CEH Exam Questions For Free 2024By itexambyte.com / 4 February 2024 Created by itexambyte.com CEH Sample Questions and Answers Total Questions – 125Passing Score is 70%DomainWeightage %Information Security and Ethical Hacking Overview6%Reconnaissance Techniques21%System Hacking Phases and Attack Techniques17%Network and Perimeter Hacking14%Web Application Hacking16%Wireless Network Hacking6%Mobile Platform, IoT, and OT Hacking8%Cloud Computing6%Cryptography6% 1 / 125 1. In one of the following attacks, an attacker has complete access to a plaintext message including its encryption, and they can modify the content of the message by making a series of interactive queries, choosing subsequent plaintext blocks based on the information from the previous encryption queries and functions. Which is this attack? A) Chosen-plaintext attack B) Known-plaintext attack C) Ciphertext-only attack D) Adaptive chosen-plaintext attack 2 / 125 2. In a mode of authenticated encryption, the plaintext is first encrypted using a secret key. Then, a hash value is generated for the obtained cipher text and is attached to the cipher text before transmission. Identify this mode of authenticated encryption. A) Encrypt-then-MAC (EtM) B) Encrypt-and-MAC (E&M) C) Authenticated encryption with associated data (AEAD) D) MAC-then-Encrypt (MtE) 3 / 125 3. In a cipher mode of operation, the initialization vector (IV) stored in the shift register is sent as input to the encryption algorithm along with the secret key. From the result of encryption, the first S bits are selected to perform XOR with a plaintext block of size S to produce a cipher block. Identify this cipher mode of operation. A) Electronic code book (ECB) mode B) Counter mode C) Cipher feedback (CFB) mode D) Cipher block chaining (CBC) mode 4 / 125 4. Which cipher encrypts the plain text digit (bit or byte) one by one? A) Stream cipher B) Classical cipher C) Modern cipher D) Block cipher 5 / 125 5. Some passwords are stored using specialized encryption algorithms known as hashes. Why is this an appropriate method? A) It is impossible to crack hashed user passwords unless the key used to encrypt them is obtained. B) Hashing is faster when compared to more traditional encryption algorithms. C) Passwords stored using hashes are nonreversible, making finding the password much more difficult. D) If a user forgets the password, it can be easily retrieved using the hash key stored by administrators. 6 / 125 6. Which of the following algorithms uses a sponge construction where message blocks are XORed into the initial bits of the state that the algorithm then invertibly permutes? A) SHA-2 B) SHA-3 C) MD6 D) MD5 7 / 125 7. Which of the following symmetric-key block ciphers uses a 128-bit symmetric block cipher with key sizes of 128, 192, and 256 bits and can be easily integrated into software or hardware programs without any restrictions? A) TEA B) Blowfish C) RC6 D) Serpent 8 / 125 8. Which of the following terms refers to on-premises or cloud-hosted solutions for enforcing security, compliance, and governance policies in cloud applications? A) Kubernetes B) Container C) CASB D) Cluster 9 / 125 9. Which of the following best practices allows security professionals to secure the docker environment? A) Always expose the docker daemon socket B) Disable the read-only mode on file systems and volumes C) Always run docker images with –security-opt=no-new-privileges D) Never use tools such as InSpec and DevSec to detect docker vulnerabilities 10 / 125 10. In which of the following attacks does an attacker exploit the vulnerability residing in a bare-metal cloud server and use it to implant a malicious backdoor in its firmware? A) Cryptanalysis attack B) Cloudborne attack C) Wrapping attack D) Cross-site scripting attack 11 / 125 11. In which of the following attacks does an attacker abuse cloud file synchronization services, such as Google Drive and DropBox, for data compromise, command and control, data exfiltration, and remote access? A) Cloud cryptojacking B) Cloud hopper attack C) Cloudborne attack D) Man-in-the-cloud attack 12 / 125 12. Highlander, Incorporated, is a medical insurance company with several regional company offices in North America. There are various types of employees working in the company, including technical teams, sales teams, and work-from-home employees. Highlander takes care of the security patches and updates of official computers and laptops; however, the computers or laptops of the work-from-home employees are to be managed by the employees or their ISPs. Highlander employs various group policies to restrict the installation of any third-party applications.As per Highlander’s policy, all the employees are able to utilize their personal smartphones to access the company email in order to respond to requests for updates. Employees are responsible for keeping their phones up to date with the latest patches. The phones are not used to directly connect to any other resources in the Highlander, Incorporated, network.The database that hosts the information collected from the insurance application is hosted on a cloud-based file server, and their email server is hosted on Office 365. Other files created by employees get saved to a cloud-based file server, and the company uses work folders to synchronize offline copies