IT CertificationsComprehensive Study Set

Ceh Certification Exam Questions

159 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

A Certified Ethical Hacker follows a specific methodology for testing a system. Which step comes after footprinting in the CEH methodology?

ANSWER

Scanning

QUESTION 2

You've been hired as part of a pen test team. During the in brief, you learn the client wants the pen test attack to simulate a normal user who finds ways to elevate privileges and create attacks. Which test type does the client want?

ANSWER

Gray box

QUESTION 3

Which of the following is true regarding an ethical hacker?

ANSWER

The ethical hacker has authorization to proceed from the target owner.

QUESTION 4

You begin your first pen-test assignment by checking out IP address ranges owned by the target as well as details of their domain name registration. Additionally, you visit job boards and financial websites to gather any technical information online. What activity are you performing?

ANSWER

Passive footprinting

QUESTION 5

You send a message across a network and are primarily concerned that it is not altered during transit. Which security element ensures a message arrives at its destination with no alteration?

ANSWER

Integrity

QUESTION 6

An ethical hacker is given no prior knowledge of the network and has a specific framework in which to work. The agreement specifies boundaries, nondisclosure agreements, and a completion date definition. Which of the following statements are true?

ANSWER

A white hat is attempting a black box test.

QUESTION 7

Which of the following attacks is considered an integrity attack, where the attacker is not concerned with deciphering the entirety of a plaintext message?

ANSWER

Bit flipping

QUESTION 8

As part of a pen test on a U.S. Government system, you discover files containing social security numbers and other PII (Personally Identifiable Information) sensitive information. You are asked about controls placed on dissemination of this information. Which of the following acts should you check?

ANSWER

Privacy Act

QUESTION 9

Joe has spent a large amount of time learning hacking tools and techniques, and has even passed certification exams to promote himself in the ethical hacking field. Joe uses his talents during the election season to deface websites and launch denial of service attacks against opponents of his candidate. Which answer most closely correlates with Joe's actions?

ANSWER

Hactivism

QUESTION 10

A hacker is attempting to gain access to a target inside a business. After trying several methods, he gets frustrated and starts a denial of service attack against a server attached to the target. Which security control is the hacker affecting?

ANSWER

Availability

QUESTION 11

The security, functionality, and ease of use (SFE) triangle states which of the following as true?

ANSWER

As security increases, ease of use decreases and functionality decreases.

QUESTION 12

In which phase of the ethical hacking methodology would a hacker discover available targets on a network?

ANSWER

Scanning and enumeration

QUESTION 13

Which of the following are potential drawbacks to a black box test? (Choose all that apply.)

ANSWER

The client does not get a full picture of an internal attacker focused on their systems. ; This test takes the longest amount of time to complete.

QUESTION 14

In which phase of a penetration test would an ethical hacker perform footprinting?

ANSWER

Assessment

QUESTION 15

Which of the following would not be considered passive reconnaissance?

ANSWER

Ping sweeping a range of IP addresses found through a DNS lookup

QUESTION 16

As part of the preparation phase for a pen test that you are participating in, the client relays their intent to discover security flaws and possible remediation. They seem particularly concerned about external threats and do not mention internal threats at all. When defining scope, the threat of internal users is not added as part of the test. Which test is this client ignoring?

ANSWER

Gray box

QUESTION 17

In which phase of an attack would vulnerability mapping occur?

ANSWER

Scanning and enumeration

QUESTION 18

While performing a pen test, you find success in exploiting a machine. Your attack vector took advantage of a common mistake—the Windows 7 installer script used to load the machine left the administrative account with a default password. Which attack did you successfully execute?

ANSWER

Operating system

QUESTION 19

A machine in your environment uses an open X-server to allow remote access. The X-server access control is disabled, allowing connections from almost anywhere and with little to no authentication measures. Which of the following are true statements regarding this situation? (Choose all that apply.) A. An external vulnerability can take advantage of the misconfigured X-server threat.

ANSWER

An external threat can take advantage of the misconfigured X-server vulnerability. ; An internal threat can take advantage of the misconfigured X-server vulnerability.

