Cybersecurity Training

Certified Ethical Hacker (CEH) Exam Practice

Showing 1-190 of 190 questions
Question 1

Jason, a certified ethical hacker, is hired by a major e-commerce company to evaluate their network's security. As part of his reconnaissance, Jason is trying to gain as much information as possible about the company's public-facing servers without arousing suspicion. His goal is to find potential points of entry and map out the network infrastructure for further examination. Which technique should Jason employ to gather this information without alerting the company's intrusion detection systems (IDS)?

A.
Jason should use a DNS zone transfer to gather information about the company's servers.
B.
Jason should use passive reconnaissance techniques such as WHOIS lookups, NS lookups, and web research.
Correct Answer
C.
Jason should directly connect to each server and attempt to exploit known vulnerabilities.
D.
Jason should perform a ping sweep to identify all the live hosts in the company's IP range.
Question 2

James is working as an ethical hacker at Technix Solutions. The management ordered James to discover how vulnerable its network is towards footprinting attacks. James took the help of an open-source framework for performing automated reconnaissance activities. This framework helped James in gathering information using free tools and resources. What is the framework used by James to conduct footprinting and reconnaissance activities?

A.
OSINT framework
Correct Answer
B.
WebSploit Framework
C.
SpeedPhish Framework
D.
Browser Exploitation Framework
Question 3

Leverox Solutions hired Arnold, a security professional, for the threat intelligence process. Arnold collected information about specific threats against the organization. From this information, he retrieved contextual information about security events and incidents that helped him disclose potential risks and gain insight into attacker methodologies. He collected the information from sources such as humans, social media, and chat rooms as well as from events that resulted in cyberattacks. In this process, he also prepared a report that includes identified malicious activities, recommended courses of action, and warnings for emerging attacks. What is the type of threat intelligence collected by Arnold in the above scenario?

A.
Strategic threat intelligence
B.
Tactical threat intelligence
C.
Operational threat intelligence
Correct Answer
D.
Technical threat intelligence
Question 4

What is the common name for a vulnerability disclosure program opened by companies in platforms such as HackerOne

A.
Vulnerability hunting program
B.
Bug bounty program
Correct Answer
C.
White-hat hacking program
D.
Ethical hacking program
Question 5

During an ethical hacking engagement, you have been assigned to evaluate the security of a large organization's network. While examining the network traffic, you notice numerous incoming requests on various ports from different locations that show a pattern of an orchestrated attack. Based on your analysis, you deduce that the requests are likely to be automated scripts being run by unskilled hackers. What type of hacker classification does this scenario most likely represent

A.
Black Hats trying to exploit system vulnerabilities for malicious intent.
B.
White Hats conducting penetration testing to identify security weaknesses.
C.
Gray Hats testing system vulnerabilities to help vendors improve security.
D.
Script Kiddies trying to compromise the system using pre-made scripts.
Correct Answer
Question 6

Which among the following is the best example of the third step (delivery) in the cyber kill chain?

A.
An intruder creates malware to be used as a malicious attachment to an email.
B.
An intruder's malware is triggered when a target opens a malicious email attachment.
C.
An intruder's malware is installed on a targets machine.
D.
An intruder sends a malicious attachment via email to a target.
Correct Answer
Question 7

Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the information, he successfully performed an attack on the target government organization without being traced. Which of the following techniques is described in the above scenario?

A.
Website footprinting
B.
VPN footprinting
C.
Dark web footprinting
Correct Answer
D.
VoIP footpriting
Question 8

Clark, a professional hacker, was hired by an organization to gather sensitive information about its competitors surreptitiously. Clark gathers the server IP address of the target organization using Whois footprinting. Further, he entered the server IP address as an input to an online tool to retrieve information such as the network range of the target organization and to identify the network topology and operating system used in the network. What is the online tool employed by Clark in the above scenario?

A.
ARIN
Correct Answer
B.
Baidu
C.
DuckDuckGo
D.
AOL
Question 9

A penetration tester is performing the footprinting process and is reviewing publicly available information about an organization by using the Google search engine. Which of the following advanced operators would allow the pen tester to restrict the search to the organization's web domain?

A.
[location:]
B.
[site:]
Correct Answer
C.
[link:]
D.
[allinurl:]
Question 10

Becky has been hired by a client from Dubai to perform a penetration test against one of their remote offices. Working from her location in Columbus, Ohio, Becky runs her usual reconnaissance scans to obtain basic information about their network. When analyzing the results of her Whois search, Becky notices that the IP was allocated to a location in Le Havre, France. Which regional Internet registry should Becky go to for detailed information?

A.
LACNIC
B.
APNIC
C.
RIPE
Correct Answer
D.
ARIN
Question 11

A certified ethical hacker is conducting a Whois footprinting activity on a specific domain. The individual is leveraging various tools such as Batch IP Converter and Whois Analyzer Pro to retrieve vital details but is unable to gather complete Whois information from the registrar for a particular set of data. As the hacker, what might be the probable data model being utilized by the domain's registrar for storing and looking up Whois information?

A.
Thick Whois model working correctly
B.
Thick Whois model with a malfunctioning server
C.
Thin Whois model working correctly
Correct Answer
D.
Thin Whois model with a malfunctioning server
Question 12

A certified ethical hacker is carrying out an email footprinting exercise on a targeted organization using eMailTrackerPro. They want to map out detailed information about the recipient's activities after receiving the email. Which among the following pieces of information would NOT be directly obtained from eMailTrackerPro during this exercise?

A.
The email accounts related to the domain of the organization
Correct Answer
B.
The time recipient spent reading the email
C.
Geolocation of the recipient
D.
Type of device used to open the email
Question 13

A Certified Ethical Hacker is attempting to gather information about a target organization's network structure through network footprinting. During the operation, they encounter ICMP blocking by the target system's firewall. The hacker wants to ascertain the path that packets take to the host system from a source, using an alternative protocol. Which of the following actions should the hacker consider next?

A.
Use UDP Traceroute in the Linux operating system by executing the 'traceroute' command with the destination IP or domain name.
Correct Answer
B.
Use the ARIN Whois database search tool to find the network range of the target network.
C.
Use the ICMP Traceroute on the Windows operating system as it is the default utility.
D.
Utilize the Path Analyzer Pro to trace the route from the source to the destination target systems.
Question 14

As a Certified Ethical Hacker, you are conducting a footprinting and reconnaissance operation against a target organization. You discover a range of IP addresses associated with the target using the SecurityTrails tool. Now, you need to perform a reverse DNS lookup on these IP addresses to find the associated domain names, as well as determine the nameservers and mail exchange (MX) records. Which of the following DNSRecon commands would be most effective for this purpose?

A.
dnsrecon -r 192.168.1.0/24 -n nsl.example.com -t axfr
B.
dnsrecon -r 162.241.216.0/24 -n nsl.example.com -t std
Correct Answer
C.
dnsrecon -r 10.0.0.0/24 -n nsl.example.com -t zonewalk
D.
dnsrecon -r 162.241.216.0/24 -d example.com -t brt
Question 15

Your company suspects a potential security breach and has hired you as a Certified Ethical Hacker to investigate. You discover evidence of footprinting through search engines and advanced Google hacking techniques. The attacker utilized Google search operators to extract sensitive information. You further notice queries that indicate the use of the Google Hacking Database (CHDB) with an emphasis on VPN footprinting. Which of the following Google advanced search operators would be the LEAST useful in providing the attacker with sensitive VPN-related information?

A.
intitle: This operator restricts results to only the pages containing the specified term in the title
B.
location: This operator finds information for a specific location
C.
inurl: This operator restricts the results to only the pages containing the specified word in the URL
D.
link: This operator searches websites or pages that contain links to the specified website or page
Correct Answer
Question 16

During a reconnaissance mission, an ethical hacker uses Maltego, a popular footprinting tool, to collect information about a target organization. The information includes the target's Internet infrastructure details (domains, DNS names, Netblocks, IP address information). The hacker decides to use social engineering techniques to gain further information. Which of the following would be the least likely method of social engineering to yield beneficial information based on the data collected?

A.
Shoulder surfing to observe sensitive credentials input on the target's computers
B.
Eavesdropping on internal corporate conversations to understand key topics
C.
Impersonating an ISP technical support agent to trick the target into providing further network details
D.
Dumpster diving in the target company's trash bins for valuable printouts
Correct Answer
Question 17

A skilled ethical hacker was assigned to perform a thorough OS discovery on a potential target. They decided to adopt an advanced fingerprinting technique and sent a TCP packet to an open TCP port with specific flags enabled. Upon receiving the reply, they noticed the flags were SYN and ECN-Echo. Which test did the ethical hacker conduct and why was this specific approach adopted?

A.
Test 3: The test was executed to observe the response of the target system when a packet with URC, PSH, SYN, and FIN flags was sent, thereby identifying the OS
B.
Test 1: The test was conducted because SYN and ECN-Echo flags enabled to allow the hacker to probe the nature of the response and subsequently determine the OS fingerprint
Correct Answer
C.
Test 6: The hacker selected this test because a TCP packet with the ACK flag enabled sent to a closed TCP port would yield more information about the OS
D.
Test 2: This test was chosen because a TCP packet with no flags enabled is known as a NULL packet and this would allow the hacker to assess the OS of the target
Question 18

A penetration tester was assigned to scan a large network range to find live hosts. The network is known for using strict TCP filtering rules on its firewall, which may obstruct common host discovery techniques. The tester needs a method that can bypass these firewall restrictions and accurately identify live systems. What host discovery technique should the tester use?

A.
ICMP Timestamp Ping Scan
B.
UDP Ping Scan
Correct Answer
C.
ICMP ECHO Ping Scan
D.
TCP SYN Ping Scan Feedback
Question 19

Harris is attempting to identify the OS running on his target machine. He inspected the initial TTL in the IP header and the related TCP window size and obtained the following results: TTL: 64 – Window Size: 5840

A.
Linux OS
Correct Answer
B.
Windows OS
C.
Mac OS
D.
Solaris OS
Question 20

In a large organization, a network security analyst discovered a series of packet captures that seem unusual. The network operates on a switched Ethernet environment. The security team suspects that an attacker might be using a sniffer tool. Which technique could the attacker be using to successfully carry out this attack, considering the switched nature of the network?

A.
The attacker might be compromising physical security to plug into the network directly.
B.
The attacker is probably using a Trojan horse with in-built sniffing capability.
C.
The attacker might be implementing MAC flooding to overwhelm the switch's memory.
Correct Answer
D.
The attacker might be using passive sniffing, as it provides significant stealth advantages.
Question 21

You are a penetration tester and are about to perform a scan on a specific server. The agreement that you signed with the client contains the following specific condition for the scan: "The attacker must scan every port on the server several times using a set of spoofed source IP addresses." Suppose that you are using Nmap to perform this scan. What flag will you use to satisfy this requirement?

A.
The -D flag
Correct Answer
B.
The -g flag
C.
The -A flag
D.
The -f flag
Question 22

During a red team assessment, a CEH is given a task to perform network scanning on the target network without revealing its IP address. They are also required to find an open port and the services available on the target machine. What scanning technique should they employ, and which command in Zenmap should they use?

A.
Use the IDLE/IPID header scan technique with the command "-sI"
Correct Answer
B.
Use UDP Raw ICMP Port Unreachable Scanning with the command "-sU"
C.
Use the ACK flag probe scanning technique with the command "sA"
D.
Use SCTP INIT Scan with the command "-sY"
Question 23

Techno Security Inc. recently hired John as a penetration tester. He was tasked with identifying open ports in the target network and determining whether the ports are online and any firewall rule sets are encountered. John decided to perform a TCP SYN ping scan on the target network. Which of the following Nmap commands must John use to perform the TCP SYN ping scan?