back to their devices. Apart from Highlander employees, no one can access the cloud service.What type of cloud service is Highlander using? A) Public loud B) Hybrid cloud C) Private cloud D) Community cloud 13 / 125 13. Which of the following cloud deployment models is a combination of two or more clouds that remain unique entities but are bound together, where an organization makes available and manages some resources in-house and provides other resources externally? A) Community cloud B) Multi cloud C) Hybrid cloud D) Public cloud 14 / 125 14. Which of the following cloud services provides features such as single sign-on, multi-factor authentication, identity governance and administration, access management, and intelligence collection? A) IDaaS B) PaaS C) IaaS D) SaaS 15 / 125 15. Which of the following online tools allows attackers to discover the default credentials of a device or product simply by entering the device name or manufacturer name? A) Censys B) Thingful C) Netcraft D) CRITIFENCE 16 / 125 16. Which of the following levels of the Purdue model uses protocols such as 6LoWPAN, DNP3, DNS/DNSSEC, FTE, HART-IP, IEC 60870-5-101/104, and SOAP? A) Level 0 B) Level 1 C) Level 2 D) Level 4 17 / 125 17. Which of the following components of an industrial control system is a small solid-state control computer where instructions can be customized to perform a specific task? A) DCS B) BPCS C) PLC D) SIS 18 / 125 18. Which of the following IoT technology components bridges the gap between the IoT device and the end user? A) Remote control using mobile app B) Cloud server/data storage C) IoT gateway D) Sensing technology 19 / 125 19. Which of the following protocols is a type of LAN that consists of a wired connection between computers in a small building, office, or campus? A) Ethernet B) MQTT C) LTE-Advanced D) Li-Fi 20 / 125 20. In which of the following IoT attacks does an attacker extract information about encryption keys by observing the emission of signals? A) Exploit kits B) Sybil attack C) DNS rebinding attack D) Side-channel attack 21 / 125 21. Identify the practice that can make mobile devices susceptible to different types of cyber threats. A) Control devices and applications. B) Use a public Wi-Fi instead of a cellular data network. C) Verify the location of printers before printing sensitive documents. D) Deploy anti-malware applications to detect and block malicious applications. 22 / 125 22. Which of the following mobile bluetooth attacks enables an attacker to gain remote access to the victims mobile and use its features without the victim’s knowledge or consent? A) Bluesnarfing B) BlueSniff C) Bluesmacking D) Bluebugging 23 / 125 23. In which of the following attacks does an attacker exploit vulnerabilities in the SSL/TLS implementation on websites and invisibly downgrade connections to HTTP without encryption? A) Fake SSL certificates B) Rogue access points C) SSLStrip D) Packet sniffing 24 / 125 24. Which of the following attacks is performed by attackers to eavesdrop on existing network connections between two systems, intrude, and then read or modify data? A) Man-in-the-middle B) DNS poisoning C) Packet sniffing D) Fake SSL certificates 25 / 125 25. Which of the following practices makes the Bluetooth-enabled devices of an organization vulnerable to various attacks? A) Use link encryption for all Bluetooth connections. B) Avoid sharing sensitive information over Bluetooth-enabled devices. C) Always grant Bluetooth access permission to applications. D) Change the default settings of the Bluetooth-enabled device to the best security standard. 26 / 125 26. Mark is working as a penetration tester in InfoSEC, Inc. One day, he notices that the traffic on the internal wireless router suddenly increases by more than 50%. He knows that the company is using a wireless 802.11 a/b/g/n/ac network. He decided to capture live packets and browse the traffic to investigate the issue to find out the actual cause. Which of the following tools should Mark use to monitor the wireless network? A) CommView for Wi-Fi B) BlueScan C) WiFiFoFum D) WiFish Finder 27 / 125 27. Kenneth, a professional penetration tester, was hired by the XYZ Company to conduct wireless network penetration testing. Kenneth proceeds with the standard steps of wireless penetration testing. He tries to collect lots of initialization vectors (IVs) using the injection method to crack the WEP key. He uses the aircrack-ng tool to capture the IVs from a specific AP. Which of the following aircrack-ng commands will help Kenneth to do this? A) aireplay-ng -1 0 -e teddy -a 00:14:6C:7E:40:80 -h 00:0F:B5:88:AC:82 ath0 B) aireplay-ng -9 -e teddy -a 00:14:6C:7E:40:80 ath0 C) airmon-ng start wifi0 9 D) airodump-ng -c 9 — bssid 00:14:6C:7E:40:80 -w output ath0 28 / 125 28. John is a pen tester working with an information security consultant based in Paris. As part of a penetration testing assignment, he was asked to perform wireless penetration testing for a large MNC. John knows that the company provides free Wi-Fi access to its employees on the company premises. He sets up a rogue wireless access point with the same SSID as that of the company’s Wi-Fi network just outside the company premises. He sets up this rogue access point using the tools that he has and hopes that the employees might connect