QUESTION 20

You are examining security logs snapshotted during a prior attack against the target. The target's IP address is 135.17.22.15, and the attack originated from 216.88.76.5. Which of the following correctly characterizes this attack?

ANSWER

Outside attack

QUESTION 21

An ethical hacker needs to be aware of a variety of laws. What do Sections 1029 and 1030 of United States Code Title 18 specify?

ANSWER

They define most of the U.S. laws concerning hacking and computer crime.

QUESTION 22

Which of the following should a security professional use as a possible means to verify the integrity of a data message from sender to receiver?

ANSWER

Hash algorithm

QUESTION 23

Which of the following describes activities taken in the conclusion phase of a penetration test?

ANSWER

Reports are prepared detailing security deficiencies.

QUESTION 24

Which of the following best describes an ethical hacker?

ANSWER

An ethical hacker never proceeds with an audit or test without written permission.

QUESTION 25

In which phase of the attack would a hacker set up and configure "zombie" machines?

ANSWER

Maintaining access

QUESTION 26

Which of the following is a true statement concerning cryptography?

ANSWER

Converts plaintext to ciphertext for protection during transit or in storage.

QUESTION 27

Which of the following would be the best choice to guarantee the integrity of messages in transit or storage?

ANSWER

Hash algorithm

QUESTION 28

Which of the following encryption algorithms is your best choice if your primary need is bulk encryption, and you need fast, strong encryption?

ANSWER

AES

QUESTION 29

You're describing a basic PKI system to a new member of the team. He asks how the public key can be distributed within the system in an orderly, controlled fashion so that the users can be sure of the sender's identity. Which of the following would be your answer?

ANSWER

Digital certificate

QUESTION 30

You are discussing hash values with a CEH instructor. Immediately after telling you the hash is a one-way algorithm and cannot be reversed, he explains that you can still discover the value entered into the hash, given enough time and resources. Which of the following hash anomalies might allow this?

ANSWER

Collision

QUESTION 31

What is the standard format for digital certificates?

ANSWER

X.509

QUESTION 32

You're discussing cryptography and determine you need to ensure messages are safe from unauthorized observation. Also, you want to provide a way to ensure the identity of the sender and receiver during the communications process. Which of the following best suits your needs?

ANSWER

Asymmetric encryption

QUESTION 33

A hacker has gained access to several files. Many are encrypted, but one is not. Which of the following is the best choice for possibly providing a successful break into the encrypted files?

ANSWER

Known plaintext

QUESTION 34

You are discussing a steganography tool that takes advantage of the nature of "white space" to conceal information. Which tool are you discussing?

ANSWER

Snow

QUESTION 35

At the basic core of encryption approaches, two main methods are in play: substitution and transposition. Which of the following best describes transposition?

ANSWER

The order of bits is changed.

QUESTION 36

Jack and Jill work in an organization that has a PKI system in place for securing messaging. Jack encrypts a message for Jill and sends it on. Jill receives the message and decrypts it. Within a PKI system, which of the following statements is true?

ANSWER

Jack encrypts with Jill's public key. Jill decrypts with her private key.

QUESTION 37

Which of the following would you find in an X.509 digital certificate? (Choose all that apply.)

ANSWER

Version, Algorithm ID, Public Key, and Key Usage

QUESTION 38

Which of the following is a secure substitute for telnet?

ANSWER

SSH

QUESTION 39

An SSL session requires a client and a server to handshake information between each other and agree on a secured channel. Which of the following best describes the session key creation during the setup of an SSL session?

ANSWER

The client creates the key after verifying the server's identity.

QUESTION 40

Which encryption algorithm uses variable block sizes (from 32 to 128 bits)?

ANSWER

RC5

QUESTION 41

Which hash algorithm was developed by the NSA and produces output values up to 512 bits?

ANSWER

SHA-2

QUESTION 42

A hacker is attempting to uncover the key used in a cryptographic encryption scheme. Which attack vector is the most resource intensive and usually takes the longest amount of time?

