Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
312-50v13
Free trial
Verified
Question 26
Jane invites her friends Alice and John over for a LAN party. Alice and John access Jane’s wireless network without a password. However, Jane has a long, complex password on her router. What attack has likely occurred?
- A: Wardriving
- B: Wireless sniffing
- C: Evil twin
- D: Piggybacking
Question 27
Which file is a rich target to discover the structure of a website during web-server footprinting?
- A: domain.txt
- B: Robots.txt
- C: Document root
- D: index.html
Question 28
John, a professional hacker, decided to use DNS to perform data exfiltration on a target network. In this process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using this technique, John successfully injected malware to bypass a firewall and maintained communication with the victim machine and C&C server.
What is the technique employed by John to bypass the firewall?
- A: DNSSEC zone walking
- B: DNS cache snooping
- C: DNS enumeration
- D: DNS tunneling method
Question 29
There have been concerns in your network that the wireless network component is not sufficiently secure. You perform a vulnerability scan of the wireless network and find that it is using an old encryption protocol that was designed to mimic wired encryption.
What encryption protocol is being used?
- A: RADIUS
- B: WPA
- C: WEP
- D: WPA3
Question 30
You are a cybersecurity specialist at CloudTech Inc., a company providing cloud-based services. You are managing a project for a client who wants to migrate their sensitive data to a public cloud service. To comply with regulatory requirements, the client insists on maintaining full control over the encryption keys even when the data is at rest on the cloud. Which of the following practices should you implement to meet this requirement?
- A: Encrypt data client-side before uploading to the cloud and retain control of the encryption keys.
- B: Use the cloud service provider's encryption services but store keys on-premises.
- C: Rely on Secure Sockets Layer (SSL) encryption for data at rest.
- D: Use the cloud service provider's default encryption and key management services.
Question 31
In an advanced persistent threat scenario, an adversary follows a detailed set of procedures in the cyber kill chain. During one such instance, the adversary has successfully gained access to a corporate network and now attempts to obfuscate malicious traffic within legitimate network traffic. Which of the following actions would most likely be part of the adversary's current procedures?
- A: Employing data staging techniques to collect and aggregate sensitive data.
- B: Initiating DNS tunneling to communicate with the command-and-control server.
- C: Establishing a command-and-control server to communicate with compromised systems.
- D: Conducting internal reconnaissance using PowerShell scripts.
Question 32
As a part of an ethical hacking exercise, an attacker is probing a target network that is suspected to employ various honeypot systems for security. The attacker needs to detect and bypass these honeypots without alerting the target. The attacker decides to utilize a suite of techniques. Which of the following techniques would NOT assist in detecting a honeypot?
- A: Implementing a brute force attack to verify system vulnerability
- B: Probing system services and observing the three-way handshake
- C: Using honeypot detection tools like Send-Safe Honeypot Hunter
- D: Analyzing the MAC address to detect instances running on VMware
Question 33
A skilled ethical hacker was assigned to perform a thorough OS discovery on a potential target. They decided to adopt an advanced fingerprinting technique and sent a TCP packet to an open TCP port with specific flags enabled. Upon receiving the reply, they noticed the flags were SYN and ECN-Echo. Which test did the ethical hacker conduct and why was this specific approach adopted?
- A: Test 3: The test was executed to observe the response of the target system when a packet with URC, PSH, SYN, and FIN flags was sent, thereby identifying the OS
- B: Test 2: This test was chosen because a TCP packet with no flags enabled is known as a NULL packet and this would allow the hacker to assess the OS of the target
- C: Test 1: The test was conducted because SYN and ECN-Echo flags enabled to allow the hacker to probe the nature of the response and subsequently determine the OS fingerprint
- D: Test 6: The hacker selected this test because a TCP packet with the ACK flag enabled sent to a closed TCP port would yield more information about the OS
Question 34
Jane, an ethical hacker, is testing a target organization’s web server and website to identify security loopholes. In this process, she copied the entire website and its content on a local drive to view the complete profile of the site’s directory structure, file structure, external links, images, web pages, and so on. This information helps Jane map the website’s directories and gain valuable information.
What is the attack technique employed by Jane in the above scenario?
- A: Session hijacking
- B: Website mirroring
- C: Website defacement
- D: Web cache poisoning
Question 35
In an intricate web application architecture using an Oracle database, you, as a security analyst, have identified a potential SQL Injection attack surface. The database consists of 'x' tables, each with 'y' columns. Each table contains 'z' records. An attacker, well-versed in SQLi techniques, crafts 'u' SQL payloads, each attempting to extract maximum data from the database. The payloads include 'UNION SELECT' statements and 'DBMS_XSLPROCESSOR.READ2CLOB' to read sensitive files. The attacker aims to maximize the total data extracted 'E=xyz*u'. Assuming 'x=4', 'y=2', and varying 'z' and 'u', which situation is likely to result in the highest extracted data volume?
- A: z=600, u=2: The attacker devises 2 SQL payloads, each aimed at tables holding 600 records, affecting all columns across all tables.
- B: z=550, u=2: Here, the attacker formulates 2 SQL payloads and directs them towards tables containing 550 records, impacting all columns and tables.