A.
nmap -sn -PA < target IP address >
B.
nmap -sn -PO < target IP address >
C.
nmap -sn -PS < target IP address >
Correct Answer
D.
nmap -sn -PP < target IP address >
Question 24

Which is the first step followed by Vulnerability Scanners for scanning a network?

A.
Checking if the remote host is alive
Correct Answer
B.
Firewall detection
C.
OS Detection
D.
TCP/UDP Port scanning
Question 25

You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?

A.
nmap -sT -O -T0
Correct Answer
B.
nmap -sP -p-65535 -T5
C.
nmap -A – Pn
D.
nmap -A –host-timeout 99 -T1
Question 26

Consider the Nmap output, What command-line parameter could you use to determine the type and version number of the web server?

A.
-Pn
B.
-V
C.
-sS
D.
-sV
Correct Answer
Question 27

A penetration tester is tasked with gathering information about the subdomains of a target organization's website. The tester needs a versatile and efficient solution for the task. Which of the following options would be the most effective method to accomplish this goal?

A.
Employing a tool like Sublist3r, which is designed to enumerate the subdomains of websites using OSINT
Correct Answer
B.
Utilizing the Harvester tool to extract email addresses related to the target domain using a search engine like Google or Bing
C.
Analyzing LinkedIn profiles to find employees of the target company and their job titles
D.
Using a people search service, such as Spokeo or Intelius, to gather information about the employees of the target organization
Question 28

Consider a scenario where a Certified Ethical Hacker is attempting to infiltrate a company's network without being detected. The hacker intends to use a stealth scan on a BSD-derived TCP/IP stack, but he suspects that the network security devices may be able to detect SYN packets. Based on this information, which of the following methods should he use to bypass the detection mechanisms and why?

A.
Maimon Scan, because it is very similar to NULL, FIN, and Xmas scans, but the probe used here is FIN/ACK
B.
Xmas Scan, because it can pass through filters undetected, depending on the security mechanisms installed
C.
ACK Flag Probe Scan, because it exploits the vulnerabilities within the BSD-derived TCP/IP stack
Correct Answer
D.
TCP Connect/Full-Open Scan, because it completes a three way handshake with the target machine
Question 29

A security analyst uses Zenmap to perform an ICMP timestamp ping scan to acquire information related to the current time from the target host machine. Which of the following Zenmap options must the analyst use to perform the ICMP timestamp ping scan?

A.
-PY
B.
-Pn
C.
-PP
Correct Answer
D.
-PU
Question 30

An ethical hacker is hired to conduct a comprehensive network scan of a large organization that strongly suspects potential intrusions into their internal systems. The hacker decides to employ a combination of scanning tools to obtain a detailed understanding of the network. Which sequence of actions would provide the most comprehensive information about the network's status?

A.
Initiate with Nmap for a ping sweep, then use Metasploit to scan for open ports and services, and finally use Hping3 to perform remote OS fingerprinting.
Correct Answer
B.
Use Hping3 for an ICMP ping scan on the entire subnet, then use Nmap for a SYN scan on identified active hosts, and finally use Metasploit to exploit identified vulnerabilities.
C.
Start with Hping3 for a UDP scan on random ports, then use Nmap for a version detection scan, and finally use Metasploit to exploit detected vulnerabilities.
D.
Begin with NetScanTools Pro for a general network scan, then use Nmap for OS detection and version detection, and finally perform an SYN flooding with Hping3.
Question 31

Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed. What is the port scanning technique used by Sam to discover open ports?

A.
IDLE/IPID header scan
B.
TCP Maimon scan
Correct Answer
C.
ACK flag probe scan
D.
Xmas scan
Question 32

What is the following command used for?

A.
Retrieving SQL statements being executed on the database
B.
Searching database statements at the IP address given
C.
Creating backdoors using SQL injection
D.
Enumerating the databases in the DBMS for the URL
Correct Answer
Question 33

Henry is a penetration tester who works for XYZ organization. While performing enumeration on a client organization, he queries the DNS server for a specific cached DNS record. Further, by using this cached record, he determines the sites recently visited by the organization's user. What is the enumeration technique used by Henry on the organization?

A.
DNS cache poisoning
B.
DNS zone walking
C.
DNSSEC zone walking
D.
DNS cache snooping
Correct Answer
Question 34

In an attempt to damage the reputation of a competitor organization, Hailey, a professional hacker, gathers a list of employee and client email addresses and other related information by using various search engines, social networking sites, and web spidering tools. In this process, she also uses an automated tool to gather a list of words from the target website to further perform a brute-force attack on the previously gathered email addresses.

A.
Orbot
B.
CeWL
Correct Answer
C.
Psiphon
D.
Shadowsocks
Question 35

John, a professional hacker, targeted an organization that uses LDAP for accessing distributed directory services. He used an automated tool to anonymously query the LDAP service for sensitive information such as usernames, addresses, departmental details, and server names to launch further attacks on the target organization. What is the tool employed by John to gather information from the LDAP service?

A.
ike-scan
B.
Zabasearch
C.
JXplorer
Correct Answer
D.
EarthExplorer
Question 36

Calvin, a grey-hat hacker, targets a web application that has design flaws in its authentication mechanism. He enumerates usernames from the login form of the web application, which requests users to feed data and specifies the incorrect field in case of invalid credentials. Later, Calvin uses this information to perform social engineering. Which of the following design flaws in the authentication mechanism is exploited by Calvin?

A.
Verbose failure messages
Correct Answer
B.
Password reset mechanism
C.
User impersonation
D.
Insecure transmission of credentials
Question 37

As a certified ethical hacker, you are tasked with gaining information about an enterprise's internal network. You are permitted to test the network's security using enumeration techniques. You successfully obtain a list of usernames using email IDs and execute a DNS Zone Transfer. Which enumeration technique would be most effective for your next move given that you have identified open TCP ports 25 (SMTP) and 139 (NetBIOS Session Service)?

A.
Perform a brute force attack on Microsoft Active Directory to extract valid usernames
B.
Use SNMP to extract usernames given the community strings
C.
Exploit the NetBIOS Session Service on TCP port 139 to gain unauthorized access to the file system
Correct Answer
D.
Exploit the NFS protocol on TCP port 2049 to gain control over a remote system
Question 38

A Certified Ethical Hacker (CEH) is given the task to perform an LDAP enumeration on a target system. The system is secured and accepts connections only on secure LDAP. The CEH uses Python for the enumeration process. After successfully installing LDAP and establishing a connection with the target, he attempts to fetch details like the domain name and naming context but is unable to receive the expected response. Considering the circumstances, which of the following is the most plausible reason for this situation?

A.
The system failed to establish a connection due to an incorrect port number.
B.
The enumeration process was blocked by the target system's intrusion detection system.
C.
The Python version installed on the CEH's machine is incompatible with the Idap3 library.
D.
The secure LDAP connection was not properly initialized due to a lack of 'use_ssl = True' in the server object creation.
Correct Answer
Question 39

Being a Certified Ethical Hacker (CEH), a company has brought you on board to evaluate the safety measures in place for their network system. The company uses a network time protocol server in the demilitarized zone. During your enumeration, you decide to run a ntptrace command. Given the syntax: ntptrace [-n] [-m maxhosts] [servername/IP_address], which command usage would best serve your objective to find where the NTP server obtains the time from and to trace the list of NTP servers connected to the network?

A.
ntptrace -m 5192.168.1.1
B.
ntptrace -n localhost
C.
ntptrace 192.168.1.1
Correct Answer
D.
ntptrace -n -m 5192.168.1.1
Question 40

A post-breach forensic investigation revealed that a known vulnerability in Apache Struts was to blame for the Equifax data breach that affected 143 million customers. A fix was available from the software vendor for several months prior to the intrusion. This is likely a failure in which of the following security processes?

A.
Vendor risk management
B.
Security awareness training
C.
Patch management
Correct Answer
D.
Secure development lifecycle
Question 41

XYZ company recently discovered a potential vulnerability on their network, originating from misconfigurations. It was found that some of their host servers had enabled debugging functions and unknown users were granted administrative permissions. As a Certified Ethical Hacker, what would be the most potent risk associated with this misconfiguration?

A.
Unauthorized users may perform privilege escalation using unnecessarily created accounts
Correct Answer
B.
An attacker may carry out a Denial-of-Service assault draining the resources of the server in the process
C.
An attacker may be able to inject a malicious DLL into the current running process
D.
Weak encryption might be allowing man-in-the-middle attacks, leading to data tampering
Question 42

During a recent vulnerability assessment of a major corporation's IT systems, the security team identified several potential risks. They want to use a vulnerability scoring system to quantify and prioritize these vulnerabilities. They decide to use the Common Vulnerability Scoring System (CVSS). Given the characteristics of the identified vulnerabilities, which of the following statements is the most accurate regarding the metric types used by CVSS to measure these vulnerabilities?

A.
Base metric represents the inherent qualities of a vulnerability.
Correct Answer
B.
Temporal metric represents the inherent qualities of a vulnerability.
C.
Temporal metric involves measuring vulnerabilities based on a specific environment or implementation.
D.
Environmental metric involves the features that change during the lifetime of the vulnerability.
Question 43

What piece of hardware on a computer's motherboard generates encryption keys and only releases a part of the key so that decrypting a disk on a new piece of hardware is not possible?

A.
TPM
Correct Answer
B.
GPU
C.
CPU
D.
UEFI
Question 44

In your cybersecurity class, you are learning about common security risks associated with web servers. One topic that comes up is the risk posed by using default server settings. Why is using default settings on a web server considered a security risk, and what would be the best initial step to mitigate this risk?

A.
Default settings allow unlimited login attempts; setup account lockout
B.
Default settings reveal server software type; change these settings
Correct Answer
C.
Default settings cause server malfunctions; simplify the settings
D.
Default settings enable auto-updates; disable and manually patch
Question 45

Your company has been receiving regular alerts from its IDS about potential intrusions. On further investigation, you notice that these alerts have been false positives triggered by certain goodware files. In response, you are planning to enhance the IDS with YARA rules, reducing these false positives while improving the detection of real threats. Based on the scenario and the principles of YARA and IDS, which of the following strategies would best serve your purpose?

A.
Writing YARA rules specifically to identify the goodware files triggering false positives
Correct Answer
B.
Implementing YARA rules that focus solely on known malware signatures
C.
Incorporating YARA rules to detect patterns in all files regardless of their nature
D.
Creating YARA rules to examine only the private database for intrusions
Question 46

What information security law or standard aims at protecting stakeholders and the general public from accounting errors and fraudulent activities within organizations?

A.
SOX
Correct Answer
B.
PCI-DSS
C.
FISMA
D.
ISO/IEC 27001:2013
Question 47

Given below are different steps involved in the vulnerability-management life cycle. 1) Remediation 2) Identify assets and create a baseline 3) Verification 4) Monitor 5) Vulnerability scan 6) Risk assessment Identify the correct sequence of steps involved in vulnerability management.

A.
2 → 1 → 5 → 6 → 4 → 3
B.
2 → 4 → 5 → 3 → 6 → 1
C.
1 → 2 → 3 → 4 → 5 → 6
D.
2 → 5 → 6 → 1 → 3 → 4
Correct Answer
Question 48

Morris, an attacker, wanted to check whether the target AP is in a locked state. He attempted using different utilities to identify WPS-enabled APs in the target wireless network. Ultimately, he succeeded with one special command-line utility. Which of the following command-line utilities allowed Morris to discover the WPS-enabled APs?

A.
net view
B.
wash
Correct Answer
C.
ntptrace
D.
macof
Question 49

You are an ethical hacker contracted to conduct a security audit for a company. During the audit, you discover that the company's wireless network is using WEP encryption. You understand the vulnerabilities associated with WEP and plan to recommend a more secure encryption method. Which of the following would you recommend as a suitable replacement to enhance the security of the company's wireless network?