ANSWER

Brute force

QUESTION 43

In a discussion on symmetric encryption, a friend mentions that one of the drawbacks with this system is scalability. He goes on to say that for every person you add to the mix, the number of keys goes up exponentially. If seven people are in a symmetric encryption pool, how many keys are necessary?

ANSWER

21

QUESTION 44

Which of the following is a true statement?

ANSWER

Symmetric encryption does not scale easily and does not provide for nonrepudiation.

QUESTION 45

The PKI system you are auditing has a Certificate Authority (CA) at the top that creates and issues certificates. Users trust each other based on the CA itself. Which trust model is in use here?

ANSWER

Single Authority

QUESTION 46

Two bit strings are run through an XOR operation. Which of the following is a true statement for each bit pair regarding this function?

ANSWER

If the first value is 1 and the second value is 1, then the output is 0.

QUESTION 47

Which of the following attacks attempts to re-send a portion of a cryptographic exchange in hopes of setting up a communications channel?

ANSWER

Replay

QUESTION 48

Within a PKI system, which of the following is an accurate statement?

ANSWER

Bill can be sure a message came from Sue by using her public key to decrypt the digital signature.

QUESTION 49

One use of hash algorithms is for the secure storage of passwords: The password is run through a one-way hash, and the value is stored instead of the plaintext version. If a hacker gains access to these hash values, and knows the hash algorithm used to create them, which of the following could be used to speed up his effort in cracking them?

ANSWER

Rainbow tables

QUESTION 50

Your client's business is headquartered in Japan. Which regional registry would be the best place to look for footprinting information?

ANSWER

APNIC

QUESTION 51

Which of the following are footprinting tools? (Choose all that apply.)

ANSWER

Sam Spade, Nslookup, Traceroute, and NetCraft

QUESTION 52

You are looking for files with the terms "Apache" and "Version" in their titles. Which Google hack is the appropriate one?

ANSWER

allintitle:apache version

QUESTION 53

You've just kicked off a penetration test against a target organization and have decided to perform a little passive footprinting. One of the first sites you visit are job boards, where the company has listed various openings. What is the primary useful footprinting information to be gained through this particular search?

ANSWER

Insight into the operating systems, hardware, and applications in use

QUESTION 54

Which of the following activities is not considered passive footprinting?

ANSWER

Calling the company's help desk line

QUESTION 55

As fate would have it, you are contracted to pen test an organization you are already familiar with. You start your passive reconnaissance by perusing the company website. Several months ago, the public-facing website had a listing of all staff members, including phone numbers, e-mail addresses, and other useful information. Since that time, the listing has been removed from the website. Which of the following is the best option to provide access to the listing?

ANSWER

Use www.archive.org.

QUESTION 56

You are footprinting information for a pen test. Social engineering is part of your reconnaissance efforts, and some of it will be active in nature. You take steps to ensure that if the social engineering efforts are discovered at this early stage, any trace efforts point to another organization. Which of the following terms best describes what you are participating in?

ANSWER

Pseudonymous footprinting

QUESTION 57

You are setting up DNS for your enterprise. Server A is both a web server and an FTP server. You wish to advertise both services for this machine. Which DNS record type would you use to accomplish this?

ANSWER

CNAME

QUESTION 58

Within the DNS system, a primary server (SOA) holds and maintains all records for the zone. Secondary servers will periodically ask the primary whether there have been any updates. If updates have occurred, they will ask for a zone transfer to update their own copies. Under what conditions will a secondary name server request a zone transfer from a primary?

ANSWER

When the primary SOA record serial number is higher that the secondary's

QUESTION 59

Which of the following footprinting tools uses ICMP to provide information on network pathways?

ANSWER

Traceroute

QUESTION 60

Joe accesses the company website, www.anybusi.com, from his home computer and is presented with a defaced site contained disturbing images. He calls the IT department to report the website hack and is told they do not see any problem with the site: No files have been changed, and when the site is accessed from their terminals (inside the company) it appears normally. Joe connects over VPN into the company website and notices the site appears normally. Which of the following might explain the issue?

