CEH/PEN - Practice Exam_2 Flashcards

1
Q

Vulnerability management cycle

A
  1. Identify assets and create a baseline
  2. Vulnerability scan
  3. Risk Assessment
  4. Remediation
  5. Verification
  6. Monitor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Command line used to discover WPS enabled APs

A

ntptrace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack: Security exploit that compromises a site that a targeted victim visits to gain access to victim’s computer and network

A

Watering hole attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An individual who uses hacking skills to identify security vulnerabilities in hardware, software or netowrks

A

White Hat Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A web security vulnerability that allows an attacker to interfere with an application’s processing of XML data

A

XXE (XML external entity injection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Technique when someone queries a DNS server in order to find out if the DNS server has a specific DNS record cached, and thereby deduce if the DNS server’s owner have recently visited a specified site

A

DNS Cache Snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A powerful, flexible and portable tool created to perform various types of MITM attacks against a network, manipulate HTTP, HTTPS and TCP traffic in real-time, sniff for credentials and much more

A

BetterCAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Field in the IPv4 header, and the Traffic Class filed in the IPv6 header, used to classify IP packets so that routers can make QoS (quality of service) decision about what path packets should traverse across the network

A

Type of Service (ToS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Private IP address range (Class A)

A

10.0.0.0 - 10.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Class B address ranges

A

172.16.0.0 - 172.31.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Class C address range

A

192.168.0.0 - 192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Three types of IPv6 addresses

A
  • Unicast
  • Anycast
  • Multicast
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Protocols used to mitigate session hijackings

A
  • IPSEC
  • VPN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Device typically used with software such as Wireshark to aid in wireless network traffic analysis

A

AirPcap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Two security issues related to containers as compared to VMs

A
  • Open network traffic across services
  • sharing the OS kernel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ports are divided into three ranges known as:

A
  • Well-known ports
  • Registered Ports
  • Dynamic/Private Ports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Well-known ports range

A

0 - 1023

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Registered ports range

A

1024 - 49151

19
Q

Dynamic/Private ports range

A

49152 - 65535

20
Q

DoS attack against a Bluetooth device

A

Bluesmacking

21
Q

In context of Microsoft Windows NT, which Security Identifier (SID) represents the administrator account

A

S-1-5 and end with -500

22
Q

(inherent risk) - (impact of risk controls) =

A

Residual risk

23
Q

The Five Phases of Penetration Testing

A

Reconnaissance
Scanning
Vulnerability assessment
Exploitation
Reporting

24
Q

When an attacker attempts to deliver the payload over multiple packets for an extended period of time

A

Session splicing

25
Q

Attack when you extract secrets from people by use of torture or coercion

A

Rubber hose attack

26
Q

Tactics used in social engineering attacks

A
  • Reciprocity
  • Social Validation
  • Authority
27
Q

Attack that is used to redirect users to an incorrect DNS server (2 answers)

A
  • DNS cache poisoning
  • Pharming
28
Q

Process of sending ICMP Echo request to all IP addresses in the range

A

Ping sweep

29
Q

Tool that allows you to query the DNS database from any computer on the network and find the hostname of a device by specifying its IP address

A

nslookup

30
Q

Tool that can be used to crack WEP encryption

A

Aircrack-NG

31
Q

What is the first step in a form based SQL injection attack

A

Locate a user input file on a web page

32
Q

What are two common reasons for using split DNS

A
  • Allow internal networks to resolve DNS on the Internet
  • Hide internal information from external clients on the Internet
33
Q

Auxiliary in Metasploit that allows you to scan for SNMP configurations

A

auxiliary/scanner/snmp

34
Q

What is the first step followed by vulnerability scanners

A

Checking if the remote host is alive

35
Q

Nmap command used to perform a TCP SYN ping scan

A

nmap -sn -PS <target></target>

36
Q

Encryption software, which is a free implementation of the OpenPGP standard that uses both symmetric-key cryptography and asymmetric-key cryptography

A

PGP

37
Q

Which sqlmap command allows you to enumerate a database for a specific url?

A

-dbs

38
Q

Attack: When an attacker compromises a site likely to be visited by a particular target group

A

Waterhole attack

39
Q

Individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks

A

White Hat Hacker

40
Q

Criminals who break into computer networks with malicious intent

A

Black Hat Hacker

41
Q

A powerful, flexible and portable tool created to perform various types of MITM attacks against a network, manipulate HTTP, HTTPS and TCP traffic in real time, sniff for credentials and much more.

A

BetterCAP

42
Q

Integrated platform/graphical tool for performing security testing of web applications.

A

Burp Suite

43
Q

Attack technique used to crack the password used by industrial control systems

A

HMI-based attack

44
Q

Length of the IPv6 datagram hearder

A

40 bytes