- C: z=500, u=3: The attacker creates 3 SQL payloads and targets tables with 500 records each, exploiting all columns and tables.
- D: z=400, u=4: The attacker constructs 4 SQL payloads, each focusing on tables with 400 records, influencing all columns of all tables.
Question 36
A large enterprise has been experiencing sporadic system crashes and instability, resulting in limited access to its web services. The security team suspects it could be a result of a Denial of Service (DoS) attack. A significant increase in traffic was noticed in the network logs, with patterns suggesting packet sizes exceeding the prescribed size limit. Which among the following DoS attack techniques best describes this scenario?
- A: Smurf attack
- B: UDP flood attack
- C: Pulse wave attack
- D: Ping of Death attack
Question 37
Your company has been receiving regular alerts from its IDS about potential intrusions. On further investigation, you notice that these alerts have been false positives triggered by certain goodware files. In response, you are planning to enhance the IDS with YARA rules, reducing these false positives while improving the detection of real threats. Based on the scenario and the principles of YARA and IDS, which of the following strategies would best serve your purpose?
- A: Writing YARA rules specifically to identify the goodware files triggering false positives
- B: Implementing YARA rules that focus solely on known malware signatures
- C: Creating YARA rules to examine only the private database for intrusions
- D: Incorporating YARA rules to detect patterns in all files regardless of their nature
Question 38
Jake, a network security specialist, is trying to prevent network-level session hijacking attacks in his company. While studying different types of such attacks, he learns about a technique where an attacker inserts their machine into the communication between a client and a server, making it seem like the packets are flowing through the original path. This technique is primarily used to reroute the packets. Which of the following types of network-level session hijacking attacks is Jake studying?
- A: TCP/IP Hijacking
- B: RST Hijacking
- C: UDP Hijacking
- D: Man-in-the-middle Attack Using Forged ICMP and ARP Spoofing
Question 39
Given the complexities of an organization’s network infrastructure, a threat actor has exploited an unidentified vulnerability, leading to a major data breach. As a Certified Ethical Hacker (CEH). you are tasked with enhancing the organization's security stance. To ensure a comprehensive security defense, you recommend a certain security strategy. Which of the following best represents the strategy you would likely suggest and why?
- A: Develop an in-depth Risk Management process, involving identification, assessment, treatment, tracking, and review of risks to control the potential effects on the organization.
- B: Establish a Defense-in-Depth strategy, incorporating multiple layers of security measures to increase the complexity and decrease the likelihood of a successful attack.
- C: Implement an Information Assurance (IA) policy focusing on ensuring the integrity, availability, confidentiality, and authenticity of information systems.
- D: Adopt a Continual/Adaptive Security Strategy involving ongoing prediction, prevention, detection, and response actions to ensure comprehensive computer network defense.
Question 40
As a cybersecurity professional, you are responsible for securing a high-traffic web application that uses MySQL as its backend database. Recently, there has been a surge of unauthorized login attempts, and you suspect that a seasoned black-hat hacker is behind them. This hacker has shown proficiency in SQL Injection and appears to be using the 'UNION' SQL keyword to trick the login process into returning additional data. However, your application’s security measures include filtering special characters in user inputs, a method usually effective against such attacks. In this challenging environment, if the hacker still intends to exploit this SQL Injection vulnerability, which strategy is he most likely to employ?
- A: The hacker tries to manipulate the 'UNION' keyword in such a way that it triggers a database error, potentially revealing valuable information about the database's structure.
- B: The hacker switches tactics and resorts to a 'time-based blind' SQL Injection attack, which would force the application to delay its response, thereby revealing information based on the duration of the delay.
- C: The hacker attempts to bypass the special character filter by encoding his malicious input, which could potentially enable him to successfully inject damaging SQL queries.
- D: The hacker alters his approach and injects a DROP TABLE' statement, a move that could potentially lead to the loss of vital data stored in the application's database.
Question 41
You're the security manager for a tech company that uses a database to store sensitive customer data. You have implemented countermeasures against SQL injection attacks. Recently, you noticed some suspicious activities and suspect an attacker is using SQL injection techniques. The attacker is believed to use different forms of payloads in his SQL queries. In the case of a successful SQL injection attack, which of the following payloads would have the most significant impact?
- A: UNION SELECT NULL, NULL, NULL -- : This payload manipulates the UNION SQL operator, enabling the attacker to retrieve data from different database tables
- B: ' OR username LIKE '%': This payload uses the LIKE operator to search for a specific pattern in a column
- C: ' OR '1'='l: This payload manipulates the WHERE clause of an SQL statement, allowing the attacker to view unauthorized data
- D: ' OR 'a'='a; DROP TABLE members; --: This payload combines the manipulation of the WHERE clause with a destructive action, causing data loss
Question 42
A malicious user has acquired a Ticket Granting Service from the domain controller using a valid user's Ticket Granting Ticket in a Kerberoasting attack. He exhorted the TGS tickets from memory for offline cracking. But the attacker was stopped before he could complete his attack. The system administrator needs to investigate and remediate the potential breach. What should be the immediate step the system administrator takes?