A.
Open System authentication
B.
SSID broadcast disabling
C.
WPA2-PSK with AES encryption
Correct Answer
D.
MAC address filtering
Question 50

Larry, a security professional in an organization, has noticed some abnormalities in the user accounts on a web server. To thwart evolving attacks, he decided to harden the security of the web server by adopting a few countermeasures to secure the accounts on the web server. Which of the following countermeasures must Larry implement to secure the user accounts on the web server?

A.
Limit the administrator or root-level access to the minimum number of users.
Correct Answer
B.
Enable all non-interactive accounts that should exist but do not require interactive login.
C.
Enable unused default user accounts created during the installation of an OS.
D.
Retain all unused modules and application extensions.
Question 51

An IT company has just implemented new security controls to their network and system setup. As a Certified Ethical Hacker, your responsibility is to assess the possible vulnerabilities in the new setup. You are given the information that the network and system are adequately patched with the latest updates, and all employees have gone through recent cybersecurity awareness training. Considering the potential vulnerability sources, what is the best initial approach to vulnerability assessment?

A.
Conducting social engineering tests to check if employees can be tricked into revealing sensitive information
B.
Evaluating the network for inherent technology weaknesses prone to specific types of attacks
C.
Checking for hardware and software misconfigurations to identify any possible loopholes
Correct Answer
D.
Investigating if any ex employees still have access to the company's system and data
Question 52

An organization is performing a vulnerability assessment for mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server, or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests. What is the type of vulnerability assessment solution that James employed in the above scenario?

A.
Product-based solutions
B.
Service-based solutions
C.
Tree-based assessment
D.
Inference-based assessment
Correct Answer
Question 53

An organization suspects a persistent threat from a cybercriminal. They hire an ethical hacker, John, to evaluate their system security. John identifies several vulnerabilities and advises the organization on preventive measures. However, the organization has limited resources and opts to fix only the most severe vulnerability. Subsequently, a data breach occurs exploiting a different vulnerability. Which of the following statements best describes this scenario?

A.
The organization is not at fault because they used their resources as per their understanding.
B.
The organization is at fault because it did not fix all identified vulnerabilities.
C.
John is at fault because he did not emphasize the necessity of patching all vulnerabilities.
D.
Both the organization and John share responsibility because they did not adequately manage the vulnerabilities.
Correct Answer
Question 54

At what stage of the cyber kill chain theory model does data exfiltration occur?

A.
Command and control
B.
Installation
C.
Weaponization
D.
Actions on objectives
Correct Answer
Question 55

Bill has been hired as a penetration tester and cyber security auditor for a major credit card company. Which information security standard is most applicable to his role?

A.
HITECH
B.
PCI-DSS
Correct Answer
C.
Sarbanes-Oxley Act
D.
FISMA
Question 57

John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker installed a scanner on a machine belonging to one of the victims and scanned several machines on the same network to identify vulnerabilities to perform further exploitation. What is the type of vulnerability assessment tool employed by John in the above scenario?

A.
Agent-based scanner
Correct Answer
B.
Proxy scanner
C.
Cluster scanner
D.
Network-based scanner
Question 58

In the process of implementing a network vulnerability assessment strategy for a tech company, the security analyst is confronted with the following scenarios. Which of the following is a limitation of vulnerability scanning software?

A.
Vulnerability scanning software is not immune to software engineering flaws that might lead to serious vulnerabilities being missed
B.
Vulnerability scanning software cannot define the impact of an identified vulnerability on different business operations
Correct Answer
C.
Vulnerability scanning software is limited in its ability to detect vulnerabilities at a given point in time
D.
Vulnerability scanning software is limited in its ability to perform live tests on web applications to detect errors or unexpected behavior
Question 59

Given the complexities of an organization's network infrastructure, a threat actor has exploited an unidentified vulnerability, leading to a major data breach. As a Certified Ethical Hacker (CEH), you are tasked with enhancing the organization's security stance. To ensure a comprehensive security defense, you recommend a certain security strategy. Which of the following best represents the strategy you would likely suggest and why?

A.
Develop an in-depth Risk Management process, involving identification, assessment, treatment, tracking, and review of risks to control the potential effects on the organization.
B.
Establish a Defense-in-Depth strategy, incorporating multiple layers of security measures to increase the complexity and decrease the likelihood of a successful attack.
C.
Adopt a Continual/Adaptive Security Strategy involving ongoing prediction, prevention, detection, and response actions to ensure comprehensive computer network defense.
Correct Answer
D.
Implement an Information Assurance (IA) policy focusing on ensuring the integrity, availability, confidentiality, and authenticity of information systems.
Question 60

A large organization has recently performed a vulnerability assessment using Nessus Professional, and the security team is now preparing the final report. They have identified a high-risk vulnerability, named XYZ, which could potentially allow unauthorized access to the network. In preparing the report, which of the following elements would NOT be typically included in the detailed documentation for this specific vulnerability?

A.
Proof of concept (PoC) of the vulnerability, if possible, to demonstrate its potential impact on the system.
Correct Answer
B.
The list of all affected systems within the organization that are susceptible to the identified vulnerability.
C.
The CVE ID of the vulnerability and its mapping to the vulnerability's name, XYZ.
D.
The total number of high, medium, and low-risk vulnerabilities detected throughout the network.
Question 61

A large e-commerce organization is planning to implement a vulnerability assessment solution to enhance its security posture. They require a solution that imitates the outside view of attackers, performs well-organized inference-based testing, scans automatically against continuously updated databases, and supports multiple networks. Given these requirements, which type of vulnerability assessment solution would be most appropriate?

A.
Product-based solution installed on a private network
B.
Tree-based assessment approach
C.
Inference-based assessment solution
D.
Service-based solution offered by an auditing firm
Correct Answer
Question 62

An attacker decided to crack the passwords used by industrial control systems. In this process, he employed a loop strategy to recover these passwords. He used one character at a time to check whether the first character entered is correct; if so, he continued the loop for consecutive characters. If not, he terminated the loop. Furthermore, the attacker checked how much time the device took to finish one complete password authentication process, through which he deduced how many characters entered are correct. What is the attack technique employed by the attacker to crack the passwords of the industrial control systems?

A.
HMI-based attack
B.
Side-channel attack
Correct Answer
C.
Buffer overflow attack
D.
Denial-of-service attack
Question 63

As a certified ethical hacker, you are performing a system hacking process for a company that is suspicious about its security system. You found that the company's passwords are all known words, but not in the dictionary. You know that one employee always changes the password by just adding some numbers to the old password. Which attack is most likely to succeed in this scenario?

A.
Brute-Force Attack
B.
Hybrid Attack
Correct Answer
C.
Password Spraying Attack
D.
Rule-based Attack
Question 64

Infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?

A.
Maintaining access
B.
Reconnaissance
C.
Scanning
D.
Gaining access
Correct Answer
Question 65

John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization. Which of the following attack techniques is used by John?

A.
Advanced persistent threat
Correct Answer
B.
Insider threat
C.
Spear-phishing sites
D.
Diversion theft
Question 66

An ethical hacker is attempting to crack NTLM hashed passwords from a Windows SAM file using a rainbow table attack. He has dumped the on-disk contents of the SAM file successfully and noticed that all LM hashes are blank. Given this scenario, which of the following would be the most likely reason for the blank LM hashes?

A.
The Windows system is Vista or a later version, where LM hashes are disabled by default.
Correct Answer
B.
The passwords exceeded 14 characters in length and therefore, the LM hashes were set to a 'dummy' value.
C.
The Windows system is using the Kerberos authentication protocol as the default method.
D.
The SAM file has been encrypted using the SYSKEY function.
Question 67

Attacker Simon targeted the communication network of an organization and disabled the security controls of NetNTLMv1 by modifying the values of LMCompatibilityLevel, NTLMMinClientSec, and RestrictSendingNTLMTraffic. He then extracted all the non-network logon tokens from all the active processes to masquerade as a legitimate user to launch further attacks. What is the type of attack performed by Simon?

A.
Dictionary attack
B.
Internal monologue attack
Correct Answer
C.
Rainbow table attack
D.
Combinator attack
Question 68

A network security analyst, while conducting penetration testing, is aiming to identify a service account password using the Kerberos authentication protocol. They have a valid user authentication ticket (TGT) and decided to carry out a Kerberoasting attack. In the scenario described, which of the following steps should the analyst take next?

A.
Carry out a passive wire sniffing operation using Internet packet sniffers
B.
Request a service ticket for the service principal name of the target service account
Correct Answer
C.
Extract plaintext passwords, hashes, PIN codes, and Kerberos tickets using a tool like Mimikatz
D.
Perform a PRobability INfinite Chained Elements (PRINCE) attack
Question 69

A malicious user has acquired a Ticket Granting Service from the domain controller using a valid user's Ticket Granting Ticket in a Kerberoasting attack. He exhorted the TGS tickets from memory for offline cracking. But the attacker was stopped before he could complete his attack. The system administrator needs to investigate and remediate the potential breach. What should be the immediate step the system administrator takes?

A.
Invalidate the TGS the attacker acquired
Correct Answer
B.
Delete the compromised user's account
C.
Change the NTLM password hash used to encrypt the ST
D.
Perform a system reboot to clear the memory
Question 70

A security analyst is preparing to analyze a potentially malicious program believed to have infiltrated an organization's network. To ensure the safety and integrity of the production environment, the analyst decided to use a sheep dip computer for the analysis. Before initiating the analysis, what key step should the analyst take?

A.
Connect the sheep dip computer to the organization's internal network.
B.
Install the potentially malicious program on the sheep dip computer.
C.
Store the potentially malicious program on an external medium, such as a CD-ROM.
Correct Answer
D.
Run the potentially malicious program on the sheep dip computer to determine its behavior.
Question 71

Which IOS jailbreaking technique patches the kernel during the device boot so that it becomes jailbroken after each successive reboot?

A.
Semi-untethered jailbreaking
B.
Semi-tethered jailbreaking
C.
Untethered jailbreaking
Correct Answer
D.
Tethered jailbreaking
Question 72

An IT security team is conducting an internal review of security protocols in their organization to identify potential vulnerabilities. During their investigation, they encounter a suspicious program running on several computers. Further examination reveals that the program has been logging all user keystrokes. How can the security team confirm the type of program and what countermeasures should be taken to ensure the same attack does not occur in the future?

A.
The program is a keylogger; the team should employ intrusion detection systems and regularly update the system software.
Correct Answer
B.
The program is a keylogger; the team should educate employees about phishing attacks and maintain regular backups.
C.
The program is a Trojan; the team should regularly update antivirus software and install a reliable firewall.
D.
The program is spyware; the team should use password managers and encrypt sensitive data.
Question 73

Recently, the employees of a company have been receiving emails that seem to be from their colleagues, but with suspicious attachments. When opened, these attachments appear to install malware on their systems. The IT department suspects that this is a targeted malware attack. Which of the following measures would be the most effective in preventing such attacks?

A.
Applying the latest patches and updating software programs
Correct Answer
B.
Disabling Autorun functionality on all drives
C.
Regularly scan systems for any new files and examine them
D.
Avoiding the use of outdated web browsers and email software
Question 74

Mirai malware targets IoT devices. After infiltration, it uses them to propagate and create botnets that are then used to launch which types of attack?

A.
Birthday attack
B.
MITM attack
C.
Password attack
D.
DDoS attack
Correct Answer
Question 75

Which of the following Metasploit post-exploitation modules can be used to escalate privileges on Windows systems?

A.
getuid
B.
autoroute
C.
keylogrecorder
D.
getsystem
Correct Answer
Question 76

Which type of malware spreads from one system to another or from one network to another and causes similar types of damage as viruses do to the infected system?

A.
Rootkit
B.
Worm
Correct Answer
C.
Adware
D.
Trojan
Question 77

Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfiltrated by an attacker. AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any non-whitelisted programs. What type of malware did the attacker use to bypass the company's application whitelisting?