to it. What type of wireless confidentiality attack is John trying to do? A) War Driving B) WEP Cracking C) Evil Twin AP D) KRACK Attack 29 / 125 29. WPA2 uses AES for wireless data encryption at which of the following encryption levels? A) 64 bit and CCMP B) 128 bit and CCMP C) 128 bit and TKIP D) 128 bit and CRC 30 / 125 30. Which of the following Wi-Fi security protocols uses GCMP-256 for encryption and HMAC-SHA-384 for authentication? A) PEAP B) WEP C) CCMP D) WPA3 31 / 125 31. Which of the following is a standard for Wireless Local Area Networks (WLANs) that provides improved encryption for networks that use 802.11a, 802.11b, and 802.11g standards? A) 802.11n B) 802.11d C) 802.11i D) 802.11e 32 / 125 32. Which of the following terms describes the amount of information that may be broadcast over a connection? A) Bandwidth B) Hotspot C) ISM band D) BSSID 33 / 125 33. In which of the following evasion techniques does an attacker use a WHERE statement that is always evaluated as “true” so that any mathematical or string comparison can be used, such as “’ or ‘1’=’1’”? A) Null byte B) Variations C) Declare variables D) Case variation 34 / 125 34. A tester has been hired to perform source code review of a web application to detect SQL injection vulnerabilities. As part of the testing process, he needs to get all the information about the project from the development team. During the discussion with the development team, he comes to know that the project is in the initial stage of the development cycle. As per the above scenario, which of the following processes does the tester need to follow in order to save the company’s time and money? A) The tester needs to perform static code analysis as it covers the executable file of the code B) The tester needs to perform dynamic code analysis as it uncovers bugs in the software system C) The tester needs to perform static code analysis as it covers the structural and statement coverage testing D) The tester needs to perform dynamic code analysis as it finds and fixes the defects 35 / 125 35. Which of the following functions can be used by an attacker to link a target SQL server’s database to the attacker’s own machine and retrieve data from the target SQL server database? A) LOAD_FILE() B) OPENROWSET() C) INTO OUTFILE() D) CONVERT() 36 / 125 36. In which of the following techniques does an attacker use logical requests such as AND/OR to bypass a firewall? A) HPF technique B) Normalization method C) CRLF technique D) Blind SQL injection 37 / 125 37. Which of the following attacks allows an attacker to inject malicious content, modify the user´s online experience, and obtain unauthorized information? A) Session prediction B) Session poisoning C) Session brute-forcing D) Cross-site request forgery 38 / 125 38. Which of the following practices helps security professionals prevent SQL injection attacks and safeguard organizational data? A) Use dynamic SQL or construct queries with user input B) Enable unused functionalities of the database C) Avoid using prepared statements, parameterized queries, or stored procedures to access the database D) Audit databases, logs, privileges, and binding terms regularly 39 / 125 39. If your web application sets any cookie with a secure attribute, what does this mean? A) The client will send the cookie only over an HTTPS connection B) The cookie will not be sent cross-domain C) Cookies will be sent cross-domain D) The cookie cannot be accessed by JavaScript 40 / 125 40. Which of the following attacks occurs when attackers obtain a clone of a cookie from the user’s browser and use it to establish a session with the target web server and further allow attackers to access a user’s web services without providing any identity? A) Pass-the-cookie attack B) DNS rebinding attack C) Connection string parameter pollution D) SSRF attack 41 / 125 41. While testing web applications, you attempt to insert the following test script into the search area on the company’s website:<script>alert(“Testing Testing Testing”)</script>Afterwards, when you press the search button, a pop up box appears on your screen with the text, “Testing Testing Testing.” What vulnerability is detected in the web application here? A) A hybrid attack B) Password attacks C) Cross-site scripting D) A buffer overflow 42 / 125 42. Which of the following is an application security threat that occurs when an application includes untrusted data in a new web page without proper validation or escaping or when an application updates an existing web page with user-supplied data? A) Security misconfiguration B) Components with known vulnerabilities C) XML external entity (XXE) D) Cross-site scripting (XSS) 43 / 125 43. Which of the following provides an interface between end users and webservers? A) Database B) Demilitarized zone C) Firewall D) Web applications 44 / 125 44. In which layer of the web application vulnerability stack does an attacker exploit business-logic flaws and technical vulnerabilities to perform input validation attacks such as XSS? A) Layer 4 B) Layer 7 C) Layer 3 D) Layer 1 45 / 125 45. Andrew, a software developer in CyberTech organization has released a security update that acts as defensive technique against the vulnerabilities in the software product the company has released earlier. Identify the technique used