ANSWER

DNS poisoning

QUESTION 61

One way to mitigate against DNS poisoning is to restrict or limit the amount of time records can stay in cache before they're updated. Which DNS record type allows you to set this restriction?

ANSWER

SOA

QUESTION 62

You are gathering reconnaissance on your target organization whose website has a .com extension. With no other information to go on, which regional Internet registry would be the best place to begin your search?

ANSWER

ARIN

QUESTION 63

Which of the following is a good footprinting tool for discovering information on a company's founding, history, and financial status?

ANSWER

EDGAR database

QUESTION 64

How does traceroute map the routes traveled by a packet?

ANSWER

By manipulating the time to live (TTL) parameter

QUESTION 65

You are footprinting a target headquartered in the Dominican Republic. You have gathered some competitive intelligence and have engaged in both passive and active reconnaissance. Your next step is to define the network range this organization uses. What is the best way to accomplish this?

ANSWER

Use LACNIC to look up the company range

QUESTION 66

A zone file consists of which types of records? (Choose all that apply.)

ANSWER

PTR, MX, SOA, A

QUESTION 67

A good footprinting method is to track e-mail messages and see what kind of information you can pull back. Which tool is useful in this scenario?

ANSWER

eMailTrackerPro

QUESTION 68

You are footprinting DNS information using dig. What command syntax should be used to discover all name servers listed by DNS server 202.55.77.12 in the anybiz.com namespace?

ANSWER

dig @202.55.77.12 www.anybiz.com NS

QUESTION 69

What is the second step in the TCP three-way handshake?

ANSWER

SYN/ACK

QUESTION 70

You wish to perform a ping sweep of a subnet within your target organization. Which of the following nmap command lines is your best option?

ANSWER

nmap -sP 192.168.1.0/24

QUESTION 71

Which of the following TCP flags is used to reset a connection?

ANSWER

RST

QUESTION 72

You are examining traffic and notice an ICMP type 3, code 13 response. What does this normally indicate?

ANSWER

A firewall is prohibiting connection

QUESTION 73

You have a zombie system ready and begin an IDLE scan. As the scan moves along, you notice that fragment identification numbers gleaned from the zombie machine are incrementing randomly. What does this mean?

ANSWER

Your IDLE scan results will not be useful to you.

QUESTION 74

As a pen test on a major international business moves along, a colleague discovers an IIS server and a mail exchange server on a DMZ subnet. You review a ping sweep accomplished earlier in the day on that subnet and note neither machine responded to the ping. What is the most likely reason for the lack of response?

ANSWER

ICMP is being filtered.

QUESTION 75

Which of the following tools is not a good choice for determining possible vulnerabilities on live targets you have identified?

ANSWER

Nmap

QUESTION 76

Which of the following tools can be used for operating system prediction? (Choose all that apply.)

ANSWER

Nmap and Queso

QUESTION 77

You are in training for your new pen test assignment. Your trainer enters the following command: telnet 192.168.12.5 80 After typing the command, he hits ENTER a few times. What is being attempted?

ANSWER

Banner grabbing

QUESTION 78

What is being attempted with the following command: nc -u -v -w2 192.168.1.100 1-1024

ANSWER

A HDP port scan of ports 1-1024 on a single address

QUESTION 79

You are told to monitor a packet capture for any attempted DNS zone transfer. Which port should you key your search on?

ANSWER

TCP 53

QUESTION 80

In the scanning and enumeration phase of your attack, you put tools such as ToneLoc, THC-Scan, and WarVox to use. What are you attempting to accomplish?

ANSWER

War dialing

QUESTION 81

Which of the following are SNMP enumeration tools? (Choose all that apply.)

ANSWER

SNMPUtil, OptUtils, Solar Winds, and NSAuditor

QUESTION 82

You wish to run a scan against a target network. You're concerned about it being a reliable scan, with legitimate results, but want to take steps to ensure it is as stealthy as possible. Which scan type is best in this situation?