A.
Logic bomb malware
B.
Zero-day malware
C.
Phishing malware
D.
File-less malware
Correct Answer
Question 78

In the process of setting up a lab for malware analysis, a cybersecurity analyst is tasked to establish a secure environment using a sheep dip computer. The analyst must prepare the testbed while adhering to best practices. Which of the following steps should the analyst avoid when configuring the environment?

A.
Installing malware analysis tools on the guest OS
B.
Installing multiple guest operating systems on the virtual machine(s)
C.
Simulating Internet services using tools such as INetSim
D.
Connecting the system to the production network during the malware analysis
Correct Answer
Question 79

A large corporate network is being subjected to repeated sniffing attacks. To increase security, the company's IT department decides to implement a combination of several security measures. They permanently add the MAC address of the gateway to the ARP cache, switch to using IPv6 instead of IPv4, implement the use of encrypted sessions such as SSH instead of Telnet, and use Secure File Transfer Protocol instead of FTP. However, they are still faced with the threat of sniffing. Considering the countermeasures, what should be their next step to enhance network security?

A.
Use HTTP instead of HTTPS for protecting usernames and passwords
B.
Implement network scanning and monitoring tools
Correct Answer
C.
Enable network identification broadcasts
D.
Retrieve MAC addresses from the OS
Question 80

Martin, a Certified Ethical Hacker (CEH), is conducting a penetration test on a large enterprise network. He suspects that sensitive information might be leaking out of the network. Martin decides to use network sniffing as part of his testing methodology. Which of the following sniffing techniques should Martin employ to get a comprehensive understanding of the data flowing across the network?

A.
DNS Poisoning
B.
ARP Poisoning
C.
Raw Sniffing
Correct Answer
D.
MAC Flooding
Question 81

You are using a public Wi-Fi network inside a coffee shop. Before surfing the web, you use your VPN to prevent intruders from sniffing your traffic. If you did not have a VPN, how would you identify whether someone is performing an ARP spoofing attack on your laptop?

A.
You cannot identify such an attack and must use a VPN to protect your traffic.
B.
You should use netstat to check for any suspicious connections with another IP address within the LAN.
C.
You should check your ARP table and see if there is one IP address with two different MAC addresses.
Correct Answer
D.
You should scan the network using Nmap to check the MAC addresses of all the hosts and look for duplicates.
Question 82

You are a cybersecurity consultant for a major airport that offers free Wi-Fi to travelers. The management is concerned about the possibility of 'Evil Twin' attacks, where a malicious actor sets up a rogue access point that mimics the legitimate one. They are looking for a solution that would not significantly impact the user experience or require travelers to install additional software. What is the most effective security measure you could recommend that fits these constraints, considering the airport's unique operational environment?

A.
Use MAC address filtering on the airport's Wi-Fi network
B.
Display a captive portal page that warns users about the possibility of Evil Twin attacks
Correct Answer
C.
Regularly change the SSID of the airport's Wi-Fi network
D.
Implement WPA3 encryption for the airport's Wi-Fi network
Question 83

Which of the following tactics uses malicious code to redirect users' web traffic?

A.
Spear-phishing
B.
Pharming
Correct Answer
C.
Spimming
D.
Phishing
Question 84

Miley, a professional hacker, decided to attack a target organization's network. To perform the attack, she used a tool to send fake ARP messages over the target network to link her MAC address with the target system's IP address. By performing this, Miley received messages directed to the victim's MAC address and further used the tool to intercept steal, modify, and block sensitive communication to the target system.

A.
Gobbler
B.
DerpNSpoof
C.
BetterCAP
Correct Answer
D.
Wireshark
Question 85

Which type of attack attempts to overflow the content-addressable memory (CAM) table in an Ethernet switch?

A.
MAC flooding
Correct Answer
B.
Evil twin attack
C.
DNS cache flooding
D.
DDoS attack
Question 86

Robin, a professional hacker, targeted an organization's network to sniff all the traffic. During this process, Robin plugged in a rogue switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network. What is the attack performed by Robin in the above scenario?

A.
STP attack
Correct Answer
B.
ARP spoofing attack
C.
VLAN hopping attack
D.
DNS poisoning attack
Question 87

An ethical hacker has been tasked with assessing the security of a major corporation's network. She suspects the network uses default SNMP community strings. To exploit this, she plans to extract valuable network information using SNMP enumeration. Which tool could best help her to get the information without directly modifying any parameters within the SNMP agent's management information base (MIB)?

A.
Nmap, with a script to retrieve all running SNMP processes and associated ports
B.
OpUtils, are mainly designed for device management and not SNMP enumeration
C.
SnmpWalk, with a command to change an OID to a different value
D.
snmp-check (snmp_enum Module) to gather a wide array of information about the target
Correct Answer
Question 88

An attacker can employ many methods to perform social engineering against unsuspecting employees, including scareware. What is the best example of a scareware attack?

A.
A banner appears to a user stating, 'Your Amazon order has been delayed. Click here to find out your new delivery date.'
B.
A pop-up appears to a user stating, 'You have won a free cruise! Click here to claim your prize!'
C.
A pop-up appears to a user stating, 'Your computer may have been infected with spyware. Click here to install an anti-spyware tool to resolve this issue.'
Correct Answer
D.
A banner appears to a user stating, 'Your account has been locked. Click here to reset your password and unlock your account.'
Question 89

A multinational organization has recently faced a severe information security breach. Investigations reveal that the attacker had a high degree of understanding of the organization's internal processes and systems. This knowledge was utilized to bypass security controls and corrupt valuable resources. Considering this event, the security team is contemplating the type of attack that occurred and the steps they could have taken to prevent it. Choose the most plausible type of attack and a countermeasure that the organization could have employed:

A.
Distribution attack and the organization could have ensured software and hardware integrity checks.
B.
Active attack and the organization could have used network traffic analysis.
C.
Passive attack and the organization should have used encryption techniques.
D.
Insider attacks and the organization should have implemented robust access control and monitoring.
Correct Answer
Question 90

Sophia is a shopping enthusiast who spends significant time searching for trendy outfits online. Clark, an attacker, noticed her activities several times and sent a fake email containing a deceptive page link to her social media page displaying all-new and trendy outfits. In excitement, Sophia clicked on the malicious link and logged in to that page using her valid credentials. Which of the following tools is employed by Clark to create the spoofed email?

A.
Slowloris
B.
PyLoris
C.
PLCinject
D.
Evilginx
Correct Answer
Question 91

An experienced cyber attacker has created a fake LinkedIn profile, successfully impersonating a high ranking official from a well-established company, to execute a social engineering attack. The attacker then connected with other employees within the organization, receiving invitations to exclusive corporate events and gaining access to proprietary project details shared within the network. What advanced social engineering technique has the attacker primarily used to exploit the system and what is the most likely immediate threat to the organization?

A.
Baiting and Involuntary Data Leakage
B.
Whaling and Targeted Attacks
C.
Spear Phishing and Spam
D.
Pretexting and Network Vulnerability
Correct Answer
Question 92

A large corporation is planning to implement preventive measures to counter a broad range of social engineering techniques. The organization has implemented a signature-based IDS, intrusion detection system, to detect known attack payloads and network flow analysis to monitor data entering and leaving the network. The organization is deliberating on the next step. Considering the information provided about various social engineering techniques, what should be the organization's next course of action?

A.
Organize regular employee awareness training regarding social engineering techniques and preventive measures
Correct Answer
B.
Deploy more security personnel to physically monitor key points of access
C.
Set up a honeypot to attract potential attackers into a controlled environment for analysis
D.
Implement endpoint detection and response solution to oversee endpoint activities
Question 93

A large organization is investigating a possible identity theft case where an attacker has created a new identity by combining multiple pieces of information from different victims to open a new bank account. The attacker also managed to receive government benefits using a fraudulent identity. Given the circumstances, which type of identity theft is the organization dealing with?

A.
Child Identity Theft
B.
Social Identity Theft
C.
Synthetic Identity Theft
Correct Answer
D.
Identity Cloning and Concealment
Question 94

A company recently experienced a debilitating social engineering attack that led to substantial identity theft. An inquiry found that the employee inadvertently provided critical information during an innocuous phone conversation. Considering the specific guidelines issued by the company to thwart social engineering attacks, which countermeasure would have been the most successful in averting the incident?

A.
Adopt a robust software policy that restricts the installation of unauthorized applications.
B.
Conduct comprehensive training sessions for employees on various social engineering methodologies and the risks associated with revealing confidential data.
Correct Answer
C.
Reinforce physical security measures to limit access to sensitive zones within the company premises, thereby warding off unauthorized intruders.
D.
Implement a well-documented change management process for modifications related to hardware or software.
Question 95

A large enterprise has been experiencing sporadic system crashes and instability, resulting in limited access to its web services. The security team suspects it could be a result of a Denial of Service (DoS) attack. A significant increase in traffic was noticed in the network logs, with patterns suggesting packet sizes exceeding the prescribed size limit. Which among the following DoS attack techniques best describes this scenario?

A.
Smurf attack
B.
UDP flood attack
C.
Ping of Death attack
Correct Answer
D.
Pulse wave attack
Question 96

In an advanced digital security scenario, a multinational enterprise is being targeted with a complex series of assaults aimed to disrupt operations, manipulate data integrity, and cause serious financial damage. As the Lead Cybersecurity Analyst with CEH and CISSP certifications, your responsibility is to correctly identify the specific type of attack based on the following indicators:

A.
Watering Hole Attack
B.
Privilege Escalation Attack
C.
Rowhammer Attack
D.
Side-Channel Attack
Correct Answer
Question 97

A well-resourced attacker intends to launch a highly disruptive DDoS attack against a major online retailer. The attacker aims to exhaust all the network resources while keeping their identity concealed. Their method should be resistant to simple defensive measures such as IP-based blocking. Based on these objectives, which of the following attack strategies would be most effective?

A.
The attacker should initiate a volumetric flood attack using a single compromised machine to overwhelm the retailer's network bandwidth
B.
The attacker should instigate a protocol-based SYN flood attack, consuming connection state tables on the retailer's servers
C.
The attacker should leverage a botnet to launch a Pulse Wave attack, sending high-volume traffic pulses at regular intervals
Correct Answer
D.
The attacker should execute a simple ICMP flood attack from a single IP, exploiting the retailer's ICMP processing
Question 98

A sophisticated attacker targets your web server with the intent to execute a Denial of Service (DoS) attack. His strategy involves a unique mixture of TCP SYN, UDP, and ICMP floods, using 'r' packets per second. Your server, reinforced with advanced security measures, can handle 'h' packets per second before it starts showing signs of strain. If 'r' surpasses 'h', it overwhelms the server, causing it to become unresponsive. In a peculiar pattern, the attacker selects 'r' as a composite number and 'h' as a prime number, making the attack detection more challenging. Considering 'r=2010' and different values for 'h', which of the following scenarios would potentially cause the server to falter?

A.
h=1987 (prime): The attacker's packet rate exceeds the server's capacity, causing potential unresponsiveness.
Correct Answer
B.
h=2003 (prime): The server can manage more packets than the attacker is sending, hence it stays operational.
C.
h=1993 (prime): Despite being less than 'r', the server's prime number capacity keeps it barely operational, but the risk of falling is imminent.
D.
h=1999 (prime): Despite the attacker's packet flood, the server can handle these requests, remaining responsive.
Question 99

Jake, a network security specialist, is trying to prevent network level session hijacking attacks in his company. While studying different types of such attacks, he learns about a technique where an attacker inserts their machine into the communication between a client and a server, making it seem like the packets are flowing through the original path. This technique is primarily used to reroute the packets. Which of the following types of network level session hijacking attacks is Jake studying?

