CEH/PEN - Practice Exam_3 Flashcards

1
Q

Nmap scan that executes an XMAS scan every 15 seconds

A

-sX -sneaky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Type of rootkit that will patch, hook, or replace the version of system call in order to hide information

A

Library level rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IPSEC uses which two modes

A

AH/ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewall with multiple network interfaces

A

Multihomed firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bluejacking is an attack that does what?

A

Send unsolicited message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Honeypot detection tool

A

Sobek

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ways in which an IDS detect intrusion attempts

A

Signature detection
Anomaly detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the length of the IPv6 datagram header?

A

40 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?

A

TOS field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Programs that can be used to provide unexpected or random inputs to computer programs are referred to as:

A

fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In wireshark, the packet bytes pane shows the data of the current packet in which of the following format sytles?

A

Hex Dump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Penetration testers hide Metasploit shellcode to evade Windows Defender by using which of the following Metasploit framework tools?

A

Msfencode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What two security issues are related to containers as compared to VMS

A
  • Open network traffic across services
  • Sharing the OS Kernel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Within Microsoft Windows NT, which Security Identifier (SID) represents the administrator account

A

S-1-5- and end with -500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(inherent risk) - (impact of risk controls) = ?

A

Residual risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vulnerability mapping occurs after which phase of a penetration test

A

Analysis of host scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How would you describe an attacker’s attempts to deliver the payload over multiple packets for an extended period of time?

A

Session splicing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What tactics are used in social engineering attacks

A

Reciprocity
Social Validation
Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Sending a probe to the target system using a ping scan is a form of which type of reconnaissance?

A

Active reconnaissance

20
Q

Tool used to scan a webserver for vulnerabilities.

A

Wikto

21
Q

Which of the following commands will attempt a half-open scan stealthily as possible?

A

nmap -sS

22
Q

If you wanted an aggressive XMAS scan, perhaps the following might be to your liking:

A

nmap <IP> -sX -A</IP>

23
Q

What is the process of sending ICMP Echo requests to all IP addresses in the range known as?

A

Ping sweep

24
Q

Within wireshark, which filter will provide you results from a specific IP address

A

ip.src ==

25
Q

The nmap TCP Window scan can be performed by using the following commands?

A

nmap -sW

26
Q

What is the proper command to perform an Nmap XMAS scan every 15 seconds?

A

nmap -sX -sneaky

27
Q

What type of rootkits will patch, hook, or replace the version of system call in order to hide information?

A

Library level rootkits

28
Q

What are the port states determined by Nmap?

A

Open, filtered, unfiltered

29
Q

Which of the following will allow footprinting to be conducted without detection?

A

ARIN

30
Q

IPSEC uses which two modes?

A

AH/ESP

31
Q

Toll used for honeypot dection

A

Sobek

32
Q

Secuirty assessments categories (some)

A

Penetration testing
Security audits
Vulnerability assessments

33
Q

Method that uses traceroute-like IP packet analysis to determine whether a data packet can pass through the packet-filtering device from the attacker’s host to the victim’s host

A

Firewalking

34
Q

Used to distribute a public key within the PKI system, verifying the user’s ID to the recipient

A

Digital certificate

35
Q

Important things to know about symmetic encryption

A

Algorithms are fast
Good for bulk encryption
Scalability issues

36
Q

Google Hack: Used to display specific text in url title

A

allintitle

37
Q

Regional Internet address registry for the Asia-Pacific region.

A

APNIC

38
Q

Linux folder that holds the password and shadow files

A

/etc

39
Q

Tool used by an attacker to encrypt information before transmitting it on the wire

A

cryptcat

40
Q

Potential attacks on cryptography (some)

A

Chose-Ciphertext attack
Replay attack
Man-in-the-Middle attack

41
Q

Three valid types of IPv6 address

A
  • Global unicast
  • Unique local
  • Multicast
42
Q

Two protocols that can be used to mitigate session hijacking

A

IPSEC and VPN

43
Q

Tool that maintains a database of Ethernet MAC addresses seen on the network, with their associated IP pairs

A

Arpwatch

44
Q

Cloud computing as-a-service in which clients are responsible for the maintenance of the cloud-based resources

A

Infrastructure as a service

45
Q

Cloud computing as-a-service in which clients are responsible for ensuring user access to the application

A

Software as a service

46
Q

Cloud computing as-a-service in which clients are responsible for building, deploying, managing and maintaining the software applications and services

A

Platform as a service