Test CEH 3

Descrição

ceh
Cristian Osvaldo Gómez
Quiz por Cristian Osvaldo Gómez, atualizado more than 1 year ago
Cristian Osvaldo Gómez
Criado por Cristian Osvaldo Gómez aproximadamente 2 anos atrás
721
0

Resumo de Recurso

Questão 1

Questão
Abel, a security professional, conducts penetration testing in his client organization to check for any security loopholes. He launched an attack on the DHCP servers by broadcasting forged DHCP requests and leased all the DHCP addresses available in the DHCP scope until the server could not issue any more IP addresses. This led to a DoS attack, and as a result, legitimate employees were unable to access the client's network. Which of the following attacks did Abel perform in the above scenario?
Responda
  • DHCP starvation
  • VLAN hopping
  • Rogue DHCP server attack
  • STP attack

Questão 2

Questão
What is the file that determines the basic configuration (Specifically activities, services, broadcast receivers, etc..) in an Android application?
Responda
  • resources.asrc
  • classes.dex
  • Androidmanifest.xml
  • APK.info

Questão 3

Questão
Which of the following protocols can be used to secure an LDAP service against anonymous queries?
Responda
  • RADIUS
  • SSO
  • NTLM
  • WPA

Questão 4

Questão
When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's Computer to update the router configuration. What type of an alert is this?
Responda
  • False negative
  • True negative
  • False positive
  • True positive

Questão 5

Questão
Suppose that you test an application for the SQL injection vulnerability. You know that the backend database is based on Microsoft SQL Server. In the login/password form. you enter the following credentials: Username: attack' or 1-1 -- Password: 123456 Based on the above credentials, which of the following SQL commands are you expecting to be executed by the server, if there is indeed an SQL injection vulnerability?
Responda
  • select * from Users where UserName = 'attack’ or 1=1--’ and UserPassword=’123456’
  • select from Users where UserName = 'attack or 1-1 - and UserPassword = '123456
  • select from Users where UserName = 'attack or 1=1 -- and UserPassword = '123456"
  • select from Users where UserName = 'attack" or 1=1 -- and UserPassword = '123456"

Questão 6

Questão
Jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However, Jane has a long, complex password on her router. What attack has likely occurred?
Responda
  • Evil twin
  • Wardriving
  • Piggybacking
  • Wireless sniffing

Questão 7

Questão
The network users are complaining because their systems are slowing down. Further every time they attempt to go to a website, they receive a series of pop-ups with advertisements. What type of malware have the systems been infected with?
Responda
  • Spyware
  • Virus
  • Adware
  • Spyware.

Questão 8

Questão
Ralph, a professional hacker, targeted Jane, who had recently bought new systems for her company. After a few days, Ralph contacted Jane while masquerading as a legitimate customer support executive, informing that her systems need to be serviced for proper functioning and that customer support will send a computer technician. Jane promptly replied positively. Ralph entered Jane's company using this opportunity and gathered sensitive information by scanning terminals for passwords, searching for important documents in desks, and rummaging bins. What is the type of attack technique Ralph used on Jane?
Responda
  • Shoulder surfing
  • Impersonation
  • Eavesdropping
  • Dumpster diving

Questão 9

Questão
Susan, a software developer, wants her web API to update other applications with the latest information. For this purpose, she uses a user-defined HTTP callback or push APIs that are raised based on trigger events; when invoked, this feature supplies data to other applications so that users can instantly receive real-time information. Which of the following techniques is employed by Susan?
Responda
  • Web shells
  • SOAP API
  • Webhooks
  • REST API

Questão 10

Questão
If you send a TCP ACK segment to a known closed port on a firewall but it does not respond with an RST, what do you know about the firewall you are scanning?
Responda
  • This event does notell you anything about the firewall
  • There is no firewall in place
  • It is a non-stateful firewall
  • It is a stateful firewall

Questão 11

Questão
There are multiple cloud deployment options depending on how isolated a customer's resources are from those of other customers. Shared environments share the costs and allow each customer to enjoy lower operations expenses. One solution is for a customer to join with a group of users or organizations to share a cloud environment. What is this cloud deployment option called?
Responda
  • Public
  • Private
  • Hybrid
  • Community

Questão 12

Questão
In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?
Responda
  • IDEA
  • MD5 encryption algorithm
  • Triple Data Encryption Standard
  • AES

Questão 13

Questão
Larry, a security professional in an organization, has noticed some abnormalities in the user accounts on a web server. To thwart evolving attacks, he decided to harden the security of the web server by adopting a few countermeasures to secure the accounts on the web server. Which of the following countermeasures must Larry implement to secure the user accounts on the web server?
Responda
  • Limit the administrator or root-level access to the minimum number of users
  • Enable unused default user accounts created during the installation of an OS
  • Enable all non-interactive accounts that should exist but do not require interactive login
  • Retain all unused modules and application extensions

Questão 14

Questão
A post-breach forensic investigation revealed that a known vulnerability in Apache Struts was to blame for the Equifax data breach that affected 143 million customers. A fix was available from the software vendor for several months prior to the intrusion. This is likely a failure in which of the following security processes?
Responda
  • Security awareness training
  • Vendor risk management
  • Secure development lifecycle
  • Patch management

Questão 15

Questão
Harry, a professional hacker, targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection. What is the APT lifecycle phase that Harry is currently executing?
Responda
  • Preparation
  • Persistence
  • Initial intrusion
  • Cleanup

Questão 16

Questão
This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve. Which is this wireless security protocol?
Responda
  • WPA2-Personal
  • WPA3-Enterprise
  • WPA2-Enterprise
  • WPA3-Personal

Questão 17

Questão
Which of the following information security controls creates an appealing isolated environment for hackers to prevent them from compromising critical targets while simultaneously gathering information about the hacker?
Responda
  • Honeypot
  • Intrusion detection system
  • Botnet
  • Firewall

Questão 18

Questão
What would be the fastest way to perform content enumeration on a given web server by using the Gobuster tool?
Responda
  • Skipping SSL certificate verification
  • Performing content enumeration using the bruteforce mode and random file extensions
  • Performing content enumeration using the bruteforce mode and 10 threads
  • Performing content enumeration using a wordlist

Questão 19

Questão
Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed. What is the port scanning technique used by Sam to discover open ports?
Responda
  • IDLE/IPID header scan
  • TCP Maimon scan
  • ACK flag probe scan
  • Xmas scan

Questão 20

Questão
There have been concerns in your network that the wireless network component is not sufficiently secure. You perform a vulnerability scan of the wireless network and find that it is using an old encryption protocol that was designed to mimic wired encryption. What encryption protocol is being used?
Responda
  • WPA1
  • RADIUS
  • WEP
  • WPA3

Semelhante

Modulo 1 CEH
Pico Pico menoriko
Revisão Para o ENEM em 20 dias
Alessandra S.
Guia de Estudos para OAB 1a Fase
Maria José
Simulado de Matemática
Alessandra S.
First Certificate - Use of English Parte 3
GoConqr suporte .
ORTOGRAFIA - emprego das letras
GoConqr suporte .
Função do 2º grau
GoConqr suporte .
Quiz - Advérbios
Rodrigo de Freit9506