ANSWER

nmap -sS targetIPaddress

QUESTION 83

Which of the following ports are required for a null session connection? (Choose all that apply.)

ANSWER

135, 137, 139, 445

QUESTION 84

You are enumerating a subnet. Examining message traffic you discover SNMP is enabled on multiple targets. If you assume default settings in setting up enumeration tools to use SNMP, which community strings should you use?

ANSWER

Public (read-only) and Private (read/write)

QUESTION 85

Nmap is a powerful scanning and enumeration tool. What does this nmap command attempt to accomplish? nmap -sA -T4 192.168.15.0/24

ANSWER

A parallel, fast ACK scan of a Class C subnet

QUESTION 86

You are examining a packet capture of all traffic from a host on the subnet. The host sends a segment with the SYN flag set, in order to set up a TCP communications channel. The destination port is 80, and the sequence number is set to 10. Which of the following statements are not true regarding this communications channel? (Choose all that apply.)

ANSWER

The host will be attempting to retrieve an HTML file; The packet returned in answer to this SYN request will acknowledge the sequence number by returning "10."

QUESTION 87

Which TCP flag instructs the recipient to ignore buffering constraints and immediately send all data?

ANSWER

PSH

QUESTION 88

You receive a RST-ACK from a port during a SYN scan. What is the state of the port?

ANSWER

Closed

QUESTION 89

Which port-scanning method presents the most risk of discovery, but provides the most reliable results?

ANSWER

Full-connect

QUESTION 90

A target machine (with a MAC of 12:34:56:AB:CD:EF) is connected to a switch port. An attacker (with a MAC of 78:91:00:ED:BC:A1) is attached to a separate port on the same switch with a packet capture running. There is no spanning of ports or port security in place. Two packets leave the target machine. Message 1 has a destination MAC of E1:22:BA:87:AC:12. Message 2 has a destination MAC of FF: FF: FF: FF: FF: FF. Which of the following statements is true regarding the messages being sent?

ANSWER

The attacker will see message 2.

QUESTION 91

You have successfully tapped into a network subnet of your target organization. You begin an attack by learning all significant MAC addresses on the subnet. After some time, you decide to intercept messages between two hosts. You begin by sending broadcast messages to Host A showing your MAC address as belonging to Host B. Simultaneously, you send messages to Host B showing your MAC address as belonging to Host A. What is being accomplished here?

ANSWER

ARP poisoning to allow you to see messages from Host A to Host B, and vice versa

QUESTION 92

Sniffing network traffic can sometimes be a function of an investigation run by a law enforcement agency (LEA). Within the confines of the lawful intercept, what provides most of the processing of the information and is usually provided by a third party?

ANSWER

Mediation device

QUESTION 93

An attacker has successfully tapped into a network segment and has configured port spanning for his connection, which allows him to see all traffic passing through the switch. Which of the following protocols protects any sensitive data from being seen by this attacker?

ANSWER

SSH

QUESTION 94

You have a large packet capture file in Wireshark to review. You wish to filter traffic to show all packets with an IP address of 192.168.22.5 that contain the string HR_admin. Which of the following filters would accomplish this task?

ANSWER

ip.addr==192.168.22.5 &&tcp contains HR_admin

QUESTION 95

Which of the following is a tool used for MAC spoofing?

ANSWER

SMAC

QUESTION 96

You are attempting to sniff traffic on a switch. Which of the following is a good method to ensure you are successful? (Choose all that apply.)

ANSWER

Configure a span port; Use MAC flooding

QUESTION 97

Which of the following are modes Snort can operate in? (Choose all that apply.)

ANSWER

Sniffer, Packet Logger, and Network IDS

QUESTION 98

You wish to begin sniffing, and you have a Windows 7 laptop. You download and install Wireshark, but quickly discover your NIC needs to be in "promiscuous mode." What allows you to put your NIC into promiscuous mode?

ANSWER

Installing winPcap

QUESTION 99

You are attempting to deliver a payload to a target inside the organization; however, it is behind an IDS. You are concerned about successfully accomplishing your task without alerting the IDS monitoring team. Which of the following methods are possible options? (Choose all that apply.)