A.
TCP/IP Hijacking
B.
RST Hijacking
C.
UDP Hijacking
D.
Man-in-the-middle Attack Using Forged ICMP and ARP Spoofing
Correct Answer
Question 100

As the chief security officer at SecureMobile, you are overseeing the development of a mobile banking application. You are aware of the potential risks of man-in-the-middle (MitM) attacks where an attacker might intercept communication between the app and the bank's servers. Recently, you have learned about a technique used by attackers where they use rogue Wi-Fi hotspots to conduct MitM attacks. To prevent this type of attack, you plan to implement a security feature in the mobile app. What should this feature accomplish?

A.
It should prevent the app from communicating over a network if it detects a rogue access point.
B.
It should require users to change their password every 30 days.
C.
It should require two-factor authentication for user logins.
D.
It should prevent the app from connecting to any unencrypted Wi-Fi networks.
Correct Answer
Question 101

Bella, a security professional working at an IT firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames, and passwords are shared in plaintext, paving the way for hackers to perform successful session hijacking. To address this situation, Bella implemented a protocol that sends data using encryption and digital certificates. Which of the following protocols is used by Bella?

A.
HTTPS
B.
FTPS
Correct Answer
C.
IP
D.
FTP
Question 102

A security analyst is investigating a potential network-level session hijacking incident. During the investigation, the analyst finds that the attacker has been using a technique in which they injected an authentic-looking reset packet using a spoofed source IP address and a guessed acknowledgment number. As a result, the victim's connection was reset. Which of the following hijacking techniques has the attacker most likely used?

A.
Blind hijacking
B.
RST hijacking
Correct Answer
C.
TCP/IP hijacking
D.
UDP hijacking
Question 103

In an advanced persistent threat scenario, an adversary follows a detailed set of procedures in the cyber kill chain. During one such instance, the adversary has successfully gained access to a corporate network and now attempts to obfuscate malicious traffic within legitimate network traffic. Which of the following actions would most likely be part of the adversary's current procedures?

A.
Initiating DNS tunneling to communicate with the command-and-control server.
Correct Answer
B.
Employing data staging techniques to collect and aggregate sensitive data.
C.
Conducting internal reconnaissance using PowerShell scripts.
D.
Establishing a command-and-control server to communicate with compromised systems.
Question 104

During a comprehensive security assessment, your cybersecurity team at XYZ Corp stumbles upon signs that point toward a possible Advanced Persistent Threat (APT) infiltration in the network infrastructure. These sophisticated threats often exhibit subtle indicators that distinguish them from other types of cyberattacks. To confirm your suspicion and adequately isolate the potential APT, which of the following actions should you prioritize?

A.
Scrutinize for repeat network login attempts from unrecognized geographical regions
B.
Search for proof of a spear-phishing attempt, such as the presence of malicious emails or risky attachments
C.
Vigilantly monitor for evidence of zero-day exploits that manage to evade your firewall or antivirus software
D.
Investigate for anomalies in file movements or unauthorized data access attempts within your database system
Correct Answer
Question 105

Kate dropped her phone and subsequently encountered an issue with the phone's internal speaker. Thus, she is using the phone's loudspeaker for phone calls and other activities. Bob, an attacker, takes advantage of this vulnerability and secretly exploits the hardware of Kate's phone so that he can monitor the loudspeaker's output from data sources such as voice assistants, multimedia messages, and audio files by using a malicious app to breach speech privacy.

A.
aLTEr attack
B.
SIM card attack
C.
Spearphone attack
Correct Answer
D.
Man-in-the-disk attack
Question 106

Kevin, a professional hacker, wants to penetrate CyberTech Inc's network. He employed a technique, using which he encoded packets with Unicode characters. The company's IDS cannot recognize the packets, but the target web server can decode them. What is the technique used by Kevin to evade the IDS system?

A.
Session splicing
B.
Obfuscating
Correct Answer
C.
Desynchronization
D.
Urgency flag
Question 107

Which of the following protocols can be used to secure an LDAP service against anonymous queries?

A.
NTLM
Correct Answer
B.
WPA
C.
RADIUS
D.
SSO
Question 108

A cyber attacker has initiated a series of activities against a high-profile organization following the Cyber Kill Chain Methodology. The attacker is presently in the 'Delivery' stage. As an Ethical Hacker, you are trying to anticipate the adversary's next move. What is the most probable subsequent action from the attacker based on the Cyber Kill Chain Methodology?

A.
The attacker will exploit the malicious payload delivered to the target organization and establish a foothold.
Correct Answer
B.
The attacker will initiate an active connection to the target system to gather more data.
C.
The attacker will start reconnaissance to gather as much information as possible about the target.
D.
The attacker will attempt to escalate privileges to gain complete control of the compromised system.
Question 109

An organization has been experiencing intrusion attempts despite deploying an Intrusion Detection System (IDS) and Firewalls. As a Certified Ethical Hacker, you are asked to reinforce the intrusion detection process and recommend a better rule-based approach. The IDS uses Snort rules and the new recommended tool should be able to complement it. You suggest using YARA rules with an additional tool for rule generation. Which of the following tools would be the best choice for this purpose and why?

A.
YaraRET – Because it helps in reverse engineering Trojans to generate YARA rules
B.
Koodous – Because it combines social networking with antivirus signatures and YARA rules to detect malware
C.
AutoYara – Because it automates the generation of YARA rules from a set of malicious and benign files
D.
yarGen – Because it generates YARA rules from strings identified in malware files while removing strings that also appear in goodware files
Correct Answer
Question 110

Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the response of a honeypot to a manual SYN request. Which of the following techniques is employed by Dayn to detect honeypots?

A.
Detecting the presence of Snort_inline honeypots
B.
Detecting the presence of Sebek-based honeypots
C.
Detecting honeypots running on VMware
D.
Detecting the presence of Honeyd honeypots
Correct Answer
Question 111

As a part of an ethical hacking exercise, an attacker is probing a target network that is suspected to employ various honeypot systems for security. The attacker needs to detect and bypass these honeypots without alerting the target. The attacker decides to utilize a suite of techniques. Which of the following techniques would NOT assist in detecting a honeypot?

A.
Probing system services and observing the three-way handshake
B.
Implementing a brute force attack to verify system vulnerability
Correct Answer
C.
Analyzing the MAC address to detect instances running on VMware
D.
Using honeypot detection tools like Send-Safe Honeypot Hunter
Question 112

Which Nmap switch helps evade IDS or firewalls?

A.
-n/-R
B.
-oN/-oX/-oG
C.
-D
D.
-T
Correct Answer
Question 113

Taylor, a security professional, uses a tool to monitor her company's website, analyze the website's traffic, and track the geographical location of the users visiting the company's website. Which of the following tools did Taylor employ in the above scenario?

A.
WebSite-Watcher
B.
Webroot
C.
WAFW00F
D.
Web-Stat
Correct Answer
Question 114

You have been hired as an intern at a start-up company. Your first task is to help set up a basic web server for the company's new website. The team leader has asked you to make sure the server is secure from common threats. Based on your knowledge from studying for the CEH exam, which of the following actions should be your priority to secure the web server?

A.
Installing a web application firewall
B.
Limiting the number of concurrent connections to the server
C.
Encrypting the company's website with SSL/TLS
Correct Answer
D.
Regularly updating and patching the server software
Question 116

What are common files on a web server that can be misconfigured and provide useful information for a hacker such as verbose error messages?

A.
administration.config
B.
idq.dll
C.
php.ini
Correct Answer
D.
httpd.conf
Question 117

As part of a college project, you have set up a web server for hosting your team's application. Given your interest in cybersecurity, you have taken the lead in securing the server. You are aware that hackers often attempt to exploit server misconfigurations. Which of the following actions would best protect your web server from potential misconfiguration-based attacks?

A.
Enabling multi-factor authentication for users
B.
Regularly backing up server data
C.
Implementing a firewall to filter traffic
D.
Performing regular server configuration audits
Correct Answer
Question 118

A 'Server-Side Includes' attack refers to the exploitation of a web application by injecting scripts in HTML pages or executing arbitrary code remotely. Which web-page file type, if it exists on the web server, is a strong indication that the server is vulnerable to this kind of attack?

A.
.stm
Correct Answer
B.
.html
C.
.cms
D.
.rss
Question 119

Calvin, a software developer, uses a feature that helps him auto-generate the content of a web page without manual involvement and is integrated with SSI directives. This leads to a vulnerability in the developed web application as this feature accepts remote user inputs and uses them on the page. Hackers can exploit this feature and pass malicious SSI directives as input values to perform malicious activities such as modifying and erasing server files. What is the type of injection attack Calvin's web application is susceptible to?

A.
Server-side template injection
B.
Server-side includes injection
Correct Answer
C.
Server-side JS injection
D.
CRLF injection
Question 120

Scenario: Joe turns on his home computer to access personal online banking. When he enters the URL www.bank.com, the website is displayed, but it prompts him to re-enter his credentials as if he has never visited the site before. When he examines the website URL closer, he finds that the site is not secure and the web address appears different. What type of attack he is experiencing?

A.
DHCP spoofing
B.
DNS hijacking
Correct Answer
C.
DoS attack
D.
ARP cache poisoning
Question 121

During a penetration test, an ethical hacker is exploring the security of a complex web application. The application heavily relies on JavaScript for client-side input sanitization, with an apparent assumption that this alone is adequate to prevent injection attacks. During the investigation, the ethical hacker also notices that the application utilizes cookies to manage user sessions but does not enable the HttpOnly flag. This lack of flag potentially exposes the cookies to client-side scripts. Given these identified vulnerabilities, what would be the most effective strategy for the ethical hacker to exploit this application?

A.
Instigate a Distributed Denial of Service (DDoS) attack to overload the server, capitalizing on potential weak server-side security.
B.
Launch a Cross-Site Scripting (XSS) attack, aiming to bypass the client-side sanitization and exploit the exposure of session cookies.
Correct Answer
C.
Implement an SQL Injection attack to take advantage of potential unvalidated input and gain unauthorized database access.
D.
Employ a brute-force attack to decipher user credentials, considering the lack of server-side validation.
Question 122

Gilbert, a web developer, uses a centralized web API to reduce complexity and increase the integrity of updating and changing data. For this purpose, he uses a web service that uses HTTP methods such as PUT, POST, GET, and DELETE and can improve the overall performance, visibility, scalability, reliability, and portability of an application. What is the type of web service API mentioned in the above scenario?

A.
RESTful API
Correct Answer
B.
REST API
C.
JSON-RPC
D.
SOAP API
Question 123

Joel, a professional hacker, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a malicious script that can redirect users from the web page and download malware onto a victim's machine. Joel waits for the victim to access the infected web application so as to compromise the victim's machine. Which of the following techniques is used by Joel in the above scenario?

A.
MarioNet attack
B.
Clickjacking attack
C.
DNS rebinding attack
D.
Watering hole attack
Correct Answer
Question 124

Judy created a forum. One day, she discovers that a user is posting strange images without writing comments. She immediately calls a security expert, who discovers that the following code is hidden behind those images:

A.
This php file silently executes the code and grabs the user's session cookie and session ID.
Correct Answer
B.
The code injects a new cookie to the browser.
C.
The code is a virus that is attempting to gather the user's username and password.
D.
The code redirects the user to another site.
Question 125

Ron, a security professional, was pen testing web applications and SaaS platforms used by his company. While testing, he found a vulnerability that allows hackers to gain unauthorized access to API objects and perform actions such as view, update, and delete sensitive data of the company. What is the API vulnerability revealed in the above scenario?

A.
Code injections
B.
No ABAC validation
Correct Answer
C.
Business logic flaws
D.
Improper use of CORS
Question 126

Gregory, a professional penetration tester working at Sys Security Ltd., is tasked with performing a security test of web applications used in the company. For this purpose, Gregory uses a tool to test for any security loopholes by hijacking a session between a client and server. This tool has a feature of intercepting proxy that can be used to inspect and modify the traffic between the browser and target application. This tool can also perform customized attacks and can be used to test the randomness of session tokens. Which of the following tools is used by Gregory in the above scenario?