- A: Perform a system reboot to clear the memory
- B: Delete the compromised user's account
- C: Change the NTLM password hash used to encrypt the ST
- D: Invalidate the TGS the attacker acquired
Question 43
You are a cybersecurity consultant for a healthcare organization that utilizes Internet of Medical Things (IoMT) devices, such as connected insulin pumps and heart rate monitors, to provide improved patientcare. Recently, the organization has been targeted by ransomware attacks. While the IT infrastructure was unaffected due to robust security measures, they are worried that the IoMT devices could be potential entry points for future attacks. What would be your main recommendation to protect these devices from such threats?
- A: Disable all wireless connectivity on IoMT devices.
- B: Regularly change the IP addresses of all IoMT devices.
- C: Use network segmentation to isolate IoMT devices from the main network.
- D: Implement multi-factor authentication for all IoMT devices.
Question 44
You are a cybersecurity consultant for a global organization. The organization has adopted a Bring Your Own Device (BYOD)policy, but they have recently experienced a phishing incident where an employee's device was compromised. In the investigation, you discovered that the phishing attack occurred through a third-party email app that the employee had installed. Given the need to balance security and user autonomy under the BYOD policy, how should the organization mitigate the risk of such incidents? Moreover, consider a measure that would prevent similar attacks without overly restricting the use of personal devices.
- A: Provide employees with corporate-owned devices for work-related tasks.
- B: Require all employee devices to use a company-provided VPN for internet access.
- C: Implement a mobile device management solution that restricts the installation of non-approved applications.
- D: Conduct regular cybersecurity awareness training, focusing on phishing attacks.
Question 45
An organization is performing a vulnerability assessment for mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization’s machines to detect which ports are attached to services such as an email server, a web server, or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests.
What is the type of vulnerability assessment solution that James employed in the above scenario?
- A: Service-based solutions
- B: Product-based solutions
- C: Tree-based assessment
- D: Inference-based assessment
Question 46
XYZ company recently discovered a potential vulnerability on their network, originating from misconfigurations. It was found that some of their host servers had enabled debugging functions and unknown users were granted administrative permissions. As a Certified Ethical Hacker, what would be the most potent risk associated with this misconfiguration?
- A: An attacker may be able to inject a malicious DLL into the current running process
- B: Weak encryption might be allowing man-in-the-middle attacks, leading to data tampering
- C: Unauthorized users may perform privilege escalation using unnecessarily created accounts
- D: An attacker may carry out a Denial-of-Service assault draining the resources of the server in the process
Question 47
An organization suspects a persistent threat from a cybercriminal. They hire an ethical hacker, John, to evaluate their system security. John identifies several vulnerabilities and advises the organization on preventive measures. However, the organization has limited resources and opts to fix only the most severe vulnerability. Subsequently, a data breach occurs exploiting a different vulnerability. Which of the following statements best describes this scenario?
- A: The organization is at fault because it did not fix all identified vulnerabilities.
- B: Both the organization and John share responsibility because they did not adequately manage the vulnerabilities.
- C: John is at fault because he did not emphasize the necessity of patching all vulnerabilities.
- D: The organization is not at fault because they used their resources as per their understanding.
Question 48
An ethical hacker is attempting to crack NTLM hashed passwords from a Windows SAM file using a rainbow table attack. He has dumped the on-disk contents of the SAM file successfully and noticed that all LM hashes are blank. Given this scenario, which of the following would be the most likely reason for the blank LM hashes?
- A: The SAM file has been encrypted using the SYSKEY function.
- B: The passwords exceeded 14 characters in length and therefore, the LM hashes were set to a “dummy" value.
- C: The Windows system is Vista or a later version, where LM hashes are disabled by default.
- D: The Windows system is using the Kerberos authentication protocol as the default method.
Question 49
A Certified Ethical Hacker (CEH) is given the task to perform an LDAP enumeration on a target system. The system is secured and accepts connections only on secure LDAP. The CEH uses Python for the enumeration process. After successfully installing LDAP and establishing a connection with the target, he attempts to fetch details like the domain name and naming context but is unable to receive the expected response. Considering the circumstances, which of the following is the most plausible reason for this situation?
- A: The system failed to establish a connection due to an incorrect port number.
- B: The enumeration process was blocked by the target system's intrusion detection system.
- C: The secure LDAP connection was not properly initialized due to a lack of 'use_ssl = True' in the server object creation.
- D: The Python version installed on the CEH's machine is incompatible with the Idap3 library.
Question 50
You are a cybersecurity consultant for a major airport that offers free Wi-Fi to travelers. The management is concerned about the possibility of "Evil Twin" attacks, where a malicious actor sets up a rogue access point that mimics the legitimate one. They are looking for a solution that would not significantly impact the user experience or require travelers to install additional software. What is the most effective security measure you could recommend that fits these constraints, considering the airport's unique operational environment?
- A: Regularly change the SSID of the airport's Wi-Fi network
- B: Use MAC address filtering on the airport's Wi-Fi network
- C: Implement WPA3 encryption for the airport's Wi-Fi network
- D: Display a captive portal page that warns users about the possibility of Evil Twin attacks
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!