ANSWER

Encrypt the traffic between you and the host; Session splicing

QUESTION 100

A pen test member has gained access to an open switch port. He configures his NIC for promiscuous mode and sets up a sniffer, plugging his laptop directly into the switch port. He watches traffic as it arrives at the system, looking for specific information to possibly use later. What type of sniffing is being practiced?

ANSWER

Session

QUESTION 101

What does this line from the Snort configuration file indicate? var RULE_PATH c:\etc\snort\rules

ANSWER

It defines the location of the Snort rules.

QUESTION 102

As part of a security monitoring team, Joe is reacting to an incursion into the network. The attacker successfully exploited a vulnerability on an internal machine, and Joe is examining how the attacker succeeded. He reviews the IDS logs but sees no alerts for the time period; however, there is definitive proof of the attack. Which IDS shortcoming does this refer to?

ANSWER

False negative

QUESTION 103

Your IDS sits on the network perimeter and has been analyzing traffic for a couple of weeks. On arrival one morning, you find the IDS has alerted on a spike in network traffic late the previous evening. Which type of IDS are you using?

ANSWER

Anomaly based

QUESTION 104

You are performing an ACK scan against a target subnet. You previously verified connectivity to several hosts within the subnet, but want to verify all live hosts on the subnet. Your scan, however, is not receiving any replies. Which type of firewall is most likely in use at your location?

ANSWER

Stateful

QUESTION 105

You are separated from your target subnet by a firewall. The firewall is correctly configured and only allows requests through to ports opened by the administrator. In firewalking the device, you find that port 80 is open. Which technique could you employ to send data and commands to or from the target system?

ANSWER

Use HTTP tunneling.

QUESTION 106

Which of the following tools are useful in identifying potential honeypots on a subnet? (Choose all that apply.)

ANSWER

Nessus and Send-Safe HH

QUESTION 107

Examine the Wireshark filter shown here: ip.src == 192.168.1.1 &&tcp.srcport == 80 Which of the following correctly describes the capture filter?

ANSWER

The results will display all HTTP traffic from 192.168.1.1.

QUESTION 108

You need to put the NIC into listening mode on your Linux box, capture packets, and write the results to a log file named my.log. How do you accomplish this with tcpdump?

ANSWER

tcpdump -i eth0 -w my.log

QUESTION 109

Which of the following tools can assist with IDS evasion? (Choose all that apply.)

ANSWER

Whisker, Fragroute, ADMmutate, and Inundator

QUESTION 110

Which command puts Snort into packet logger mode?

ANSWER

./snort -dev -l ./log

QUESTION 111

Examine the following password hashes obtained from a Windows XP machine using LM hashing: B757BF5C0D87772FAAD3B435B51404EE BA810DBA98995F1817306D272A9441BB E52CAC67419A9A224A3B108F3FA6CB6D 0182BD0BD4444BF836077A718CCDF409 CEC52EB9C8E3455DC2265B23734E0DAC Which of the following is true regarding the hashes listed?

ANSWER

The first hash listed is from a password of seven characters or less.

QUESTION 112

Which of the following correctly describes brute-force password attacks?

ANSWER

Attempt all possible combinations of letters, numbers, and special characters in succession.

QUESTION 113

Which password theft method is almost always successful, requires little technical knowledge, and is nearly impossible to detect?

ANSWER

Install a hardware keylogger.

QUESTION 114

Which of the following will extract an executable file from NTFS streaming?

ANSWER

c:\> cat file1.txt:hidden.exe > visible.exe

QUESTION 115

Which command is used to allow all privileges to the user, read-only to the group and read-only for all others to a particular file, on a Linux machine?

ANSWER

chmod 711 file1

QUESTION 116

You are attempting to hack a Windows machine and wish to gain a copy of the SAM file. Where can you find it? (Choose all that apply.)