A.
CxSAST
B.
Wireshark
C.
Nmap
D.
Burp Suite
Correct Answer
Question 127

During your summer internship at a tech company, you have been asked to review the security settings of their web server. While inspecting, you notice the server reveals detailed error messages to users, including database query errors and internal server errors. As a cybersecurity beginner, what is your understanding of this setting, and how would you advise the company?

A.
Suppress detailed error messages, as they can expose sensitive information.
Correct Answer
B.
Retain the setting as it aids in troubleshooting user issues.
C.
Implement stronger encryption to secure the error messages.
D.
Increase the frequency of automated server backups.
Question 128

A penetration tester is conducting an assessment of a web application for a financial institution. The application uses form-based authentication and does not implement account lockout policies after multiple failed login attempts. Interestingly, the application displays detailed error messages that disclose whether the username or password entered is incorrect. The tester also notices that the application uses HTTP headers to prevent clickjacking attacks but does not implement Content Security Policy (CSP). With these observations, which of the following attack methods would likely be the most effective for the penetration tester to exploit these vulnerabilities and attempt unauthorized access?

A.
The tester could launch a Cross Site Scripting (XSS) attack to steal authenticated session cookies, potentially bypassing the clickjacking protection.
B.
The tester could exploit a potential SQL Injection vulnerability to manipulate the application's database.
C.
The tester could execute a Brute Force attack, leveraging the lack of account lockout policy and the verbose error messages to guess the correct credentials.
Correct Answer
D.
The tester could execute a Man in-the-Middle (MitM) attack to intercept and modify the HTTP headers for a Clickjacking attack.
Question 129

As part of a penetration testing team, you've discovered a web application vulnerable to Cross-Site Scripting (XSS). The application sanitizes inputs against standard XSS payloads but fails to filter out HTML-encoded characters. On further analysis, you've noticed that the web application uses cookies to track session IDs. You decide to exploit the XSS vulnerability to steal users' session cookies. However, the application implements HTTPOnly cookies, complicating your original plan. Which of the following would be the most viable strategy for a successful attack?

A.
Build an XSS payload using HTML encoding and use it to exploit the server-side code, potentially disabling the HTTPOnly flag on cookies.
B.
Create a sophisticated XSS payload that leverages HTML encoding to bypass the input sanitization, and then use it to redirect users to a malicious site where their cookies can be captured.
Correct Answer
C.
Develop a browser exploit to bypass the HTTPOnly restriction, then use a HTML-encoded XSS payload to retrieve the cookies.
D.
Utilize an HTML-encoded XSS payload to trigger a buffer overflow attack, forcing the server to reveal the HTTPOnly cookies.
Question 130

An ethical hacker is testing a web application of a financial firm. During the test, a 'Contact Us' form's input field is found to lack proper user input validation, indicating a potential Cross-Site Scripting (XSS) vulnerability. However, the application has a stringent Content Security Policy (CSP) disallowing inline scripts and scripts from external domains but permitting scripts from its own domain. What would be the hacker's next step to confirm the XSS vulnerability?

A.
Utilize a script hosted on the application's domain to test the form
Correct Answer
B.
Try to disable the CSP to bypass script restrictions
C.
Load a script from an external domain to test the vulnerability
D.
Inject a benign script inline to the form to see if it executes
Question 131

An ethical hacker is testing the security of a website's database system against SQL Injection attacks. They discover that the IDS has a strong signature detection mechanism to detect typical SQL injection patterns. Which evasion technique can be most effectively used to bypass the IDS signature detection while performing a SQL Injection attack?

A.
Employ IP fragmentation to obscure the attack payload
B.
Leverage string concatenation to break identifiable keywords
C.
Implement case variation by altering the case of SQL statements
D.
Use Hex encoding to represent the SQL query string
Correct Answer
Question 133

Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection. Identify the behavior of the adversary in the above scenario.

A.
Use of DNS tunneling
B.
Unspecified proxy activities
Correct Answer
C.
Data staging
D.
Use of command-line interface
Question 134

As an IT Security Analyst, you've been asked to review the security measures of an e-commerce website that relies on a SQL database for storing sensitive customer data. Recently, an anonymous tip has alerted you to a possible threat: a seasoned hacker who specializes in SQL Injection attacks may be targeting your system. The site already employs input validation measures to prevent basic injection attacks, and it blocks any user inputs containing suspicious patterns. However, this hacker is known to use advanced SQL Injection techniques. Given this situation, which of the following strategies would the hacker most likely adopt to bypass your security measures?

A.
The hacker may try to use SQL commands which are less known and less likely to be blocked by your system's security
B.
The hacker might employ a 'blind' SQL Injection attack, taking advantage of the application's true or false responses to extract data bit by bit
Correct Answer
C.
The hacker could deploy an 'out-of-band' SQL Injection attack, extracting data via a different communication channel, such as DNS or HTTP requests
D.
The hacker may resort to a DDoS attack instead, attempting to crash the server and thus render the e-commerce site unavailable
Question 135

Which of the following web vulnerabilities would an attacker be attempting to exploit if they delivered the following input

A.
IDOR
B.
SQLi
C.
XXE
Correct Answer
D.
XXS
Question 136

While performing a security audit of a web application, an ethical hacker discovers a potential vulnerability. The application responds to logically incorrect queries with detailed error messages that divulge the underlying database's structure. The ethical hacker decides to exploit this vulnerability further. Which type of SQL Injection attack is the ethical hacker likely to use?

A.
Blind/Inferential SQL Injection
B.
UNION SQL Injection
C.
In-band SQL Injection
D.
Error-based SQL Injection
Correct Answer
Question 137

In an intricate web application architecture using an Oracle database, you, as a security analyst, have identified a potential SQL Injection attack surface. The database consists of 'x' tables, each with 'y' columns. Each table contains 'z' records. An attacker, well-versed in SQLi techniques, crafts 'u' SQL payloads, each attempting to extract maximum data from the database. The payloads include 'UNION SELECT' statements and 'DBMS_XSLPROCESSOR.READ2CLOB' to read sensitive files. The attacker aims to maximize the total data extracted 'E=xyz*u'. Assuming 'x=4', 'y=2', and varying 'z' and 'u', which situation is likely to result in the highest extracted data volume?

A.
z=550, u=2: Here, the attacker formulates 2 SQL payloads and directs them towards tables containing 550 records, impacting all columns and tables.
B.
z=500, u=3: The attacker creates 3 SQL payloads and targets tables with 500 records each, exploiting all columns and tables.
C.
z=600, u=2: The attacker devises 2 SQL payloads, each aimed at tables holding 600 records, affecting all columns across all tables.
D.
z=400, u=4: The attacker constructs 4 SQL payloads, each focusing on tables with 400 records, influencing all columns of all tables.
Correct Answer
Question 138

You're the security manager for a tech company that uses a database to store sensitive customer data. You have implemented countermeasures against SQL injection attacks. Recently, you noticed some suspicious activities and suspect an attacker is using SQL injection techniques. The attacker is believed to use different forms of payloads in his SQL queries. In the case of a successful SQL injection attack, which of the following payloads would have the most significant impact?

A.
UNION SELECT NULL, NULL, NULL — : This payload manipulates the UNION SQL operator, enabling the attacker to retrieve data from different database tables
B.
' OR '1'='l: This payload manipulates the WHERE clause of an SQL statement, allowing the attacker to view unauthorized data
C.
' OR username LIKE '%': This payload uses the LIKE operator to search for a specific pattern in a column
D.
' OR 'a'='a; DROP TABLE members; –: This payload combines the manipulation of the WHERE clause with a destructive action, causing data loss
Correct Answer
Question 139

CyberTech Inc. recently experienced SQL injection attacks on its official website. The company appointed Bob, a security professional, to build and incorporate defensive strategies against such attacks. Bob adopted a practice whereby only a list of entities such as the data type, range, size, and value, which have been approved for secured access, is accepted. What is the defensive technique employed by Bob in the above scenario?

A.
Blacklist validation
B.
Enforce least privileges
C.
Output encoding
D.
Whitelist validation
Correct Answer
Question 140

Consider a hypothetical situation where an attacker, known for his proficiency in SQL Injection attacks, is targeting your web server. This adversary meticulously crafts 'q' malicious SQL queries, each inducing a delay of 'd' seconds in the server response. This delay in response is an indicator of a potential attack. If the total delay, represented by the product 'q*d', crosses a defined threshold 'T', an alert is activated in your security system. Furthermore, it is observed that the attacker prefers prime numbers for 'q', and 'd' follows a pattern in the Fibonacci sequence. Now, consider 'd=13' seconds (a Fibonacci number) and various values of 'q' (a prime number) and 'T'. Which among the following scenarios will most likely trigger an alert?

A.
q=11, T=150: Here, the total delay induced by the attacker ('q*d' = 143 seconds) does not surpass the threshold, so the security system remains dormant.
B.
q=13, T=180: In this case, the total delay caused by the attacker ('q*d' = 169 seconds) breaches the threshold, likely leading to the triggering of a security alert.
C.
q=17, T=220: Even though the attacker increases 'q', the total delay ('q*d' = 221 seconds) just surpasses the threshold, possibly activating an alert.
Correct Answer
D.
q=19, T=260: Despite the attacker's increased effort, the total delay ('q*d' = 247 seconds) does not exceed the threshold, thus no alert is triggered.
Question 141

As a cybersecurity professional, you are responsible for securing a high-traffic web application that uses MySQL as its backend database. Recently, there has been a surge of unauthorized login attempts, and you suspect that a seasoned black-hat hacker is behind them. This hacker has shown proficiency in SQL Injection and appears to be using the 'UNION' SQL keyword to trick the login process into returning additional data. However, your application's security measures include filtering special characters in user inputs, a method usually effective against such attacks. In this challenging environment, if the hacker still intends to exploit this SQL Injection vulnerability, which strategy is he most likely to employ?

A.
The hacker tries to manipulate the 'UNION' keyword in such a way that it triggers a database error, potentially revealing valuable information about the database's structure.
B.
The hacker attempts to bypass the special character filter by encoding his malicious input, which could potentially enable him to successfully inject damaging SQL queries.
Correct Answer
C.
The hacker alters his approach and injects a DROP TABLE' statement, a move that could potentially lead to the loss of vital data stored in the application's database.
D.
The hacker switches tactics and resorts to a 'time-based blind' SQL Injection attack, which would force the application to delay its response, thereby revealing information based on the duration of the delay.
Question 142

This type of injection attack does not show any error message. It is difficult to exploit as it returns information when the application is given SQL payloads that elicit a true or false response from the server. By observing the response, an attacker can extract sensitive information. What type of attack is this?

A.
Error-based SQL injection
B.
Blind SQL injection
Correct Answer
C.
Time-based SQL injection
D.
Union SQL injection
Question 143

An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption. The attacker installed a rogue access point with only WPA2 compatibility in the vicinity and forced the victim to go through the WPA2 four-way handshake to get connected. After the connection was established, the attacker used automated tools to crack WPA2-encrypted messages.

A.
Cache-based attack
B.
Side-channel attack
C.
Timing-based attack
D.
Downgrade security attack
Correct Answer
Question 144

Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless communications. He installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used this virtual tower to interrupt the data transmission between the user and real tower, attempting to hijack an active session. Upon receiving the user's request, Bobby manipulated the traffic with the virtual tower and redirected the victim to a malicious website. What is the attack performed by Bobby in the above scenario?

A.
Wardriving
B.
aLTEr attack
Correct Answer
C.
Jamming signal attack
D.
KRACK attack
Question 145

An attacker utilizes a Wi-Fi Pineapple to run an access point with a legitimate-looking SSID for a nearby business in order to capture the wireless password. What kind of attack is this?

A.
War driving attack
B.
Evil-twin attack
Correct Answer
C.
Phishing attack
D.
MAC spoofing attack
Question 146

As the lead security engineer for a retail corporation, you are assessing the security of the wireless networks in the company's stores. One of your main concerns is the potential for 'Wardriving' attacks, where attackers drive around with a Wi-Fi-enabled device to discover vulnerable wireless networks. Given the nature of the retail stores, you need to ensure that any security measures you implement do not interfere with customer experience, such as their ability to access in-store Wi-Fi. Taking into consideration these factors, which of the following would be the most suitable measure to mitigate the risk of Wardriving attacks?

A.
Implement WPA3 encryption for the store's Wi-Fi network
Correct Answer
B.
Disable SSID broadcasting
C.
Limit the range of the store's wireless signals
D.
Implement MAC address filtering
Question 147

The security team of Debry Inc. decided to upgrade Wi-Fi security to thwart attacks such as dictionary attacks and key recovery attacks. For this purpose, the security team started implementing cutting-edge technology that uses a modern key establishment protocol called the simultaneous authentication of equals (SAE), also known as dragonfly key exchange, which replaces the PSK concept. What is the Wi-Fi encryption technology implemented by Debry Inc.?

A.
WPA2
B.
WPA3
Correct Answer
C.
WEP
D.
WPA
Question 148

This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve. Which is this wireless security protocol?

A.
WPA3-Personal
B.
WPA2-Enterprise
C.
WPA3-Enterprise
Correct Answer
D.
WPA2-Personal
Question 149

You are a cybersecurity trainee tasked with securing a small home network. The homeowner is concerned about potential 'Wi-Fi eavesdropping,' where unauthorized individuals could intercept the wireless communications. What would be the most effective first step to mitigate this risk, considering the simplicity and the residential nature of the network?

A.
Disable the network's SSID broadcast
B.
Enable MAC address filtering
C.
Enable encryption on the wireless network
Correct Answer
D.
Reduce the signal strength of the wireless router
Question 150

George is a security professional working for iTech Solutions. He was tasked with securely transferring sensitive data of the organization between industrial systems. In this process, he used a short-range communication protocol based on the IEEE 203.15.4 standard. This protocol is used in devices that transfer data infrequently at a low rate in a restricted area, within a range of 10-100 m. What is the short-range wireless communication technology George employed in the above scenario?

A.
MQTT
B.
NB-IoT
C.
LPWAN
D.
Zigbee
Correct Answer
Question 151

Which wireless security protocol replaces the personal pre shared key (PSK) authentication with Simultaneous Authentication of Equals (SAE) and is therefore resistant to offline dictionary attacks?

A.
WPA2-Enterprise
B.
ZigBee
C.
WPA3-Personal
Correct Answer
D.
Bluetooth
Question 152

As an IT intern, you have been asked to help set up a secure Wi-Fi network for a local coffee shop. The owners want to provide free Wi-Fi to their customers, but they are concerned about potential security risks. They are looking for a simple yet effective solution that would not require a lot of technical knowledge to manage. Which of the following security measures would be the most suitable in this context?

A.
Enable MAC address filtering
B.
Disable the network's SSID broadcast
C.
Implement WPA2 or WPA3 encryption
Correct Answer
D.
Require customers to use VPN when connected to the Wi-Fi
Question 153

Clark, a professional hacker, attempted to perform a Btlejacking attack using an automated tool, Btlejack, and hardware tool, micro:bit. This attack allowed Clark to hijack, read, and export sensitive information shared between connected devices. To perform this attack, Clark executed various btlejack commands. Which of the following commands was used by Clark to hijack the connections?

A.
btlejack -f 0x129f3244 -j
B.
btlejack -d /dev/ttyACM0 -d /dev/ttyACM2 -s
C.
btlejack -f 0x9c68fd30 -t -m 0x1fffffffff
Correct Answer
D.
btlejack -c any
Question 154

As the Chief Information Security Officer (CISO) at a large university, you are responsible for the security of a campus-wide Wi-Fi network that serves thousands of students, faculty, and staff. Recently, there has been a rise in reports of unauthorized network access, and you suspect that some users are sharing their login credentials. You are considering deploying an additional layer of security that could effectively mitigate this issue. What would be the most suitable measure to implement in this context?

A.
Deploy a VPN for the entire campus
B.
Enforce a policy of regularly changing Wi-Fi passwords
C.
Implement network segmentation
D.
Implement 802.1X authentication
Correct Answer
Question 155

A group of hackers were roaming around a bank office building in a city, driving a luxury car. They were using hacking tools on their laptop with the intention to find a free-access wireless network. What is this hacking process known as?

A.
GPS mapping
B.
Spectrum analysis
C.
Wireless sniffing
D.
Wardriving
Correct Answer
Question 156

As a junior security analyst for a small business, you are tasked with setting up the company's first wireless network. The company wants to ensure the network is secure from potential attacks. Given that the company's workforce is relatively small and the need for simplicity in managing network security, which of the following measures would you consider a priority to protect the network?

A.
Hide the network SSID
B.
Establish a regular schedule for changing the network password
C.
Enable WPA2 or WPA3 encryption on the wireless router
Correct Answer
D.
Implement a MAC address whitelist
Question 157

Attacker Rony installed a rogue access point within an organization's perimeter and attempted to intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack. What is the type of vulnerability assessment performed by Johnson in the above scenario?

A.
Application assessment
B.
Wireless network assessment
Correct Answer
C.
Host-based assessment
D.
Distributed assessment
Question 158

Jake, a professional hacker, installed spyware on a target iPhone to spy on the target user's activities. He can take complete control of the target mobile device by jailbreaking the device remotely and record audio, capture screenshots, and monitor all phone calls and SMS messages.

A.
Zscaler
B.
DroidSheep
C.
Androrat
D.
Trident
Correct Answer
Question 159

Jacob works as a system administrator in an organization. He wants to extract the source code of a mobile application and disassemble the application to analyze its design flaws. Using this technique, he wants to fix any bugs in the application, discover underlying vulnerabilities, and improve defense strategies against attacks. What is the technique used by Jacob in the above scenario to improve the security of the mobile application?

A.
Social engineering
B.
App sandboxing
C.
Jailbreaking
D.
Reverse engineering
Correct Answer
Question 160

As a security consultant, you are advising a startup that is developing an IoT device for home security. The device communicates with a mobile app, allowing homeowners to monitor their homes in real time. The CEO is concerned about potential Man-in-the-Middle (MitM) attacks that could allow an attacker to intercept and manipulate the device's communication. Which of the following solutions would best protect against such attacks?

A.
Limit the range of the IoT device's wireless signals.
B.
Use CAPTCHA on the mobile app's login screen.
C.
Frequently change the IoT device's IP address.
D.
Implement SSL/TLS encryption for data transmission between the IoT device and the mobile app.
Correct Answer
Question 161

John, a professional hacker, targeted CyberSol Inc., an MNC. He decided to discover the IoT devices connected in the target network that are using default credentials and are vulnerable to various hijacking attacks. For this purpose, he used an automated tool to scan the target network for specific types of IoT devices and detect whether they are using the default, factory-set credentials. What is the tool employed by John in the above scenario?

A.
Azure IoT Central
B.
AT&T IoT Platform
C.
IoTSeeker
Correct Answer
D.
IoT Inspector
Question 162

Geena, a cloud architect, uses a master component in the Kubernetes cluster architecture that scans newly generated pods and allocates a node to them. This component can also assign nodes based on factors such as the overall resource requirement, data locality, software/hardware/policy restrictions, and internal workload interventions. Which of the following master components is explained in the above scenario?

A.
Kube-scheduler
Correct Answer
B.
Etcd cluster
C.
Kube-controller-manager
D.
Kube-apiserver
Question 163

You are a cybersecurity consultant at SecureIoT Inc. A manufacturing company has contracted you to strengthen the security of their Industrial IoT (IIoT) devices used in their operational technology (OT) environment. They are concerned about potential attacks that could disrupt their production lines and compromise safety. They have an advanced firewall system in place, but you know this alone is not enough. Which of the following measures should you suggest to provide comprehensive protection for their IoT devices?

A.
Increase the frequency of changing passwords on all IIoT devices.
B.
Implement network segmentation to separate IIoT devices from the rest of the network.
Correct Answer
C.
Rely on the existing firewall and install antivirus software on each IIoT device.
D.
Use the same encryption standards for IoT devices as for IT devices.
Question 164

What is the port to block first in case you are suspicious that an IoT device has been compromised?

A.
443
B.
48101
Correct Answer
C.
80
D.
22
Question 165

Mike, a security engineer, was recently hired by BigFox Ltd. The company recently experienced disastrous DoS attacks. The management had instructed Mike to build defensive strategies for the company's IT infrastructure to thwart DoS/DDoS attacks. Mike deployed some countermeasures to handle jamming and scrambling attacks. What is the countermeasure Mike applied to defend against jamming and scrambling attacks?

A.
Implement cognitive radios in the physical layer
Correct Answer
B.
Disable TCP SYN cookie protection
C.
Allow the usage of functions such as gets and strcpy
D.
Allow the transmission of all types of addressed packets at the ISP level
Question 166

Robert, a professional hacker, is attempting to execute a fault injection attack on a target IoT device. In this process, he injects faults into the power supply that can be used for remote execution, also causing the skipping of key instructions. He also injects faults into the clock network used for delivering a synchronized signal across the chip.

A.
Optical, electromagnetic fault injection (EMFI)
B.
Temperature attack
C.
Power/clock/reset glitching
Correct Answer
D.
Frequency/voltage tampering
Question 167

You are a cybersecurity consultant for a healthcare organization that utilizes Internet of Medical Things (IoMT) devices, such as connected insulin pumps and heart rate monitors, to provide improved patient care. Recently, the organization has been targeted by ransomware attacks. While the IT infrastructure was unaffected due to robust security measures, they are worried that the IoMT devices could be potential entry points for future attacks. What would be your main recommendation to protect these devices from such threats?

A.
Disable all wireless connectivity on IoMT devices.
B.
Regularly change the IP addresses of all IoMT devices.
C.
Use network segmentation to isolate IoMT devices from the main network.
Correct Answer
D.
Implement multi-factor authentication for all IoMT devices.
Question 169

As a cybersecurity analyst at IoT Defend, you are working with a large utility company that uses Industrial Control Systems (ICS) in its operational technology (OT) environment. The company has recently integrated IoT devices into this environment to enable remote monitoring and control. They want to ensure these devices do not become a weak link in their security posture. To identify potential vulnerabilities in the IoT devices, which of the following actions should you recommend as the first step?

A.
Use stronger encryption algorithms for data transmission between IoT devices.
B.
Conduct a vulnerability assessment specifically for the IoT devices.
Correct Answer
C.
Implement network segmentation to isolate IoT devices from the rest of the network.
D.
Install the latest antivirus software on each IoT device.
Question 170

As a cybersecurity analyst at TechSafe Inc., you are working on a project to improve the security of a smart home system. This IoT-enabled system controls various aspects of the home, from heating and lighting to security cameras and door locks. Your client wants to ensure that even if one device is compromised, the rest of the system remains secure. Which of the following strategies would be most effective for this purpose?

A.
Advise using a dedicated network for the smart home system, separate from the home's main Wi-Fi network.
Correct Answer
B.
Propose frequent system resets to clear any potential malware.
C.
Suggest implementing two-factor authentication for the smart home system's mobile app.
D.
Recommend using a strong password for the smart home system's main control panel.
Question 171

You are a cybersecurity consultant for a smart city project. The project involves deploying a vast network of IoT devices for public utilities like traffic control, water supply, and power grid management. The city administration is concerned about the possibility of a Distributed Denial of Service (DDoS) attack crippling these critical services. They have asked you for advice on how to prevent such an attack. What would be your primary recommendation?

A.
Implement IP address whitelisting for all IoT devices.
B.
Deploy network intrusion detection systems (IDS) across the IoT network.
Correct Answer
C.
Implement regular firmware updates for all IoT devices.
D.
Establish strong, unique passwords for each IoT device.
Question 172

According to the NIST cloud deployment reference architecture, which of the following provides connectivity and transport services to consumers?

A.
Cloud connector
B.
Cloud carrier
Correct Answer
C.
Cloud provider
D.
Cloud broker
Question 173

Alex, a cloud security engineer working in Eyecloud Inc. is tasked with isolating applications from the underlying infrastructure and stimulating communication via well-defined channels. For this purpose, he used an open-source technology that helped him in developing, packaging, and running applications; further, the technology provides PaaS through OS-level virtualization, delivers containerized software packages, and promotes fast software delivery. What is the cloud technology employed by Alex in the above scenario?

A.
Virtual machine
B.
Serverless computing
C.
Zero trust network
D.
Docker
Correct Answer
Question 174

Alice, a professional hacker, targeted an organization's cloud services. She infiltrated the target's MSP provider by sending spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud service. Further, she accessed the target customer profiles with her MSP account, compressed the customer data, and stored them in the MSP. Then, she used this information to launch further attacks on the target organization. Which of the following cloud attacks did Alice perform in the above scenario?

A.
Cloud cryptojacking
B.
Cloud hopper attack
Correct Answer
C.
Man-in-the-cloud (MITC) attack
D.
Cloudborne attack
Question 175

Joe works as an IT administrator in an organization and has recently set up a cloud computing service for the organization. To implement this service, he reached out to a telecom company for providing Internet connectivity and transport services between the organization and the cloud service provider. In the NIST cloud deployment reference architecture, under which category does the telecom company fall in the above scenario?

A.
Cloud broker
B.
Cloud consumer
C.
Cloud carrier
Correct Answer
D.
Cloud auditor
Question 176

You are a security analyst for CloudSec, a company providing cloud security solutions. One of your clients, a financial institution, wants to shift its operations to a public cloud while maintaining a high level of security control. They want to ensure that they can monitor all their cloud resources continuously and receive real-time alerts about potential security threats. They also want to enforce their security policies consistently across all cloud workloads. Which of the following solutions would best meet these requirements?

A.
Deploy a Cloud Access Security Broker (CASB).
Correct Answer
B.
Use multi-factor authentication for all cloud user accounts.
C.
Implement a Virtual Private Network (VPN) for secure data transmission.
D.
Use client-side encryption for all stored data.
Question 177

You are a cloud security expert at CloudGuard Inc. working with a client who plans to transition their infrastructure to a public cloud. The client expresses concern about potential data breaches and wants to ensure that only authorized personnel can access certain sensitive resources. You propose implementing a Zero Trust security model. Which of the following best describes how the Zero Trust model would enhance the security of their cloud resources?

A.
It encrypts all data stored in the cloud, ensuring only authorized users can decrypt it.
B.
It ensures secure data transmission by implementing SSL/TLS protocols.
C.
It uses multi-factor authentication for all user accounts.
D.
It operates on the principle of least privilege, verifying each request as if it is from an untrusted source, regardless of its location.
Correct Answer
Question 179

Thomas, a cloud security professional, is performing security assessment on cloud services to identify any loopholes. He detects a vulnerability in a bare-metal cloud server that can enable hackers to implant malicious backdoors in its firmware. He also identified that an installed backdoor can persist even if the server is reallocated to new clients or businesses that use it as an IaaS. What is the type of cloud attack that can be performed by exploiting the vulnerability discussed in the above scenario?

A.
Metadata spoofing attack
B.
Cloudborne attack
Correct Answer
C.
Man-in-the-cloud (MITC) attack
D.
Cloud cryptojacking
Question 180

As a security analyst for SkySecure Inc., you are working with a client that uses a multi-cloud strategy, utilizing services from several cloud providers. The client wants to implement a system that will provide unified security management across all their cloud platforms. They need a solution that allows them to consistently enforce security policies, identify and respond to threats, and maintain visibility of all their cloud resources. Which of the following should you recommend as the best solution?

A.
Use a hardware-based firewall to secure all cloud resources.
B.
Implement separate security management tools for each cloud platform.
C.
Use a Cloud Access Security Broker (CASB).
Correct Answer
D.
Rely on the built-in security features of each cloud platform.
Question 181

Abel, a cloud architect, uses container technology to deploy applications/software including all its dependencies, such as libraries and configuration files, binaries, and other resources that run independently from other processes in the cloud environment. For the containerization of applications, he follows the five-tier container technology architecture. Currently, Abel is verifying and validating image contents, signing images, and sending them to the registries. Which of the following tiers of the container technology architecture is Abel currently working in?

A.
Tier-1: Developer machines
B.
Tier-2: Testing and accreditation systems
Correct Answer
C.
Tier-4: Orchestrators
D.
Tier-3: Registries
Question 182

As a cybersecurity consultant, you are working with a client who wants to migrate their data to a Software as a Service (SaaS) cloud environment. They are particularly concerned about maintaining the privacy of their sensitive data, even from the cloud service provider. Which of the following strategies would best ensure the privacy of their data in the SaaS environment?

A.
Encrypt the data client-side before uploading to the SaaS environment and manage encryption keys independently.
Correct Answer
B.
Rely on the cloud service provider's built-in security features.
C.
Implement a Virtual Private Network (VPN) for accessing the SaaS applications.
D.
Use multi-factor authentication for all user accounts accessing the SaaS applications
Question 183

Tony wants to integrate a 128-bit symmetric block cipher with key sizes of 128, 192, or 256 bits into a software program, which involves 32 rounds of computational operations that include substitution and permutation operations on four 32-bit word blocks using 8-variable S-boxes with 4-bit entry and 4-bit exit. Which of the following algorithms includes all the above features and can be integrated by Tony into the software program?

A.
TEA
B.
Serpent
Correct Answer
C.
CAST-128
D.
RC5
Question 184

Your company, Encryptor Corp, is developing a new application that will handle highly sensitive user information. As a cybersecurity specialist, you want to ensure this data is securely stored. The development team proposes a method where data is hashed and then encrypted before storage. However, you want an added layer of security to verify the integrity of the data upon retrieval. Which of the following cryptographic concepts should you propose to the team?

A.
Apply a digital signature mechanism.
Correct Answer
B.
Switch to elliptic curve cryptography.
C.
Implement a block cipher mode of operation.
D.
Suggest using salt with hashing.
Question 185

Harper, a software engineer, is developing an email application. To ensure the confidentiality of email messages, Harper uses a symmetric-key block cipher having a classical 12- or 16-round Feistel network with a block size of 64 bits for encryption, which includes large 8 × 32-bit S-boxes (S1, S2, S3, S4) based on bent functions, modular addition and subtraction, key-dependent rotation, and XOR operations. This cipher also uses a masking key (Km1) and a rotation key (Kr1) for performing its functions. What is the algorithm employed by Harper to secure the email messages?

A.
AES
B.
CAST-128
Correct Answer
C.
GOST block cipher
D.
DES
Question 188

Rebecca, a security professional, wants to authenticate employees who use web services for safe and secure communication. In this process, she employs a component of the Web Service Architecture, which is an extension of SOAP, and it can maintain the integrity and confidentiality of SOAP messages.

A.
WS-Policy
B.
WS-Security
Correct Answer
C.
WSDL
D.
WS-Work Processes
Question 190

John wants to send Marie an email that includes sensitive information, and he does not trust the network that he is connected to. Marie gives him the idea of using PGP. What should John do to communicate correctly using this type of encryption?

A.
Use Marie's public key to encrypt the message.
Correct Answer
B.
Use his own public key to encrypt the message.
C.
Use his own private key to encrypt the message.
D.
Use Marie's private key to encrypt the message.
Question 191

Your company, SecureTech Inc., is planning to transmit some sensitive data over an unsecured communication channel. As a cyber security expert, you decide to use symmetric key encryption to protect the data. However, you must also ensure the secure exchange of the symmetric key. Which of the following protocols would you recommend to the team to achieve this?

A.
Utilizing SSH for secure remote logins to the servers.
B.
Applying the Diffie-Hellman protocol to exchange the symmetric key.
Correct Answer
C.
Switching all data transmission to the HTTPS protocol.
D.
Implementing SSL certificates on your company's web servers.
Question 192

You are a cybersecurity specialist at CloudTech Inc., a company providing cloud-based services. You are managing a project for a client who wants to migrate their sensitive data to a public cloud service. To comply with regulatory requirements, the client insists on maintaining full control over the encryption keys even when the data is at rest on the cloud. Which of the following practices should you implement to meet this requirement?

A.
Rely on Secure Sockets Layer (SSL) encryption for data at rest.
B.
Encrypt data client-side before uploading to the cloud and retain control of the encryption keys.
Correct Answer
C.
Use the cloud service provider's default encryption and key management services.
D.
Use the cloud service provider's encryption services but store keys on-premises.
Question 193

Sam, a web developer, was instructed to incorporate a hybrid encryption software program into a web application to secure email messages. Sam used an encryption software, which is a free implementation of the OpenPGP standard that uses both symmetric-key cryptography and asymmetric-key cryptography for improved speed and secure key exchange. What is the encryption software employed by Sam for securing the email messages?

A.
SMTP
B.
S/MIME
C.
GPG
Correct Answer
D.
PGP
Question 194

This form of encryption algorithm is a symmetric key block cipher that is characterized by a 128-bit block size, and its key size can be up to 256 bits. Which among the following is this encryption algorithm?

A.
HMAC encryption algorithm
B.
Twofish encryption algorithm
Correct Answer
C.
Blowfish encryption algorithm
D.
IDEA
Question 195

You are the chief security officer at AlphaTech, a tech company that specializes in data storage solutions. Your company is developing a new cloud storage platform where users can store their personal files. To ensure data security, the development team is proposing to use symmetric encryption for data at rest. However, they are unsure of how to securely manage and distribute the symmetric keys to users. Which of the following strategies would you recommend to them?

A.
Use HTTPS protocol for secure key transfer.
B.
Use hash functions to distribute the keys.
C.
Implement the Diffie-Hellman protocol for secure key exchange.
Correct Answer
D.
Use digital signatures to encrypt the symmetric keys.
Question 196

You are the chief cybersecurity officer at CloudSecure Inc., and your team is responsible for securing a cloud-based application that handles sensitive customer data. To ensure that the data is protected from breaches, you have decided to implement encryption for both data-at-rest and data-in-transit. The development team suggests using SSL/TLS for securing data in transit. However, you want to also implement a mechanism to detect if the data was tampered with during transmission. Which of the following should you propose?

A.
Switch to using SSH for data transmission.
B.
Use the cloud service provider's built-in encryption services.
C.
Implement IPsec in addition to SSL/TLS.
Correct Answer
D.
Encrypt data using the AES algorithm before transmission.
Question 198

BitLocker encryption has been implemented for all the Windows-based computers in an organization. You are concerned that someone might lose their cryptographic key. Therefore, a mechanism was implemented to recover the keys from Active Directory. What is this mechanism called in cryptography?

A.
Key archival
B.
Key renewal
C.
Certificate rollover
D.
Key escrow
Correct Answer
Question 199

As a cybersecurity consultant for SafePath Corp, you have been tasked with implementing a system for secure email communication. The key requirement is to ensure both confidentiality and non-repudiation. While considering various encryption methods, you are inclined towards using a combination of symmetric and asymmetric cryptography. However, you are unsure which cryptographic technique would best serve the purpose. Which of the following options would you choose to meet these requirements?

A.
Apply asymmetric encryption with RSA and use the private key for signing.
Correct Answer
B.
Use the Diffie-Hellman protocol for key exchange and encryption.
C.
Use symmetric encryption with the AES algorithm.
D.
Apply asymmetric encryption with RSA and use the public key for encryption.