

Your company, SecureTech Inc., is planning to transmit some sensitive data over an unsecured communication channel. As a cyber security expert, you decide to use symmetric key encryption to protect the data. However,

you must also ensure the secure exchange of the symmetric key. Which of the following protocols would you recommend to the team to achieve this?

Options:

A.  

Implementing SSL certificates on your company's web servers.

B.  

Applying the Diffie-Hellman protocol to exchange the symmetric key.

C.  

Switching all data transmission to the HTTPS protocol.

D.  

Utilizing SSH for secure remote logins to the servers.

Discussion 0
Questions 214

Calvin, a software developer, uses a feature that helps him auto-generate the content of a web page without manual involvement and is integrated with SSI directives. This leads to a vulnerability in the developed web application as this feature accepts remote user inputs and uses them on the page. Hackers can exploit this feature and pass malicious SSI directives as input values to perform malicious activities such as modifying and erasing server files. What is the type of injection attack Calvin's web application is susceptible to?

Options:

A.  

Server-side template injection

B.  

Server-side JS injection

C.  

CRLF injection

D.  

Server-side includes injection

Discussion 0
Questions 215

A CEH has mirrored a website, identified session hijacking risk, and wants to minimize detection. What is the most appropriate next step?

Options:

A.  

Attempt SQL Injection

B.  

Hijack a session and modify server configuration

C.  

Launch brute-force attacks

D.  

Perform automated vulnerability scanning

Discussion 0
Questions 216

Which of the following represents the initial two commands that an IRC client sends to join an IRC network?

Options:

A.  

USER, NICK

B.  

LOGIN, NICK

C.  

USER, PASS

D.  

LOGIN, USER

Discussion 0
Questions 217

A senior executive receives a personalized email titled “Annual Performance Review 2024.” The email includes a malicious PDF that installs a backdoor when opened. The message appears to originate from the CEO and uses official company branding. Which phishing technique does this scenario best illustrate?

Options:

A.  

Email clone attack with altered attachments

B.  

Broad phishing sent to all employees

C.  

Pharming using DNS poisoning

D.  

Whaling attack targeting high-ranking personnel

Discussion 0
Questions 218

Ricardo has discovered the username for an application in his targets environment. As he has a limited amount of time, he decides to attempt to use a list of common passwords he found on the Internet. He compiles them into a list and then feeds that list as an argument into his password-cracking application, what type of attack is Ricardo performing?

Options:

A.  

Known plaintext

B.  

Password spraying

C.  

Brute force

D.  

Dictionary

Discussion 0
Questions 219

Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?

Options:

A.  

To determine who is the holder of the root account

B.  

To perform a DoS

C.  

To create needless SPAM

D.  

To illicit a response back that will reveal information about email servers and how they treat undeliverable mail

E.  

To test for virus protection

Discussion 0
Questions 220

What is the main security service a cryptographic hash provides?

Options:

A.  

Integrity and ease of computation

B.  

Message authentication and collision resistance

C.  

Integrity and collision resistance

D.  

Integrity and computational infeasibility

Discussion 0
Questions 221

in an attempt to increase the security of your network, you Implement a solution that will help keep your wireless network undiscoverable and accessible only to those that know It. How do you accomplish this?

Options:

A.  

Delete the wireless network

B.  

Remove all passwords

C.  

Lock all users

D.  

Disable SSID broadcasting

Discussion 0
Questions 222

When you are getting information about a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file from the server. You can detect all these methods (GET, POST, HEAD, DELETE, PUT, TRACE) using NMAP script engine. What Nmap script will help you with this task?

Options:

A.  

http-methods

B.  

http enum

C.  

http-headers

D.  

http-git

Discussion 0
Questions 223

An attacker performs DNS cache snooping using the dig command with the +norecurse flag against a known DNS server. The server returns NOERROR but provides no answer to the query. What does this most likely suggest?

Options:

A.  

The record was found in the DNS cache and successfully returned.

B.  

The DNS server failed to resolve the request.

C.  

No client from the DNS server’s network has recently accessed the queried domain.

D.  

The queried domain has expired and no longer exists.