ANSWER

c:\windows\system32\config, or c:\windows\repair

QUESTION 117

Which of the following statements are true concerning Kerberos? (Choose all that apply.)

ANSWER

Kerberos uses symmetric encryption; Kerberos uses asymmetric encryption; Clients ask for authentication tickets from the KDC in clear text; KDC responses to clients never include a password; Clients decrypt a TGT from the server;

QUESTION 118

What is the difference between a dictionary attack and a hybrid attack?

ANSWER

Dictionary attacks use predefined word lists, whereas hybrid attacks substitute numbers and symbols within those words.

QUESTION 119

Which of the following SIDs indicates the true administrator account?

ANSWER

S-1-5-21-1388762127-2960977290-773940301-500

QUESTION 120

You have obtained a password hash and wish to quickly determine the associated plaintext password. Which of the following is the best choice?

ANSWER

Use a rainbow table.

QUESTION 121

You are monitoring traffic between two systems communicating over SSL. Which of the following techniques is your best bet in gaining access?

ANSWER

Sidejacking

QUESTION 122

Which password would be considered the most secure?

ANSWER

C3HisH@rd

QUESTION 123

Your client makes use of Sigverif on his servers. What functionality does this tool provide?

ANSWER

Displays a list of unsigned drivers.

QUESTION 124

Which of the following are considered offline password attacks? (Choose all that apply.)

ANSWER

Using a hardware keylogger, Brute-force cracking with Cain and Abel on a stolen SAM file, and Using John the Ripper on a stolen passwd file

QUESTION 125

You suspect a hack has occurred against your Linux machine. Which command will display all running processes for you to review?

ANSWER

ps -ef

QUESTION 126

Which rootkit type makes use of system-level calls to hide their existence?

ANSWER

Library level

QUESTION 127

Which folder in Linux holds administrative commands and daemons?

ANSWER

/sbin

QUESTION 128

What are the three commands necessary to install an application in Linux?

ANSWER

make, make install, ./configure

QUESTION 129

You are examining files on a Windows machine and note one file's attributes include "h." What does this indicate?

ANSWER

The file is hidden.

QUESTION 130

You have gained access to a SAM file from an older Windows machine and are preparing to run a Syskey cracker against it. How many bits are used for Syskey encryption?

ANSWER

128

QUESTION 131

Which of the following tools can assist in discovering the use of NTFS file streams? (Choose all that apply.)

ANSWER

LADS, ADS Spy, and Sfind

QUESTION 132

Which authentication method uses DES for encryption and forces 14-character passwords for hash storage?

ANSWER

LAN Manager

QUESTION 133

You are testing physical security measures as part of a pen test team. Upon entering the lobby of the building, you see the entrance has a guard posted at the lone entrance. A door leads into a smaller room with a second door heading into the interior of the building. Which physical security measure is in place?

ANSWER

Man trap

QUESTION 134

In your social engineering efforts you call the company help desk and pose as a user who has forgotten a password. You ask the technician to help you reset your password, which they happily comply with. Which social engineering attack is in use here?

ANSWER

Technical support

QUESTION 135

Your client is considering a biometric system for access to a controlled location. Which of the following is a true statement regarding his decision?

ANSWER

The lower the CER, the better the biometric system.

QUESTION 136

A pen tester sends an unsolicited e-mail to several users on the target organization. The e-mail is well crafted and appears to be from the company's help desk, advising users of potential network problems. The e-mail provides a contact number to call in the event they are adversely affected. The pen tester then performs a denial of service on several systems and receives phone calls from users asking for assistance. Which social engineering practice is in play here?

ANSWER

Reverse social engineering

QUESTION 137

A pen test member has gained access to a building and is observing activity as he wanders around. In one room of the building, he stands just outside a cubicle wall opening and watches the onscreen activity of a user. Which social engineering attack is in use here?

ANSWER

Shoulder surfing

QUESTION 138

You are interviewing an incident response team member of an organization you're working with. He relates an incident where a user received an e-mail that appeared to be from the U.S. Postal Service, notifying her of a package headed her way and providing a link for tracking the package. The link provided took the user to what appeared to be the USPS site, where she input her user information to learn about the latest shipment headed her way. Which attack did the user fall victim to?

