Ceh Dumb 1
Ceh Dumb 1
Module 1 – Module 5
1. At what stage of the cyber kill chain theory model does data
exfiltration occur?
A. Weaponization
B. Actions on objectives
C. Command and control
D. Installation
2. Which among the following is the best example of the third step
(delivery) in the cyber kill chain?
A. An intruder creates malware to be used as a malicious
attachment to an email.
B. An intruder's malware is triggered when a target opens a
malicious email attachment.
C. An intruder's malware is installed on a targets machine.
D. An intruder sends a malicious attachment via email to a
target.
10. To hide the file on a Linux system, you have to start the filename
with a specific character. What is the character?
A. Tilde (~)
B. Underscore (_)
C. Period (.)
D. Exclamation mark (!)
14. What term describes the amount of risk that remains after the
vulnerabilities are classified and the countermeasures have been
deployed?
A. Residual risk
B. Impact risk
C. Deferred risk
D. Inherent risk
15. Which regulation defines security and privacy controls for Federal
information systems and organizations?
A. HIPAA
B. EU Safe Harbor
C. PCI-DSS
D. NIST-800-53
16. Which type of security feature stops vehicles from crashing through
the doors of a building?
A. Bollards
B. Receptionist
C. Mantrap
D. Turnstile
23. Which results will be returned with the following Google search
query? site:target.com `” site:Marketing.target.com accounting
A. Results from matches on the site marketing.target.com that are
in the domain target.com but do not include the word accounting
B. Results matching all words in the query.
C. Results for matches on target.com and Marketing.target.com that
include the word ג€accountingג€
D. Results matching ג€accountingג€ in domain target.com
but not on the site Marketing.target.com
24. Which of the following Linux commands will resolve a domain name
into IP address?
A. >host-t a hackeddomain.com
B. >host-t ns hackeddomain.com
C. >host -t soa hackeddomain.com
D. >host -t AXFR hackeddomain.com
TTL: 64 –
A. Windows OS
B. Mac OS
C. Linux OS
D. Solaris OS
42. John the Ripper is a technical assessment tool used to test the
weakness of which of the following?
A. Passwords
B. File permissions
C. Firewall rulesets
D. Usernames
45. After an audit, the auditors inform you that there is a critical finding
that you must tackle immediately. You read the audit report, and the
problemis the service running on port 389. Which service is this and
how can you tackle the problem?
A. The service is NTP, and you have to change it from UDP to TCP in
order to encrypt it.
B. The service is LDAP, and you must change it to 636, which
is LDAPS.
C. The findings do not require immediate actions and are only
suggestions.
D. The service is SMTP, and you must change it to SMIME, which is
an encrypted way to send emails.
47. What is the least important information when you analyze a public
IP address in a security alert?
A. DNS
B. Whois
C. Geolocation
D. ARP
A. -sV
B. -sS
C. -Pn
D. -V
53. To create a botnet, the attacker can use several techniques to scan
vulnerable machines. The attacker first collects information about a
large number of vulnerable machines to create a list. Subsequently,
they infect the machines. The list is divided by assigning half of the
list to the newlycompromised machines. The scanning process runs
simultaneously. This technique ensures the spreading and
installation of malicious code in little time. Which technique is
discussed here?
A. Subnet scanning technique
B. Permutation scanning technique
C. Hit-list scanning technique.
D. Topological scanning technique
54. An attacker scans a host with the below command. Which three
flags are set?
A. This is SYN scan. SYN flag is set.
B. This is Xmas scan. URG, PUSH and FIN are set.
C. This is ACK scan. ACK flag is set.
D. This is Xmas scan. SYN and ACK flags are set.
60. When you are getting information about a web server, it is very
important to know the HTTP Methods (GET, POST, HEAD, PUT,
DELETE, TRACE) thatare available because there are two critical
methods (PUT and DELETE). PUT can upload a file to the server and
DELETE can delete a file from the server. You can detect all these
methods (GET, POST, HEAD, PUT, DELETE, TRACE) using NMAP script
engine. What Nmap script will help you with this task?
A. http-methods
B. http enum
C. http-headers
D. http-git
61. You are a penetration tester and are about to perform a scan on a
specific server. The agreement that you signed with the client
contains the following specific condition for the scan: `The attacker
must scan every port on the server several times using a set of
spoofed source IP addresses.` Suppose that you are using Nmap to
perform this scan. What flag will you use to satisfy this requirement?