Discussion 0
Questions 224

A DDOS attack is performed at layer 7 to take down web infrastructure. Partial HTTP requests are sent to the web infrastructure or applications. Upon receiving a partial request, the target servers opens multiple connections and keeps waiting for the requests to complete.

Which attack is being described here?

Options:

A.  

Desynchronization

B.  

Slowloris attack

C.  

Session splicing

D.  

Phlashing

Discussion 0
Questions 225

An ethical hacker is hired to conduct a comprehensive network scan of a large organization that strongly suspects potential intrusions into their internal systems. The hacker decides to employ a combination of scanning tools to obtain a detailed understanding of the network. Which sequence of actions would provide the most comprehensive information about the network's status?

Options:

A.  

Initiate with Nmap for a ping sweep, then use Metasploit to scan for open ports and services, and finally use Hping3 to perform remote OS fingerprinting

B.  

Use Hping3 for an ICMP ping scan on the entire subnet, then use Nmap for a SYN scan on identified active hosts, and finally use Metasploit to exploit identified vulnerabilities

C.  

Start with Hping3 for a UDP scan on random ports, then use Nmap for a version detection scan, and finally use Metasploit to exploit detected vulnerabilities

D.  

Begin with NetScanTools Pro for a general network scan, then use Nmap for OS detection and version detection, and finally perform an SYN flooding with Hping3

Discussion 0
Questions 226

Alice needs to send a confidential document to her coworker. Bryan. Their company has public key infrastructure set up. Therefore. Alice both encrypts the message and digitally signs it. Alice uses_______to encrypt the message, and Bryan uses__________to confirm the digital signature.

Options:

A.  

Bryan’s public key; Bryan’s public key

B.  

Alice’s public key; Alice’s public key

C.  

Bryan’s private key; Alice’s public key

D.  

Bryan’s public key; Alice’s public key

Discussion 0
Questions 227

A large media-streaming company receives complaints that its web application is timing out or failing to load. Security analysts observe the web server is overwhelmed with a large number of open HTTP connections, transmitting data extremely slowly. These connections remain open indefinitely, exhausting server resources without consuming excessive bandwidth. The team suspects an application-layer DoS attack. Which attack is most likely responsible?

Options:

A.  

A UDP flooding attack targeting random ports.

B.  

An ICMP Echo Request flooding attack.

C.  

A Slowloris attack that keeps numerous HTTP connections open to exhaust server resources.

D.  

A fragmented packet attack with overlapping offset values.

Discussion 0
Questions 228

If executives are found liable for not properly protecting their company’s assets and information systems, what type of law would apply in this situation?

Options:

A.  

Criminal

B.  

International

C.  

Common

D.  

Civil

Discussion 0
Questions 229

A cybersecurity team identifies suspicious outbound network traffic. Investigation reveals malware utilizing the Background Intelligent Transfer Service (BITS) to evade firewall detection. Why would attackers use this service to conceal malicious activities?

Options:

A.  

Because BITS packets appear identical to normal Windows Update traffic.

B.  

Because BITS operates exclusively through HTTP tunneling.

C.  

Because BITS utilizes IP fragmentation to evade intrusion detection systems.

D.  

Because BITS traffic uses encrypted DNS packets.

Discussion 0
Questions 230

Which of the following statements is FALSE with respect to Intrusion Detection Systems?

Options:

A.  

Intrusion Detection Systems can be configured to distinguish specific content in network packets

B.  

Intrusion Detection Systems can easily distinguish a malicious payload in encrypted traffic

C.  

Intrusion Detection Systems require constant update of the signature library

D.  

Intrusion Detection Systems can examine the contents of the data in context of the network protocol

Discussion 0
Questions 231

During a red team test, a web application dynamically builds SQL queries using a numeric URL parameter. The tester sends the following request:

http://vulnerableapp.local/view.php?id=1; DROP TABLE users;

The application throws errors and the users table is deleted. Which SQL injection technique was used?

Options:

A.  

UNION-based SQL injection

B.  

Stacked (Piggybacked) queries

C.  

Boolean-based SQL injection

D.  

Error-based SQL injection

Discussion 0
Questions 232

A penetration tester evaluates the security of an iOS mobile application that handles sensitive user information. The tester discovers that the application is vulnerable to insecure data transmission. What is the most effective method to exploit this vulnerability?

Options:

A.  

Execute a SQL injection attack to retrieve data from the backend server

B.  

Perform a man-in-the-middle attack to intercept unencrypted data transmitted over the network

C.  

Conduct a brute-force attack on the app’s authentication system

D.  

Use a Cross-Site Request Forgery (CSRF) attack to steal user session tokens

Discussion 0
Questions 233

#!/usr/bin/python

import socket

buffer=["A"]

counter=50

while len(buffer)<=100:

buffer.append("A"*counter)

counter=counter+50

commands=["HELP","STATS","RTIME","LTIME","SRUN","TRUN","GMON","GDOG","KSTET","GTER","HTER","LTER","KSTAN"]

for command in commands:

for buffstring in buffer:

print "Exploiting " + command + ": " + str(len(buffstring))

s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)

s.connect(('127.0.0.1', 9999))

s.recv(50)

s.send(command + buffstring)

s.close()

What is the code written for?

Options:

A.  

Denial-of-service (DOS)

B.  

Buffer Overflow

C.  

Bruteforce

D.  

Encryption

Discussion 0
Questions 234

Maria is conducting passive reconnaissance on a competitor without interacting with their systems. Which method would be least appropriate and potentially risky?

Options:

A.  

Using the Wayback Machine

B.  

Running an intensive port scan on public IPs

C.  

Reviewing forums and social media

D.  

Examining patent databases and public records

Discussion 0
Questions 235

Insecure direct object reference is a type of vulnerability where the application does not verify if the user is authorized to access the internal object via its name or key. Suppose a malicious user Rob tries to get access to the account of a benign user Ned.

Which of the following requests best illustrates an attempt to exploit an insecure direct object reference vulnerability?

Options:

A.  

“GET /restricted/goldtransfer?to=Rob&from=1 or 1=1’ HTTP/1.1Host: westbank.com”

B.  

“GET /restricted/\r\n\%00account%00Ned%00access HTTP/1.1 Host: westbank.com”

C.  

“GET /restricted/accounts/?name=Ned HTTP/1.1 Host westbank.com”

D.  

“GET /restricted/ HTTP/1.1 Host: westbank.com

Discussion 0
Questions 236

The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the host

10.0.0.3. He also needs to permit all FTP traffic to the rest of the network and deny all other traffic. After he

applied his ACL configuration in the router, nobody can access the ftp, and the permitted hosts cannot access

the Internet. According to the next configuration, what is happening in the network?

access-list 102 deny tcp any any

access-list 104 permit udp host 10.0.0.3 any

access-list 110 permit tcp host 10.0.0.2 eq www any

access-list 108 permit tcp any eq ftp any

Options:

A.  

The ACL 104 needs to be first because is UDP

B.  

The first ACL is denying all TCP traffic and the other ACLs are being ignored by the router

C.  

The ACL for FTP must be before the ACL 110

D.  

The ACL 110 needs to be changed to port 80

Discussion 0
Questions 237

Fred is the network administrator for his company. Fred is testing an internal switch. From an external IP address, Fred wants to try and trick this switch into thinking it already has established a session with his computer. How can Fred accomplish this?

Options:

A.  

Fred can accomplish this by sending an IP packet with the RST/SIN bit and the source address of his computer.

B.  

He can send an IP packet with the SYN bit and the source address of his computer.

C.  

Fred can send an IP packet with the ACK bit set to zero and the source address of the switch.

D.  

Fred can send an IP packet to the switch with the ACK bit and the source address of his machine.

Discussion 0
Questions 238

Which is the first step followed by Vulnerability Scanners for scanning a network?

Options:

A.  

OS Detection

B.  

Firewall detection

C.  

TCP/UDP Port scanning

D.  

Checking if the remote host is alive

Discussion 0
Questions 239

What is GINA?

Options:

A.  

Gateway Interface Network Application

B.  

GUI Installed Network Application CLASS

C.  

Global Internet National Authority (G-USA)

D.  

Graphical Identification and Authentication DLL

Discussion 0
Questions 240

“........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. It is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hot-spot by posing as a legitimate provider. This type of attack may be used to steal the passwords of

unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there.”

Fill in the blank with appropriate choice.

Options:

A.  

Evil Twin Attack

B.  

Sinkhole Attack

C.  

Collision Attack

D.  

Signal Jamming Attack

Discussion 0
Questions 241

A penetration tester is conducting an assessment of a web application for a financial institution. The application uses form-based authentication and does not implement account lockout policies after multiple failed login attempts. Interestingly, the application displays detailed error messages that disclose whether the username or password entered is incorrect. The tester also notices that the application uses HTTP headers to prevent clickjacking attacks but does not implement Content Security Policy (CSP). With these observations, which of the following attack methods would likely be the most effective for the penetration tester to exploit these vulnerabilities and attempt unauthorized access?

Options:

A.  

The tester could execute a Brute Force attack, leveraging the lack of account lockout policy and the verbose error messages to guess the correct credentials

B.  

The tester could exploit a potential SQL Injection vulnerability to manipulate the application's database

C.  

The tester could launch a Cross-Site Scripting (XSS) attack to steal authenticated session cookies, potentially bypassing the clickjacking protection

D.  

The tester could execute a Man-in-the-Middle (MitM) attack to intercept and modify the HTTP headers for a Clickjacking attack

Discussion 0
Questions 242

in this attack, an adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying cryptographic handshake messages. When the victim reinstall the key, associated parameters such as the incremental transmit packet number and receive packet number are reset to their initial values. What is this attack called?

Options:

A.  

Chop chop attack

B.  

KRACK

C.  

Evil twin

D.  

Wardriving

Discussion 0
Questions 243

DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?

Options:

A.  

Spanning tree

B.  

Dynamic ARP Inspection (DAI)

C.  

Port security

D.  

Layer 2 Attack Prevention Protocol (LAPP)

Discussion 0
Questions 244

A penetration tester is tasked with assessing the security of a smart home IoT device that communicates with a mobile app over an unencrypted connection. The tester wants to intercept the communication and extract sensitive information. What is the most effective approach to exploit this vulnerability?

Options:

A.  

Perform a brute-force attack on the device's Wi-Fi credentials

B.  

Use a man-in-the-middle (MitM) attack to intercept and analyze the unencrypted traffic

C.  

Execute a SQL injection attack on the IoT device’s cloud management portal

D.  

Use a dictionary attack to guess the admin login credentials of the device

Discussion 0
Questions 245

John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker Installed a scanner on a machine belonging to one of the vktims and scanned several machines on the same network to Identify vulnerabilities to perform further exploitation. What is the type of vulnerability assessment tool employed by John in the above scenario?

Options:

A.  

Proxy scanner

B.  

Agent-based scanner

C.  

Network-based scanner

D.  

Cluster scanner

Discussion 0
Questions 246

An attacker scans a host with the below command. Which three flags are set?

# nmap -sX host.domain.com

Options:

A.  

This is SYN scan. SYN flag is set.

B.  

This is Xmas scan. URG, PUSH and FIN are set.

C.  

This is ACK scan. ACK flag is set.

D.  

This is Xmas scan. SYN and ACK flags are set.

Discussion 0
Questions 247

During security awareness training, which scenario best describes a tailgating social engineering attack?

Options:

A.  

An attacker impersonates a customer to recover account credentials

B.  

An attacker leaves a malicious USB labeled “Employee Bonus List”

C.  

A person gains access to a secure building by following an authorized employee through a locked door

D.  

An email urges employees to enter credentials for an urgent system update

Discussion 0
Questions 248

Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless communications. He installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used this virtual tower to interrupt the data transmission between the user and real tower, attempting to hijack an active session, upon receiving the users request. Bobby manipulated the traffic with the virtual tower and redirected the victim to a malicious website. What is the attack performed by Bobby in the above scenario?

Options:

A.  

Wardriving

B.  

KRACK attack

C.  

jamming signal attack

D.  

aLTEr attack

Discussion 0
Questions 249

A security analyst investigates unusual east-west traffic on a corporate network. A rogue device has been physically inserted between a workstation and the switch, enabling unauthorized access while inheriting the workstation’s authenticated network state. Which evasion technique is being used?

Options:

A.  

Exploiting a wireless rogue access point to tunnel through the firewall

B.  