by Andrew to resolve the software vulnerabilities? A) Patch Management B) Risk Management C) Vulnerability Management D) Product Management 46 / 125 46. Which of the following is a web crawler optimized for searching and analyzing directories, and it can find interesting results if the server has the “index of” mode enabled? A) Shadowsocks B) Ettercap C) Hashcat D) Dirhunt 47 / 125 47. Which of the following command does an attacker use to enumerate common web applications? A) nmap -p80 –script http-trace B) nmap –script http-trace -p80 localhost C) nmap -p80 –script http-userdir -enum localhost D) nmap –script http-enum -p80 48 / 125 48. Which of the following is a web security testing tool that can be used by an attacker to predict and use the next possible session ID token to take over a valid session? A) Netcraft B) NCollector Studio C) Burp Suite D) Nikto2 49 / 125 49. Which of the following countermeasures should be followed to defend against DNS hijacking? A) Include DNS hijacking into incident response and business continuity planning B) Do not safeguard the registrant account information C) Download audio and video codecs and other downloaders from untrusted websites D) Use the default router password included in the factory settings 50 / 125 50. Which of the following stores a server’s configuration, error, executable, and log files? A) Web proxy B) Server root C) Virtual document tree D) Document root 51 / 125 51. The security analyst for Danels Company arrives this morning to his office and verifies the primary home page of the company. He notes that the page has the logo of the competition and writings that do not correspond to the true page. What kind of attack do the observed signals correspond to? A) DDoS B) Phishing C) Defacement D) HTTP attack 52 / 125 52. In which of the following attack types does an attacker exploit the trust of an authenticated user to pass malicious code or commands to a web server? A) Cross-site scripting B) SQL injection attack C) Cross-site request forgery D) Unvalidated input and file injection 53 / 125 53. One of the following techniques redirects all malicious network traffic to a honeypot after any intrusion attempt is detected. Attackers can identify such honeypots by examining specific TCP/IP parameters such as the round-trip time (RTT), time to live (TTL), and TCP timestamp. Which is this technique? A) Fake AP B) Snort_inline C) User-Mode Linux (UML) D) Bait and switch 54 / 125 54. Which of the following techniques manipulates the TCP/IP stack and is effectively employed to slow down the spread of worms and backdoors? A) Layer 4 tar pits B) Honeyd honeypot C) Layer 2 tar pits D) Layer 7 tar pits 55 / 125 55. An attacker hides the shellcode by encrypting it with an unknown encryption algorithm and by including the decryption code as part of the attack packet. He encodes the payload and then places a decoder before the payload. Identify the type of attack executed by attacker. A) ASCII shellcode B) Polymorphic shellcode C) Postconnection SYN D) Preconnection SYN 56 / 125 56. One of the following is an IDS evasion technique used by an attacker to send a huge amount of unnecessary traffic to produce noise or fake traffic. If the IDS does not analyze the noise traffic, the true attack traffic goes undetected. Which is this IDS evasion technique? A) Encryption B) Denial-of-service attack C) Flooding D) Overlapping fragments 57 / 125 57. Which of the following is a malware research tool that allows security analysts to detect and classify malware or other malicious codes through a rule-based approach? A) Fing B) YARA C) Nmap D) Hping3 58 / 125 58. Which of the following techniques creates a safe and encrypted tunnel over a public network to securely send and receive sensitive information and prevents attackers from decrypting the data flow between the endpoints? A) HSTS B) Two-factor authentication C) WEP/WPA encryption D) VPN 59 / 125 59. Which of the following countermeasures should be followed to defend against session hijacking? A) Disable browsers to verify website authenticity using network notary servers B) Use HTTP Public Key Pinning (HPKP) to allow users to authenticate web servers C) Enable compression mechanisms of HTTP requests D) Allow cross-site scripts known as CSRF from the client side 60 / 125 60. In which of the following attacks does an attacker seize control of a valid TCP communication session between two computers and gain access to a machine while a session is in progress? A) Spoofing attack B) Session hijacking C) Brute forcing D) Client-side attack 61 / 125 61. When a client’s computer is infected with malicious software which connects to the remote computer to receive commands, the client’s computer is called a ___________ A) Client B) Botnet C) Bot Answer D) Command and Control(C&C) 62 / 125 62. Which of the following scanning methods makes use of the information obtained from an infected machine to find new vulnerable machines in a target network? A) Random scanning B) Hit-list scanning C) Topological scanning D) Permutation scanning 63 / 125 63. Which of the following practices can make an organization’s network vulnerable to insider threats? A) Build a professional security team that monitors the physical security of the organization B) Install video cameras to monitor all critical assets C) Implement additional monitoring mechanisms for system administrators and privileged users D) Activate credentials of terminated employees 64 / 125 64. Which of the following signs is an indication of identity theft? A) There is more than one tax return filed under your name B) Receiving electricity, gas, water, or other services bills C) Receiving credit card, bank, or utility statements D) Familiar charges to your credit card 65 / 125 65. In which of the following techniques does an attacker use cache poisoning to redirect the connection between an IP address and its target server? A) Pharming B) Skimming C) Wardriving D) Pretexting 66 / 125 66. Given below are the different phases involved in a social engineering attack.Develop a relationshipResearch the target companySelect a targetExploit the relationshipIdentify the correct sequence of steps involved in a social engineering attack. A) 2 → 4 → 3 → 1 B) 2 → 3 → 1 → 4 C) 1 → 2 → 3 → 4 D) 2 → 1 → 3 → 4 67 / 125 67. In which of the following social engineering contexts does an attacker create a feeling of urgency in a decision-making process and controls the victim’s state of mind to obtain information? A) Authority B) Intimidation C) Consensus D) Scarcity 68 / 125 68. A tester is attempting to capture and analyze the traffic on a given network and realizes that the network has several switches. What could be used to successfully sniff the traffic on this switched network? (Choose three.) A) ARP broadcasting B) Address resolution protocol (ARP) spoofing C) MAC duplication D) SYN flooding E) MAC flooding 69 / 125 69. Cyrus, a professional hacker, performed an ARP poisoning attack on a target network by using an automated tool. The tool used by Cyrus sends fake ARP messages to divert all communications between two machines so that all traffic is redirected through his machine.Which of the following tools did Cyrus employ in the above scenario? A) dsniff B) Nexpose C) Nikto D) OpenVAS 70 / 125 70. Which of the following DHCPv6 messages is sent by a client to the server to indicate that the network address is already in use? A) Information request B) Decline C) Release D) Reconfigure 71 / 125 71. Which of the following practices makes organizational systems vulnerable to virus and worm attacks? A) Never use an email filter to scan emails. B) Regularly update antivirus software. C) Install antivirus software that detects and removes infections as they occur. D) Since virus infections can corrupt data, perform regular data backups. 72 / 125 72. Javier works as a security analyst for a small company. He has heard about a new threat; a new malware that the antivirus does not detect yet. Javier has the hash for the new virus. What can Javier do to proactively protect his company? A) Generate his own new version of the antivirus with the malware hash B) Send the hash information to the antivirus company C) Block with the antivirus anything that presents the same hash of the malware D) Wait for the antivirus company to release a new version 73 / 125 73. Which of the following countermeasures helps security professionals in preventing Trojan attacks? A) Download and execute applications from untrusted sources B) Accept programs transferred by instant messaging C) Allow all unnecessary ports at the host and do not use a firewall D) Disable unused functionalities including protocols and services 74 / 125 74. Stephany is worried because in the past six weeks she has received two and three times the amount of e-mails that she usually receives, and most of it is not related to her work. What kind of problem is Stephany facing? A) Malware B) Phishing C) SPAM D) External attack 75 / 125 75. Ransomware encrypts the files and locks systems, thereby leaving the system in an unusable state. The compromised user has to pay ransom to the attacker to unlock the system and get the files decrypted. Petya delivers malicious code can that even destroy the data with no scope of recovery. What is this malicious code called? A) Bot B) Payload C) Vulnerability D) Honeypot 76 / 125 76. In which of the following techniques does an attacker use tactics such as keyword stuffing, inserting doorway pages, page swapping, and adding unrelated keywords to obtain higher rankings for malware pages on a web search? A) Black-hat search engine optimization B) Compromised legitimate websites C) Malvertising D) Social-engineered click-jacking 77 / 125 77. What is the best defense against a privilege escalation vulnerability? A) Never place executables in write-protected directories. B) Review user roles and administrator privileges for maximum utilization of automation services. C) Never perform debugging using bounds checkers and stress tests and increase the amount of code that runs with particular privilege. D) Run services with least privileged accounts and implement multifactor authentication and authorization. 78 / 125 78. Which of the following is a shim that runs in the user mode and is used by attackers to bypass UAC and perform different attacks including the disabling of Windows Defender and backdoor installation? A) RedirectEX B) Schtasks C) launchd D) WinRM 79 / 125 79. Gary, a professional hacker, is attempting to access an organization’s systems remotely. In this process, he used a tool to recover the passwords of the target system and gain unauthorized access to critical files and other system software.Which of the following tools did Gary use to crack the passwords of the target system? A) BeRoot B) Dependency Walker C) Hashcat D) OllyDbg 80 / 125 80. Lee, a professional hacker, decided to launch a few attacks on an organization to test his hacking skills. In this process, he employed a password cracking technique in which he merged the entries of one dictionary with those of another dictionary to produce full names and compound words, consequently cracking a password on the target system.Which of the following password attacks did Lee perform in the above scenario? A) Markov-chain attack B) Combinator attack C) Fingerprint attack D) Toggle-case attack 81 / 125 81. Which of the following countermeasures should be followed to protect systems against password cracking? A) Imposing no restriction on the password change policy B) Using the same password during a password change C) Avoiding the use of passwords that can be found in a dictionary D) Always using system default passwords 82 / 125 82. Which of the following malware masks itself as a benign application or software that initially appears to perform a desirable or benign function but steals information from a system? A) Trojan B) Virus C) Worm D) Keylogger 83 / 125 83. John, an ethical hacker, is performing a vulnerability assessment on an organization’s network. He used tools such as fuzzers to discover and identify previously unknown vulnerabilities in the system and tested whether a product is resistant to a known vulnerability.Which of the following types of vulnerability assessment tools did John employ? A) Depth assessment tools B) Host-based vulnerability assessment tools C) Application-layer vulnerability assessment tools D) Scope assessment tools 84 / 125 84. Which of the following types of vulnerability assessment solutions starts by building an inventory of the protocols, services, and vulnerabilities found on a machine and executes only the relevant tests? A) Tree-based assessment B) Product-based solutions C) Service-based solutions D) Inference-based assessment 85 / 125 85. Which of the following terms is referred to as an undesirable incident that occurs when software or a system program depends on the execution of processes in a sequence and on the timing of the programs? A) Null pointer/object dereference B) Memory leaks C) Race condition D) Integer overflows 86 / 125 86. Sam, a newly joined security auditor, was tasked with deploying updates for all the devices connected to a network. Before deploying the updates, he analyzed the network and found many unknown devices connected to the organization’s LAN. He failed to understand the topology because the newly added assets were not documented properly.Identify the type of vulnerability demonstrated in the above scenario. A) Default installations B) Default passwords C) Misconfigurations D) System sprawl Answer 87 / 125 87. Highlander, Incorporated, is a medical insurance company with several regional company offices in North America. There are various types of employees working in the company, including technical teams, sales teams, and work-from-home employees. Highlander takes care of the security patches and updates of official computers and laptops; however, the computers or laptops of the work-from-home employees are to be managed by the employees or their ISPs. Highlander employs various group policies to restrict the installation of any third-party applications.As per Highlander’s policy, all the employees are able to utilize their personal smartphones to access the company email in order to respond to requests for updates. Employees are responsible for keeping their phones up to date with the latest patches. The phones are not used to directly connect to any other resources in the Highlander, Incorporated, network. The company is concerned about the potential vulnerabilities that could exist on their devices.What would be the best type of vulnerability assessment for the employees’ smartphones? A) Wireless network assessment B) Host-based assessment C) Passive assessment D) Active assessment 88 / 125 88. Which of the following types of vulnerability assessment sniffs the traffic present on the network to identify the active systems, network services, applications, and vulnerabilities? A) Credentialed assessment B) Active assessment C) Distributed assessment D) Passive assessment 89 / 125 89. What is the correct order for vulnerability management life cycle? A) Verification → risk assessment → monitor → remediation → creating baseline → vulnerability assessment B) Creating baseline → vulnerability assessment → risk assessment → remediation → verification → monitor C) Verification → vulnerability assessment → monitor → remediation → creating baseline → risk assessment D) Monitor → risk assessment → remediation → verification → creating baseline → vulnerability assessment 90 / 125 90. A newly discovered flaw in a software application would be considered as which kind of security vulnerability? A) Time-to-check to a time-to-use flaw B) HTTP header injection vulnerability C) Zero-day vulnerability D) Input validation flaw 91 / 125 91. Which of the following online resources helps an attacker in performing vulnerability research? A) MITRE CVE B) GNUnet C) EZGif D) AOL 92 / 125 92. Which of the following practices helps security experts prevent external LDAP enumeration attempts within a network? A) Never deploy canary accounts, which resemble real accounts. B) Allow users to access certain AD entities by changing the permissions on those objects/attributes. C) Log access to AD services. D) Avoid using NT LAN Manager (NTLM), Kerberos, or any basic authentication mechanism. 93 / 125 93. Which of the following protocols is responsible for synchronizing clocks of networked computers? A) DNS B) LDAP C) SMTP D) NTP 94 / 125 94. Which of the following windows utilities allow an attacker to perform NetBIOS enumeration? A) GetRequest B) SetRequest C) nbtstat D) ntpdate 95 / 125 95. Which of the following tools allows attackers to perform LDAP enumeration on the target network? A) Euromonitor B) AD Explorer C) nbtstat D) DNSRecon 96 / 125 96. Alfred, a professional hacker, was performing SNMP enumeration on a target network. In this process, he executed an nmap command that lists all the running SNMP processes along with the associated ports on the target host.Identify the command executed by Alfred in the above scenario. A) nmap -p 25 –script=smtp-enum-users B) nmap -p 25 -script=smtp-open-relay C) snmpwalk -v2c -c public D) nmap -sU -p 161 –script=snmp-processes 97 / 125 97. Which of the following ports provides a name-resolution service for computers running NetBIOS that is also known as the Windows Internet Name Service (WINS)? A) UDP 161 B) UDP 137 C) TCP 22 D) TCP 135 98 / 125 98. Which of the following scans detects when a port is open after completing the three-way handshake, establishes a full connection, and closes the connection by sending an RST packet? A) ACK flag probe scan B) TCP connect scan C) IDLE/IPID header scan D) Stealth scan 99 / 125 99. Which of the following practices helps security professionals defend a network or service against port scanning attempts? A) Never use port scanning tools against hosts on the network. B) Never configure firewall and intrusion detection system (IDS) rules to block probes. C) Ensure that TCP wrappers limit access to the network based on domain names or IP addresses. D) Never use a custom rule set to lock down the network and block unwanted ports at the firewall. 100 / 125 100. Which of the following is the best practice to follow to secure a system or network against port scanning? A) Do not configure firewall and IDS rules to detect and block probes B) Ensure that firewall and routers do not block source routing techniques C) Ensure that the versions of services running on the ports are non-vulnerable D) Allow unwanted services running on the ports and update the service versions 101 / 125 101. Which of the following IDS/firewall evasion techniques helps an attacker increase their Internet anonymity? A) Proxy chaining B) Source port manipulation C) Source routing D) IP address decoy 102 / 125 102. A penetration tester is conducting a port scan on a specific host. The tester found several open ports that were confusing in concluding the operating system (OS) version installed. Considering the NMAP result below, which of the following is likely to be installed on the target machine by the OS? A) The host is likely a Windows machine. B) The host is likely a Linux machine. C) The host is likely a router. D) The host is likely a printer. 103 / 125 103. In which of the following scanning techniques does an attacker send a spoofed source address to a computer to determine the available services? A) TCP Maimon scan B) Inverse TCP flag scan C) IDLE/IPID header scan D) ACK flag probe scan 104 / 125 104. Which of the following protocols uses the port number 88/TCP and can verify the identity of a user or host connected to a network? A) TFTP B) Finger C) NTP D) Kerberos 105 / 125 105. Which of the following open-source tools would be the best choice to scan a network for potential targets? A) hashcat B) NMAP C) Cain & Abel D) John the Ripper 106 / 125 106. Which of the following hping commands is used by an attacker to collect the initial sequence number? A) hping3 192.168.1.103 -Q -p 139 -s B) hping3 -S 72.14.207.99 -p 80 –tcp-timestamp C) hping3 -2 10.0.0.25 –p 80 D) hping3 –A 10.0.0.25 –p 80 107 / 125 107. Which of the following TCP communication flags confirms the receipt of a transmission and identifies the next expected sequence number? A) FIN flag B) ACK flag C) RST flag D) SYN flag 108 / 125 108. Which of the following practices allows security professionals to defend an organization’s network against footprinting attempts? A) Reveal location or travel plans on social networking sites B) Always enable protocols that are not required C) Disable or delete the accounts of employees who left the organization D) Never use TCP/IP and IPsec filters for defense in depth 109 / 125 109. Which of the following tools consists of a publicly available set of databases that contain personal information of domain owners? A) WHOIS lookup tools B) Web spidering tools C) Traceroute tools D) Metadata extraction tools 110 / 125 110. Which results will be returned with the following Google search query?site:target.com -site:Marketing.target.com accounting A) Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting B) Results for matches on target.com and Marketing.target.com that