A. The -g flag
B. The -A flag
C. The -f fag
D. The -D flag
62. What would you enter if you wanted to perform a stealth scan
using Nmap?
A. nmap -sM
B. nmap -sU
C. nmap -sS
D. nmap -sT
64. If you send a TCP ACK segment to a known closed port on a firewall
but it does not respond with an RST, what do you know about the
firewall you are scanning?
A. It is a non-stateful firewall.
B. There is no firewall in place.
C. It is a stateful firewall.
D. This event does not tell you anything about the firewall.
67. If you want to only scan fewer ports than the default scan using
Nmap tool, which option would you use?
A. -r
B. -F
C. -P
D. -sP
71. By using a smart card and pin, you are using a two-factor
authentication that satisfies
A. Something you are and something you remember
B. Something you have and something you know
C. Something you know and something you are
D. Something you have and something you are
A. Banner grabbing
B. SQL injection
C. Whois database query
D. Cross-site scripting
74. Judy created a forum. One day, she discovers that a user is posting
strange images without writing comments. She immediately calls a
security expert, who discovers that the following code is hidden
behind those images:
What issue occurred for the users who clicked on the image?
A. This php file silently executes the code and grabs the
user's session cookie and session ID.
B. The code redirects the user to another site.
C. The code injects a new cookie to the browser.
D. The code is a virus that is attempting to gather the user's
username and password.
76. Firewalk has just completed the second phase (the scanning phase)
and a technician receives the output shown below. What conclusions
can be drawn based on these scan results?
TCP port 21 no response –
TCP port 22 no response –
TCP port 23 Time-to-live exceeded
A. The lack of response from ports 21 and 22 indicate that those
services are not running on the destination server
B. The scan on port 23 was able to make a connection to the
destination host prompting the firewall to respond with a TTL
error
C. The scan on port 23 passed through the filtering device.
This indicates that port 23 was not blocked at the firewall
D. The firewall itself is blocking ports 21 through 23 and a service is
listening on port 23 of the target host
78. Which of the following scanning method splits the TCP header into
several packets and makes it difficult for packet filters to detect the
purpose of the packet?
A. ACK flag probe scanning
B. ICMP Echo scanning
C. SYN/FIN scanning using IP fragments
D. IPID scanning
87. You are logged in as a local admin on a Windows 7 system, and you
need to launch the Computer Management Console from the
command line. Which command would you use?
A. c:\compmgmt.msc
B. c:\ncpa.cpl
C. c:\gpedit
D. c:\services.msc
94. Identify the UDP port that Network Time Protocol (NTP) uses as its
primary means of communication?
A. 113
B. 69
C. 123
D. 161
96. In an internal security audit, the white hat hacker gains control
over a user account and attempts to acquire access to another
account’s confidential files and information. How can he achieve
this?
A. Privilege Escalation
B. Shoulder-Surfing
C. Hacking Active Directory
D. Port Scanning
114. The Heartbleed bug was discovered in 2014 and is widely referred
to under MITRE’s Common Vulnerabilities and Exposures (CVE) as
CVE-2014-0160. This bug affects the OpenSSL implementation of
the Transport Layer Security (TLS) protocols defined in RFC6520.
What type of key does this bug leave exposed to the Internet
making exploitation of any compromised system very easy?
A. Public
B. Private
C. Shared
D. Root
119. You are the Network Admin, and you get a complaint that some of
the websites are no longer accessible. You try to ping the servers
and find themto be reachable. Then you type the IP address and
then you try on the browser, and find it to be accessible. But they
are not accessible when you try using the URL. What may be the
problem?
A. Traffic is Blocked on UDP Port 53
B. Traffic is Blocked on TCP Port 80
C. Traffic is Blocked on TCP Port 54
D. Traffic is Blocked on UDP Port 80
121. While using your bank’s online servicing you notice the following
string in the URL bar: `http://www.MyPersonalBank.com/account?
id=368940911028389&Damount=10980&Camount=21` You
observe that if you modify the Damount & Camount values and
submit the request, that data on the web page reflect the changes.
Which type of vulnerability is present on this site?
A. Cookie Tampering
B. SQL Injection
C. Web Parameter Tampering
D. XSS Reflection
Credentialed assessment
Internal assessment
External assessment
Passive assessment
1) Remediation
2) Identify assets and create a baseline
3) Verification
4) Monitor
5) Vulnerability scan
6) Risk assessment