NAC bypass using a pre-authenticated device for network bridging

C.  

Spoofing ARP responses from a dynamic IP allocation pool

D.  

VLAN double tagging to shift between network segments

Discussion 0
Questions 250

Packet fragmentation is used as an evasion technique. Which IDS configuration best counters this?

Options:

A.  

Recognizing regular fragmented packet intervals

B.  

Anomaly-based IDS detecting irregular traffic patterns

C.  

Rejecting all fragmented packets

D.  

Signature-based IDS detecting fragmented packet signatures

Discussion 0
Questions 251

Which tier in the N-tier application architecture is responsible for moving and processing data between the tiers?

Options:

A.  

Presentation tier

B.  

Application Layer

C.  

Logic tier

D.  

Data tier

Discussion 0
Questions 252

An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption. The attacker installed a rogue access point with only WPA2 compatibility in the vicinity and forced the victim to go through the WPA2 four-way handshake to get connected. After the connection was established, the attacker used automated tools to crack WPA2-encrypted messages. What is the attack performed in the above scenario?

Options:

A.  

Timing-based attack

B.  

Side-channel attack

C.  

Downgrade security attack

D.  

Cache-based attack

Discussion 0
Questions 253

During a security assessment of a cloud-hosted application using SOAP-based web services, a red team operator intercepts a valid SOAP request, duplicates the signed message body, inserts it into the same envelope, and forwards it. Due to improper validation, the server accepts the duplicated body and executes unauthorized code. What type of attack does this represent?

Options:

A.  

Cloud snooper attack

B.  

Cryptanalysis attack

C.  

Wrapping attack

D.  

IMDS abuse

Discussion 0
Questions 254

Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?

Options:

A.  

Macro virus

B.  

Stealth/Tunneling virus

C.  

Cavity virus

D.  

Polymorphic virus

Discussion 0
Questions 255

An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network’s external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file.

What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

Options:

A.  

Protocol analyzer

B.  

Network sniffer

C.  

Intrusion Prevention System (IPS)

D.  

Vulnerability scanner

Discussion 0
Questions 256

Elante company has recently hired James as a penetration tester. He was tasked with performing enumeration on an organization's network. In the process of enumeration, James discovered a service that is accessible to external sources. This service runs directly on port 21.

What is the service enumerated by James in the above scenario?

Options:

A.  

Border Gateway Protocol (BGP)

B.  

File Transfer Protocol (FTP)

C.  

Network File System (NFS)

D.  

Remote Procedure Call (RPC)

Discussion 0
Questions 257

Which advanced mobile hacking technique is the hardest to detect and mitigate in a healthcare environment?

Options:

A.  

Zero-day mobile exploits

B.  

App spoofing

C.  

Bluejacking

D.  

Side-channel attacks

Discussion 0
Questions 258

When conducting a penetration test, it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network. Which of the following cannot be performed by passive network sniffing?

Options:

A.  

Identifying operating systems, services, protocols and devices

B.  

Modifying and replaying captured network traffic

C.  

Collecting unencrypted information about usernames and passwords

D.  

Capturing a network traffic for further analysis

Discussion 0
Questions 259

A large company intends to use BlackBerry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?

Options:

A.  

Paros Proxy

B.  

BBProxy

C.  

Blooover

D.  

BBCrack

Discussion 0
Questions 260

Techno Security Inc. recently hired John as a penetration tester. He was tasked with identifying open ports in the target network and determining whether the ports are online and any firewall rule sets are encountered. John decided to perform a TCP SYN ping scan on the target network. Which of the following Nmap commands must John use to perform the TCP SYN ping scan?

Options:

A.  

nmap -sn -pp

B.  

nmap -sn -PO

C.  

nmap -sn -PS

D.  

nmap -sn -PA

Discussion 0
Questions 261

Peter extracts the SIDs list from a Windows 2000 Server machine using the hacking tool "SIDExtractor". Here is the output of the SIDs:

[Image showing multiple user accounts with their Security Identifiers (SIDs)]

From the above list identify the user account with System Administrator privileges.

Options:

A.  

John

B.  

Rebecca

C.  

Sheela

D.  

Shawn

E.  

Somia

F.  

Chang

G.  

Micah

Discussion 0