include the word “accounting” C) Results matching all words in the query D) Results matching “accounting” in domain target.com but not on the site Marketing.target.com 111 / 125 111. Sean works as a professional ethical hacker and penetration tester. He is assigned a project for information gathering on a client’s network. He started penetration testing and was trying to find out the company’s internal URLs, looking for any information about the different departments and business units. Sean was unable find any information.What should Sean do to get the information he needs? A) Sean should use email tracking tools B) Sean should use Sublist3r tool C) Sean should use website mirroring tools D) Sean should use WayBackMachine in Archive.org 112 / 125 112. Which of the following types of DNS records points to a host’s IP address? A) NS B) TXT C) A D) PTR 113 / 125 113. Which of the following activities of a user on social networking sites helps an attacker footprint or collect the identity of the user’s family members, the user’s interests, and related information? A) Maintaining the profile B) Sharing photos and videos C) Creating events D) Playing games and joining groups 114 / 125 114. Which of the following search engine tools helps an attacker use an image as a search query and track the original source and details of images, such as photographs, profile pictures, and memes? A) Sublist3r B) Mention C) Intelius D) TinEye 115 / 125 115. Smith, a professional hacker, has targeted an organization. He employed some footprinting tools to scan through all the domains, subdomains, reachable IP addresses, DNS records, and Whois records to perform further attacks.What is the type of information Smith has extracted through the footprinting attempt? A) Policy information B) Company’s product information C) Physical security information D) Network information 116 / 125 116. What type of information is gathered by an attacker through Whois database analysis and tracerouting? A) DNS records and related information B) Usernames, passwords, and so on C) Publicly available email addresses D) Background of the organization 117 / 125 117. Given below are the four key steps of the risk management phase.1. Risk treatment2. Risk tracking and review3. Risk assessment4. Risk identificationWhat is the correct sequence of steps involved in the risk management phase? A) 1 → 2 → 3 → 4 B) 4 → 3 → 1 → 2 C) 3 → 4 → 2 → 1 D) 2 → 1 → 3 → 4 118 / 125 118. Which of the following phases of incident handling and response helps responders prevent the spread of infection to other organizational assets and avoid additional damage? A) Containment B) Recovery C) Incident recording and assignment D) Incident triage 119 / 125 119. Bob recently joined an organization and completed his training. His work involved dealing with important documents of the organization. On one Sunday, he connected to the corporate network by providing authentication credentials to access a file online from his residence.Which of the following elements of information security was demonstrated in the above scenario? A) Authenticity B) Availability C) Integrity D) Non-repudiation 120 / 125 120. Lisa, a security analyst, was tasked with analyzing and documenting the possibility of cyberattacks against an organization. In this task, she followed the diamond model of intrusion analysis. During the initial analysis, Lisa started determining the strategies, methods, procedures, or tools that an attacker might use against the organization’s network.Which of the following features of the diamond model did Lisa employ in the above scenario? A) Victim B) Infrastructure C) Capability D) Adversary 121 / 125 121. In which of the following phases of the cyber kill chain methodology does an adversary select or create a tailored deliverable malicious payload using anexploit and a backdoor to send it to the victim? A) Reconnaissance B) Weaponization C) Delivery D) Installation 122 / 125 122. James, a professional hacker, is performing an attack on a target organization. He succeeded in gathering information about the target and identified vulnerabilities existing in the target network. He is now in the process of exploiting the vulnerabilities to enter the target’s network and escalate privileges so that he can have complete access to the target system.Which of the following phases of hacking is James currently in? A) Maintaining access B) Scanning C) Reconnaissance D) Gaining access 123 / 125 123. Which of the following information security elements includes a checksum and access control to verify that a given block of data is not changed in transit and ensures that only authorized personnel can update, add, or delete data? A) Confidentiality B) Integrity C) Non-repudiation D) Availability 124 / 125 124. Which of the following close-in attacks is performed by an attacker to gather information by observing the target’s activity at the closest proximity? A) ARP poisoning B) DNS spoofing C) Shoulder surfing D) Denial of service 125 / 125 125. Which of the following techniques does an attacker use to snoop on the communication between users or devices and record private information to launch passive attacks? A) Privilege escalation B) Spoofing C) Eavesdropping D) Session hijacking Your score is LinkedIn Facebook Twitter 0% Restart quiz Exit