Test CEH 3

Descripción

ceh
Cristian Osvaldo Gómez
Test por Cristian Osvaldo Gómez, actualizado hace más de 1 año
Cristian Osvaldo Gómez
Creado por Cristian Osvaldo Gómez hace alrededor de 2 años
721
0

Resumen del Recurso

Pregunta 1

Pregunta
Abel, a security professional, conducts penetration testing in his client organization to check for any security loopholes. He launched an attack on the DHCP servers by broadcasting forged DHCP requests and leased all the DHCP addresses available in the DHCP scope until the server could not issue any more IP addresses. This led to a DoS attack, and as a result, legitimate employees were unable to access the client's network. Which of the following attacks did Abel perform in the above scenario?
Respuesta
  • DHCP starvation
  • VLAN hopping
  • Rogue DHCP server attack
  • STP attack

Pregunta 2

Pregunta
What is the file that determines the basic configuration (Specifically activities, services, broadcast receivers, etc..) in an Android application?
Respuesta
  • resources.asrc
  • classes.dex
  • Androidmanifest.xml
  • APK.info

Pregunta 3

Pregunta
Which of the following protocols can be used to secure an LDAP service against anonymous queries?
Respuesta
  • RADIUS
  • SSO
  • NTLM
  • WPA

Pregunta 4

Pregunta
When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's Computer to update the router configuration. What type of an alert is this?
Respuesta
  • False negative
  • True negative
  • False positive
  • True positive

Pregunta 5

Pregunta
Suppose that you test an application for the SQL injection vulnerability. You know that the backend database is based on Microsoft SQL Server. In the login/password form. you enter the following credentials: Username: attack' or 1-1 -- Password: 123456 Based on the above credentials, which of the following SQL commands are you expecting to be executed by the server, if there is indeed an SQL injection vulnerability?
Respuesta
  • select * from Users where UserName = 'attack’ or 1=1--’ and UserPassword=’123456’
  • select from Users where UserName = 'attack or 1-1 - and UserPassword = '123456
  • select from Users where UserName = 'attack or 1=1 -- and UserPassword = '123456"
  • select from Users where UserName = 'attack" or 1=1 -- and UserPassword = '123456"

Pregunta 6

Pregunta
Jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However, Jane has a long, complex password on her router. What attack has likely occurred?
Respuesta
  • Evil twin
  • Wardriving
  • Piggybacking
  • Wireless sniffing

Pregunta 7

Pregunta
The network users are complaining because their systems are slowing down. Further every time they attempt to go to a website, they receive a series of pop-ups with advertisements. What type of malware have the systems been infected with?
Respuesta
  • Spyware
  • Virus
  • Adware
  • Spyware.

Pregunta 8

Pregunta
Ralph, a professional hacker, targeted Jane, who had recently bought new systems for her company. After a few days, Ralph contacted Jane while masquerading as a legitimate customer support executive, informing that her systems need to be serviced for proper functioning and that customer support will send a computer technician. Jane promptly replied positively. Ralph entered Jane's company using this opportunity and gathered sensitive information by scanning terminals for passwords, searching for important documents in desks, and rummaging bins. What is the type of attack technique Ralph used on Jane?
Respuesta
  • Shoulder surfing
  • Impersonation
  • Eavesdropping
  • Dumpster diving

Pregunta 9

Pregunta
Susan, a software developer, wants her web API to update other applications with the latest information. For this purpose, she uses a user-defined HTTP callback or push APIs that are raised based on trigger events; when invoked, this feature supplies data to other applications so that users can instantly receive real-time information. Which of the following techniques is employed by Susan?
Respuesta
  • Web shells
  • SOAP API
  • Webhooks
  • REST API

Pregunta 10

Pregunta
If you send a TCP ACK segment to a known closed port on a firewall but it does not respond with an RST, what do you know about the firewall you are scanning?
Respuesta
  • This event does notell you anything about the firewall
  • There is no firewall in place
  • It is a non-stateful firewall
  • It is a stateful firewall

Pregunta 11

Pregunta
There are multiple cloud deployment options depending on how isolated a customer's resources are from those of other customers. Shared environments share the costs and allow each customer to enjoy lower operations expenses. One solution is for a customer to join with a group of users or organizations to share a cloud environment. What is this cloud deployment option called?
Respuesta
  • Public
  • Private
  • Hybrid
  • Community

Pregunta 12

Pregunta
In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?
Respuesta
  • IDEA
  • MD5 encryption algorithm
  • Triple Data Encryption Standard
  • AES

Pregunta 13

Pregunta
Larry, a security professional in an organization, has noticed some abnormalities in the user accounts on a web server. To thwart evolving attacks, he decided to harden the security of the web server by adopting a few countermeasures to secure the accounts on the web server. Which of the following countermeasures must Larry implement to secure the user accounts on the web server?
Respuesta
  • Limit the administrator or root-level access to the minimum number of users
  • Enable unused default user accounts created during the installation of an OS
  • Enable all non-interactive accounts that should exist but do not require interactive login
  • Retain all unused modules and application extensions

Pregunta 14

Pregunta
A post-breach forensic investigation revealed that a known vulnerability in Apache Struts was to blame for the Equifax data breach that affected 143 million customers. A fix was available from the software vendor for several months prior to the intrusion. This is likely a failure in which of the following security processes?
Respuesta
  • Security awareness training
  • Vendor risk management
  • Secure development lifecycle
  • Patch management

Pregunta 15

Pregunta
Harry, a professional hacker, targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection. What is the APT lifecycle phase that Harry is currently executing?
Respuesta
  • Preparation
  • Persistence
  • Initial intrusion
  • Cleanup

Pregunta 16

Pregunta
This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve. Which is this wireless security protocol?
Respuesta
  • WPA2-Personal
  • WPA3-Enterprise
  • WPA2-Enterprise
  • WPA3-Personal

Pregunta 17

Pregunta
Which of the following information security controls creates an appealing isolated environment for hackers to prevent them from compromising critical targets while simultaneously gathering information about the hacker?
Respuesta
  • Honeypot
  • Intrusion detection system
  • Botnet
  • Firewall

Pregunta 18

Pregunta
What would be the fastest way to perform content enumeration on a given web server by using the Gobuster tool?
Respuesta
  • Skipping SSL certificate verification
  • Performing content enumeration using the bruteforce mode and random file extensions
  • Performing content enumeration using the bruteforce mode and 10 threads
  • Performing content enumeration using a wordlist

Pregunta 19

Pregunta
Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed. What is the port scanning technique used by Sam to discover open ports?
Respuesta
  • IDLE/IPID header scan
  • TCP Maimon scan
  • ACK flag probe scan
  • Xmas scan

Pregunta 20

Pregunta
There have been concerns in your network that the wireless network component is not sufficiently secure. You perform a vulnerability scan of the wireless network and find that it is using an old encryption protocol that was designed to mimic wired encryption. What encryption protocol is being used?
Respuesta
  • WPA1
  • RADIUS
  • WEP
  • WPA3
Mostrar resumen completo Ocultar resumen completo

Similar

Modulo 1 CEH
Pico Pico menoriko
Revolución Francesa
Diego Santos
La Escala Musical
mariajesus camino
Arquitectura Gótica
maya velasquez
Guerra Civil Española: Fechas Clave
maya velasquez
Poniendo en Práctica el Aula Invertida (The Flipped Classroom)
Diego Santos
Poniendo en Práctica el Aprendizaje Basado en Problemas
Diego Santos
Mis MAPAS MENTALES...
Ulises Yo