ANSWER

Phishing

QUESTION 139

Which type of social engineering attacks use phishing, pop-ups, and IRC?

ANSWER

Computer based

QUESTION 140

An e-mail sent from an attacker to a known hacking group contains a reference stating, "Rebecca works for the finance department at _business-name_ and is the administrative assistant to the chief. She can be reached at _phone-number_." What is most likely being communicated here?

ANSWER

The administrative assistant for the chief of the finance department at this business is easily swayed by social engineering efforts.

QUESTION 141

What are the three categories of measures taken to ensure physical security?

ANSWER

Technical , Physical, and Operational

QUESTION 142

After observing a target organization for several days, you discover that finance and HR records are bagged up and placed in an outside storage bin for later shredding/recycling. One day you simply walk to the bin and place one of the bags in your vehicle, with plans to rifle through it later. Which social engineering attack was used here?

ANSWER

Dumpster diving

QUESTION 143

An attacker waits outside the entry to a secured facility. After a few minutes an authorized user appears with an entry badge displayed. He swipes a key card and unlocks the door. The attacker, with no display badge, follows him inside. Which social engineering attack just occurred?

ANSWER

Piggybacking

QUESTION 144

Which threat presents the highest risk to an organization's resources?

ANSWER

Disgruntled employees

QUESTION 145

Which of the following may be effective countermeasures against social engineering? (Choose all that apply.)

ANSWER

Security policies, Operational guidelines, Strong firewall configuration

QUESTION 146

Which of the following are indicators of a phishing e-mail? (Choose all that apply.)

ANSWER

It does not reference you by name; It contains misspelled words or grammatical errors; It contains spoofed links; It comes from an unverified source;

QUESTION 147

You are discussing physical security measures and are covering background checks on employees and policies regarding key management and storage. Which type of physical security measure is being discussed?

ANSWER

Operational

QUESTION 148

Which of the following resources can assist in combating phishing in your organization? (Choose all that apply.)

ANSWER

Netcraft and Phishtank

QUESTION 149

In order, what are the three steps in a reverse social engineering attack?

ANSWER

Marketing, sabotage, technical support

QUESTION 150

Which type of social engineering makes use of impersonation, dumpster diving, shoulder surfing, and tailgating?

ANSWER

Human based

QUESTION 151

What is considered the best defense against social engineering?

ANSWER

User education and training

QUESTION 152

Which anti-phishing method makes use of a secret message or image referenced on the communication?

ANSWER

Sign-in seal

QUESTION 153

Which of the following should be in place to assist as a social engineering countermeasure? (Choose all that apply.)

ANSWER

Classification of information; Strong security policy; User Education; Strong change management process;

QUESTION 154

Joe uses a user ID and password to log into the system every day. Jill uses a PIV card and a pin number. Which of the following are true?

ANSWER

Jill is using two-factor authentication.

QUESTION 155

A system owner has implemented a retinal scanner at the entryway to the data floor. Which type of physical security measure is this?

ANSWER

Technical

QUESTION 156

Physical security also includes the maintenance of the environment and equipment for your data floor. Which of the following are true statements regarding this equipment? (Choose all that apply.)

ANSWER

The higher the MTBF, the better; The lower the MTTR, the better;

QUESTION 157

Which fire extinguisher type is the best choice for an electrical system fire?

ANSWER

An extinguisher marked "C"

QUESTION 158

You are examining connection logs from a client machine and come across this entry: http://www.business123.com/../../../../../Windows/system.ini. Which attack does this most likely indicate?

ANSWER

Directory traversal

QUESTION 159

A hacker is looking at a publicly facing web front end. One of the pages provides an entry box with the heading "Forgot password? Enter your email address." In the entry, he types anything' OR '1'='1. A message appears stating, "Your login information has been sent to a_username@emailaddress.target.com." Which of the following is true?

ANSWER

The SQL injection attempt has succeeded.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials