CEH Questions Part (1)

-------is a type of phishing that targets high-profile executives such as CEOs, CFOs, politicians, and celebrities who have access to confidential and highly valuable information.
A- Whaling
B- Phishing
C- Vishing
D- Spear phishing
Ron, a security professional, was pen testing web applications and SaaS platforms used by his company. While testing, he found a vulnerability that allows hackers to gain unauthorized access to API objects and perform actions such as view, update, and delete sensitive data of the company.
What is the API vulnerability revealed in the above scenario?
A- Business logic flaws
B- No ABAC validation
C- Code injections
D- Improper use of CORS
Scenario: Joe turns on his home computer to access personal online banking. When he enters the URL www.bank.com, the website is displayed, but it prompts him to re-enter his credentials as if he has never visited the site before. When he examines the website URL closer, he finds that the site is not secure and the web address appears different.
What type of attack he is experiencing?
A- DNS hijacking
B- DoS attack
C- DHCP spoofing
D- ARP cache poisoning
A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system.
What is the first step that the bank should take before enabling the audit feature?
A- Perform a vulnerability scan of the system
B- Determine the impact of enabling the audit feature
C- Perform a cost/benefit analysis of the audit feature
D- Allocate funds for staffing of audit log review
An organization decided to harden its security against web-application and web-server attacks. John, a security personnel in the organization, employed a security scanner to automate web-application security testing and to guard the organization's web infrastructure against web- application threats. Using that tool, he also wants to detect XSS, directory transversal problems, fault injection, SQL injection, attempts to execute commands, and several other attacks.
Which of the following security scanners will help John perform the above task?
A- AlienVault® OSSIM™
B- Saleae Logic Analyzer
C- syhunt Hybrid
D- Cisco ASA
Jane is working as a security professional at CyberSol Inc. She was tasked with ensuring the authentication and integrity of messages being transmitted in the corporate network. To encrypt the messages, she implemented a security model in which every user in the network maintains a ring of public keys. In this model, a user needs to encrypt a message using the receiver's public key, and only the receiver can decrypt the message using their private key.
What is the security model implemented by Jane to secure corporate messages?
A- Web of trust (WOT)
B- Secure Socket Layer (SSL)
C- Transport Layer Security (TLS)
D- Zero trust network
Rebecca, a security professional, wants to authenticate employees who use web services for safe and secure communication. In this process, she employs a component of the Web Service Architecture, which is an extension of SOAP, and it can maintain the integrity and confidentiality of SOAP messages.
Which of the following components of the Web Service Architecture is used by Rebecca for securing the communication?
A- WS-Security
B- WS-Policy
C- WS-Work Processes
D- wsdl
Eric, a cloud security engineer, implements a technique for securing the cloud resources used by his organization. This technique assumes by default that a user attempting to access the network is not an authentic entity and verifies every incoming connection before allowing access to the network. Using this technique, he also imposed conditions such that employees can access only the resources required for their role.
What is the technique employed by Eric to secure cloud resources?
A- Zero trust network
B- Demilitarized zone
C- Container technology
D- Serverless computing
Clark, a professional hacker, attempted to perform a Btlejacking attack using an automated tool, Btlejack, and hardware tool, micro:bit. This attack allowed Clark to hijack, read, and export sensitive information shared between connected devices. To perform this attack, Clark executed various btlejack commands.
Which of the following commands was used by Clark to hijack the connections?
A- btlejack -f 0x9c68fd30 -t -m 0x1 fffffffff
B- btlejack -c any
C- Q btlejack -f 0x129f3244 -j
D- btlejack -d /dev/ttyACMO -d /dev/ttyACM2 -s
Ralph, a professional hacker, targeted Jane, who had recently bought new systems for her company. After a few days, Ralph contacted Jane while masquerading as a legitimate customer support executive, informing that her systems need to be serviced for proper functioning and that customer support will send a computer technician. Jane promptly replied positively. Ralph entered Jane's company using this opportunity and gathered sensitive information by scanning terminals for passwords, searching for important documents in desks, and rummaging bins.
What is the type of attack technique Ralph used on Jane?
A- Impersonation
B- Shoulder surfing
C- Eavesdropping
D- Dumpster diving
Sophia is a shopping enthusiast who spends significant time searching for trendy outfits online. Clark, an attacker, noticed her activities several times and sent a fake email containing a deceptive page link to her social media page displaying all-new and trendy outfits. In excitement, Sophia clicked on the malicious link and logged in to that page using her valid credentials.
Which of the following tools is employed by Clark to create the spoofed email?
A- Evilginx
B- Slowloris
C- PyLoris
D- PLCinject
Harry, a professional hacker, targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear- phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection.
What is the APT lifecycle phase that Harry is currently executing?
A- Initial intrusion
B- Persistence
C- Preparation
D- Cleanup
Morris, a professional hacker, performed a vulnerability scan on a target organization by sniffing the traffic on the network to identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are currently accessing the network.
What is the type of vulnerability assessment that Morris performed on the target organization?
A- External assessment
B- Internal assessment
C- Passive assessment
D- Credentialed assessment
Jacob works as a system administrator in an organization. He wants to extract the source code of a mobile application and disassemble the application to analyze its design flaws. Using this technique, he wants to fix any bugs in the application, discover underlying vulnerabilities, and improve defense strategies against attacks.
What is the technique used by Jacob in the above scenario to improve the security of the mobile application?
A- Jailbreaking
B- Social engineering
C- Reverse engineering
D- App sandboxing
Miley, a professional hacker, decided to attack a target organization’s network. To perform the attack, she used a tool to send fake ARP messages over the target network to link her MAC address with the target system's IP address. By performing this, Miley received messages directed to the victim's MAC address and further used the tool to intercept, steal, modify, and block sensitive communication to the target system.
What is the tool employed by Miley to perform the above attack?
A- BetterCAP
B- Wireshark
C- DerpNSpoof
D- Gobbler
Your organization has signed an agreement with a web hosting provider that requires you to take full responsibility of the maintenance of the cloud-based resources.
Which of the following models covers this?
A- Infrastructure as a service
B- Functions as a service
C- Platform as a service
D- Software as a service
Bill has been hired as a penetration tester and cyber security auditor for a major credit card company. Which information security standard is most applicable to his role?
A- Sarbanes-Oxley Act
B- PCI-DSS
C- FISMA
D- HITECH
What information security law or standard aims at protecting stakeholders and the general public from accounting errors and fraudulent activities within organizations?
A- PCI-DSS
B- FISMA
C- ISO/IEC 27001:2013
D- sox
An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption. The attacker installed a rogue access point with only WPA2 compatibility in the vicinity and forced the victim to go through the WPA2 four-way handshake to get connected. After the connection was established, the attacker used automated tools to crack WPA2-encrypted messages.
What is the attack performed in the above scenario?
A- Downgrade security attack
B- Timing-based attack
C- Side-channel attack
D- Cache-based attack
After an audit, the auditors inform you that there is a critical finding that you must tackle immediately. You read the audit report, and the problem is the service running on port 389.
Which service is this and how can you tackle the problem?
A- The service is LDAP, and you must change it to 636, which is LDAPS.
B- The service is SMTP, and you must change it to SMI ME, which is an encrypted way to send emails.
C- The service is NTP, and you have to change it from UDP to TCP in order to encrypt it.
D- The findings do not require immediate actions and are only suggestions.
Garry is a network administrator in an organization. He uses SNMP to manage networked devices from a remote location. To manage nodes in the network, he uses MIB, which contains formal descriptions of all network objects managed by SNMP. He accesses the contents of MIB by using a web browser either by entering the IP address and Lseries.mib or by entering the DNS library name and Lseries.mib. He is currently retrieving information from an MIB that contains object types for workstations and server services.
Which of the following types of MIB is accessed by Garry in the above scenario?
A- WINS.MIB
B- DHCP.MIB
C- MIBJI.MIB
D- LNMIB2.MIB
Attacker Rony installed a rogue access point within an organization's perimeter and attempted to intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack.
What is the type of vulnerability assessment performed by Johnson in the above scenario?
A- Distributed assessment
B- Wireless network assessment
C- Application assessment
D- Host-based assessment
Harper, a software engineer, is developing an email application. To ensure the confidentiality of email messages. Harper uses a symmetric-key block cipher having a classical 12- or 16-round Feistel network with a block size of 64 bits for encryption, which includes large 8 x 32-bit S-boxes (S1, S2, S3, S4) based on bent functions, modular addition and subtraction, key-dependent rotation, and XOR operations. This cipher also uses a masking key (Km1) and a rotation key (Kr 1) for performing its functions.
What is the algorithm employed by Harper to secure the email messages?
A- CAST-128
B- GOST block cipher
C- AES
D- DES
Robert, a professional hacker, is attempting to execute a fault injection attack on a target loT device. In this process, he injects faults into the power supply that can be used for remote execution, also causing the skipping of key instructions. He also injects faults into the clock network used for delivering a synchronized signal across the chip.
Which of the following types of fault injection attack is performed by Robert in the above scenario?
A- Optical, electromagnetic fault injection (EMFI)
B- Temperature attack
C- Power/clock/reset glitching
D- Frequency/voltage tampering
You are using a public Wi-Fi network inside a coffee shop. Before surfing the web, you use your VPN to prevent intruders from sniffing your traffic. If you did not have a VPN, how would you identify whether someone is performing an ARP spoofing attack on your laptop?
A- You should scan the network using Nmap to check the MAC addresses of all the hosts and look for duplicates
B- You should use netstat to check for any suspicious connections with another IP address within the LAN.
C- You cannot identify such an attack and must use a VPN to protect your traffic.
D- You should check your ARP table and see if there is one IP address with two different MAC addresses
Lewis, a professional hacker, targeted the loT cameras and devices used by a target venture- capital firm. He used an information-gathering tool to collect information about the loT devices connected to a network, open ports and services, and the attack surface area. Using this tool, he also generated statistical reports on broad usage patterns and trends. This tool helped Lewis continually monitor every reachable server and device on the Internet, further allowing him to exploit these devices in the network.
Which of the following tools was employed by Lewis in the above scenario?
A- Wapiti
B- Lacework
C- NeuVector
D- Censys
Which of the following web vulnerabilities would an attacker be attempting to exploit if they delivered the following input?
 
<!DOCTYPE blah [ < JENTITY trustme SYSTEM ”file:///etc/passwd" > ] >
A- IDOR
B- XXS
C- XXE
D- SQLi
Your company was hired by a small healthcare provider to perform a technical assessment on the network.
What is the best approach for discovering vulnerabilities on a Windows-based computer?
A- Create a disk image of a clean Windows installation
B- Check MITRE.org for the latest list of CVE findings
C- Use the built-in Windows Update tool
D- Use a scan tool like Nessus
Becky has been hired by a client from Dubai to perform a penetration test against one of their remote offices. Working from her location in Columbus, Ohio, Becky runs her usual reconnaissance scans to obtain basic information about their network. When analyzing the results of her Whois search, Becky notices that the IP was allocated to a location in Le Havre, France.
Which regional Internet registry should Becky go to for detailed information?
A- APNIC
B- RIPE
C- LACNIC
D- ARIN
Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script. After infecting the victim's device. Mason further used Emotet to spread the infection across local networks and beyond to compromise as many machines as possible. In this process, he used a tool, which is a self-extracting RAR file, to retrieve information related to network resources such as writable share drives.
What is the tool employed by Mason in the above scenario?

ميسون، هاكر محترف، يبدأ العدوان على مؤسسة وينشر البرمجيات الخبيثة الشائعة مثل Emotet  من خلال النصوص الخبيثة. بعد تهديد الجهاز الضحية. يستخدم ميسون Emotet لنشر العدوان عبر الشبكات المحلية وخارجها لاختراق كل الأجهزة الممكنة. في هذه العملية، كان يستخدم أداة، وهي ملف RAR الذي يفك ذاته، لجلب المعلومات المتعلقة بمصادر الشبكة مثل الدرايف المشتركة التي يمكن الكتابة فيها.

 ما هي الأداة التي استخدمها ميسون في السيناريو المذكور أعلاه؟

A- Credential enumerator
B- Outlook scraper
C- WebBrowserPassView
D- NetPass.exe
Which among the following is the best example of the hacking concept called "clearing tracks'?
 

ما هو من الخيارات التالية هو الأمثلة الأفضل لمفهوم الاختراق الذي يسمى "مسح الأثر" ؟

A- During a cyberattack, a hacker corrupts the event logs on all machines.
B- An attacker gains access to a server through an exploitable vulnerability.
C- During a cyberattack, a hacker injects a rootkit into a server.
D- After a system is breached, a hacker creates a backdoor to allow re-entry into a system.
Andrew is an Ethical Hacker who was assigned the task of discovering all the active devices hidden by a restrictive firewall in the IPv4 range in a given target network.
Which of the following host discovery techniques must he use to perform the given task?
 

أندرو هاكر مهني يعمل في الاختراق الأخلاقي قد تعين على مهمة اكتشاف كل الأجهزة النشطة التي يتم إخفاؤها من قبل الجدار الناري القائم في النطاق IPv4 في الشبكة الهدف المعطاة. ما هي من التقنيات التالية لاكتشاف المضيف يجب عليه استخدامها لتنفيذ المهمة المعطاة؟

A- UDP scan
B- ARP ping scan
C- ACK flag probe scan
D- TCP Maimon scan
Jude, a pen tester working in Keiltech Ltd., performs sophisticated security testing on his company's network infrastructure to identify security loopholes. In this process, he started to circumvent the network protection tools and firewalls used in the company. He employed a technique that can create forged TCP sessions by carrying out multiple SYN, ACK, and RST or FIN packets. Further, this process allowed Jude to execute DDoS attacks that can exhaust the network resources.
What is the attack technique used by Jude for finding loopholes in the above scenario?
 
جود، وهو مختبر اختراق يعمل في شركة كيلتيك المحدودة، يجري إختبارات أمنية متطورة على البنية التحتية لشركته من أجل تحديد الثغرات الأمنية. وفي هذه العملية بدأ في الالتفاف على أدوات حماية الشبكة وجدران الحماية المستخدمة في الشركة. أستخدم تقنية يمكنها إنشاء جلسات TCP مزورة من خلال تنفيذ العديد من حزم SYN و ACK و RST أو FIN. وعلاوة على ذلك، أتاحت هذه العملية ل "جود" تنفيذ الهجمات التي يمكن أن تستنفد موارد الشبكة.
 
ما هي تقنية الهجوم التي استخدمها جود لإيجاد ثغرات في السيناريو المذكور اعلاه؟
A- UDP flood attack
B- Ping-of-death attack
C- Peer-to-peer attack
D- Spoofed session flood attack
James is working as an ethical hacker at Technix Solutions. The management ordered James to discover how vulnerable its network is towards footprinting attacks. James took the help of an open-source framework for performing automated reconnaissance activities. This framework helped James in gathering information using free tools and resources.
What is the framework used by James to conduct footprinting and reconnaissance activities?
 

يعمل جيمس كمخترق أخلاقي في شركة تكنيكس للحلول. أمرت الإدارة جيمس لاكتشاف مدى ضعف شبكتها تجاه هجمات جمع المعلومات. قام جيمس بمساعدة اطار عمل مفتوح المصدر للقيام بأنشطة استطلاع آليه. وقد ساعد هذا الاطار جيمس على جمع المعلومات باستخدام أدوات وموارد مجانية.

ما هو الإطار الذي يستخدمه جيمس لإجراء الأنشطة الشاملة لجمع المعلومات والتجسس؟

A- OSINT framework
B- SpeedPhish Framework
C- Browser Exploitation Framework
D- WebSploit Framework
Geena, a cloud architect, uses a master component in the Kubernetes cluster architecture that scans newly generated pods and allocates a node to them. This component can also assign nodes based on factors such as the overall resource requirement, data locality, software/hardware/policy restrictions, and internal workload interventions.
Which of the following master components is explained in the above scenario?
 

تستخدم جينا، مهندسة السحابة، عنصر رئيسي في تصميم مجمع كوبرنتز الذي يفحص الحزم الجديدة التي تنشئ ويخصص لها وحدة تشغيل. يمكن لهذا العنصر أيضًا تخصيص الوحدات بناءً على العوامل الأخرى مثل متطلبات الموارد الشاملة، الطبيعة المحلية للبيانات، القيود البرمجية/الأجهزة/السياسية، والتدخلات في الأعمال الداخلية.

ما هو العنصر الرئيسي الذي يشرحه السيناريو الذي سبق؟

A- Kube-controller-manager
B- Kube-apiserver
C- Kube-scheduler
D- Etcd cluster
CyberTech Inc. Recently experienced SQL injection attacks on its official website. The company appointed Bob, a security professional, to build and incorporate defensive strategies against such attacks. Bob adopted a practice whereby only a list of entities such as the data type, range, size, and value, which have been approved for secured access, is accepted.
What is the defensive technique employed by Bob in the above scenario?
 

 تعرضت شركة سايبرتك مؤخرا هجمات حقن SQL على موقعها الرسمي.

استُعينت الشركة بوب، متخصص امني، لبناء وإدخال التدابير الدفاعية ضد هذه الهجمات. اعتمد بوب ممارسة، حيث يتم قبول قائمة فقط من الكيانات مثل نوع البيانات، النطاق، الحجم، القيمة التي تم الموافقة عليها للوصول الآمن، وذلك للحماية من الهجمات الإدخالية لل SQL.

ما هي تقنية الدفاع التي استخدمها بوب في السيناريو المذكور؟

A- Output encoding
B- Blacklist validation
C- Whitelist validation
D- Enforce least privileges
Larry, a security professional in an organization, has noticed some abnormalities in the user accounts on a web server. To thwart evolving attacks, he decided to harden the security of the web server by adopting a few countermeasures to secure the accounts on the web server.
Which of the following countermeasures must Larry implement to secure the user accounts on the web server?
 

قام لاري، خبير أمني في مؤسسة، بملاحظة بعض الشائعات غير الطبيعية في حسابات المستخدمين على خادم الويب. للدفاع عن الهجمات المتطورة، قرر لاري تقوية الأمان لخادم الويب بتطبيق بعض الإجراءات المضادة لأمان حسابات المستخدمين على خادم الويب.

ما هي الإجراءات المضادة التي يجب على لاري تطبيقها لأمان حسابات المستخدمين على خادم الويب؟

A- Enable all non-interactive accounts that should exist but do not require interactive login
B- Enable unused default user accounts created during the installation of an OS
C- Limit the administrator or root-level access to the minimum number of users
D- Retain all unused modules and application extensions
An organization is performing a vulnerability assessment for mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server, or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests.
What is the type of vulnerability assessment solution that James employed in the above scenario?
 
تقوم منظمة ما بإجراء تقييم للضعف من أجل التخفيف من التهديدات. قام James، وهو مختبر اختراق،
بمسح المؤسسة من خلال إعداد قائمة بالبروتوكولات الموجودة على أجهزة المؤسسة لاكتشاف أي المنافذ يتم إرفاقها
بخدمات مثل خادم البريد الإلكتروني أو خادم ويب أو خادم قاعدة بيانات. وبعد تحديد الخدمات، اختار نقاط الضعف في 
كل جهاز وبدأ في تنفيذ الاختبارات ذات الصلة فقط.
 
ما هو نوع حل تقييم نقاط الضعف الذي استخدمه جيمس في السيناريو أعلاه؟
A- Service-based solutions
B- Tree-based assessment
C- Inference-based assessment
D- Product-based solutions
Jake, a professional hacker, installed spyware on a target iPhone to spy on the target user's activities. He can take complete control of the target mobile device by jailbreaking the device remotely and record audio, capture screenshots, and monitor all phone calls and SMS messages.

What is the type of spyware that Jake used to infect the target device? 

 

قام جيك، وهو مخترق محترف، بتركيب برامج تجسس على هاتف آي فون بهدف للتجسس على أنشطة المستخدم . يمكنه التحكم التام في الجهاز المحمول  عن طريق أختراق الجهاز عن بعد وتسجيل الصوت، والتقاط لقطات الشاشة، ومراقبة جميع المكالمات الهاتفية ورسائل الرسائل القصيرة.

ما نوع برامج التجسس التي استخدمها جيك لاصابة الجهاز المستهدف؟ 

A- DroidSheep
B- Androrat
C- Trident
D- Zscaler

Consider the following Nmap output: 

Starting Nmap X.XX (http://nmap.org) at XXX-XX-XX XX:XX EDT  

Nmap scan report for 192.168.1.42 Host is up (0.00023s latency). 

Not shown: 932 filtered ports, 56 closed ports 

PORT STATE SERVICE  

21/tcp open ftp 

22/tcp open ssh 

25/tcp open smtp 

53/tcp open domain 

80/tcp open http 

110/tcp open pop3 

143/tcp open imap 

443/tcp open https 

465/tcp open smtps 

587/tcp open submission 

993/tcp open imaps 

995/tcp open pop3s 

Nmap done: 1 IP address (1 host up) scanned in 3.90 seconds 

What command-line parameter could you use to determine the type and version number of the web  server? 

 

ما هي معاملات سطر الأوامر التي يمكنك إستخدامها لتحديد نوع خادم الويب ورقم إصداره ؟ 

A- -sV
B- -sS
C- -Pn
D- -V
Attacker Simon targeted the communication network of an organization and disabled the security controls of Net NTLM by modifying the value of LMC Compatibility Level, NTLM Min Client Sec, and Restrict Sending NTLM Traffic. He then extracted all the non-network logon tokens from all the active processes to masquerade as a legitimate user to launch further attacks.
What is the type of attack performed by Simon?
 
قام المهاجم سيمون باستهداف شبكة الاتصال لإحدى المؤسسات وتعطيل عناصر تحكم الأمان ل Net NTLM بتعديل قيمة مستوى توافق LMC و NTLM Min Client Sec وتقييد إرسال NTLM. ثم قام باستخراج جميع الرموز المميزة لتسجيل الدخول غير المتصلة بالشبكة من جميع العمليات النشطة للتمويه كمستخدم شرعي لشن المزيد من الهجمات.
 
ما هو نوع الهجوم الذي قام به سيمون ؟
A- Dictionary attack
B- Combinator attack
C- Rainbow table attack
D- Internal monologue attack
When considering how an attacker may exploit a web server, what is web server footprinting?
 
عند التفكير في كيفية إستغلال المهاجم لخادم ويب، ما هي جمع المعلومات خادم الويب؟
A- When an attacker implements a vulnerability scanner to identify weaknesses
B- When an attacker uses a brute-force attack to crack a web-server password
C- When an attacker gathers system-level data, including account details and server names
D- When an attacker creates a complete profile of the site's external links and file structures
What useful information is gathered during a successful Simple Mail Transfer Protocol (SMTP) enumeration?
 
ما هي المعلومات المفيدة التي يتم جمعها أثناء تعداد ناجح لبروتوكول نقل البريد البسيط (SMTP)؟
A- Reveals the daily outgoing message limits before mailboxes are locked
B- The internal command RCPT provides a list of ports open to message traffic.
C- The two internal commands VRFY and EXPN provide a confirmation of valid users, email addresses, aliases, and mailing lists.
D- A list of all mail proxy server addresses used by the targeted host
You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?
 
أنت تحاول تشغيل فحص منفذ Nmap على خادم ويب. أي من الأوامر التالية سيؤدي إلى فحص المنافذ الشائعة بأقل قدر من الضوضاء من أجل التهرب من IDS؟
A- nmap -A - Pn
B- nmap -A --host-timeout 99 -T1
C- nmap -sT -O -TO
D- nmap -sP -p-65535 -T5
A security analyst uses Zenmap to perform an ICMP timestamp ping scan to acquire information related to the current time from the target host machine.
Which of the following Zenmap options must the analyst use to perform the ICMP timestamp ping scan?
 
يستخدم محلل الأمان Zenmap لإجراء فحص ping للطابع الزمني لـ ICMP للحصول على المعلومات المتعلقة بالوقت الحالي من الجهاز المضيف الهدف.
أي من خيارات Zenmap التالية يجب أن يستخدمها المحلل لإجراء فحص ping للطابع الزمني لـ ICMP؟
A- -PU
B- -PY
C- -PP
D- -Pn
Elante company has recently hired James as a penetration tester. He was tasked with performing enumeration on an organization's network. In the process of enumeration, James discovered a service that is accessible to external sources. This service runs directly on port 21.
What is the service enumerated by James in the above scenario?
 
قامت شركة Elante مؤخرًا بتعيين جيمس كمختبر اختراق. تم تكليفه بإجراء العد على شبكة المنظمة. في عملية العد ، اكتشف جيمس خدمة يمكن الوصول إليها من قبل المصادر الخارجية. تعمل هذه الخدمة مباشرة على المنفذ 21.
ما هي الخدمة التي ذكرها جيمس في السيناريو أعلاه؟
A- File Transfer Protocol (FTP)
B- Network File System (NFS)
C- Border Gateway Protocol (BGP)
D- Remote procedure call (RPC)
Which of the following allows attackers to draw a map or outline the target organization's network infrastructure to know about the actual environment that they are going to hack.
 
أي مما يلي يسمح للمهاجمين برسم خريطة أو تحديد البنية التحتية لشبكة المؤسسة المستهدفة للتعرف على البيئة الفعلية التي سيقومون باختراقها.
A- Scanning networks
B- Vulnerability analysis
C- Malware analysis
D- Enumeration
Roma is a member of a security team. She was tasked with protecting the internal network of an organization from imminent threats. To accomplish this task, Roma fed threat intelligence into the security devices in a digital format to block and identify inbound and outbound malicious traffic entering the organization's network.
Which type of threat intelligence is used by Roma to secure the internal network?
 
روما عضو في فريق أمني. تم تكليفها بحماية الشبكة الداخلية لمنظمة من التهديدات الوشيكة. لإنجاز هذه المهمة ، قام فريق روما بإدخال معلومات استخباراتية عن التهديدات إلى الأجهزة الأمنية بتنسيق رقمي لحظر وتحديد حركة المرور الخبيثة الواردة والصادرة التي تدخل شبكة المنظمة.
ما نوع معلومات التهديد التي يستخدمها فريق روما لتأمين الشبكة الداخلية؟
A- Strategic threat intelligence
B- Operational threat intelligence
C- Tactical threat intelligence
D- Technical threat intelligence

Harris is attempting to identify the OS running on his target machine. He inspected the initial  TTL in the IP header and the related TCP window size and obtained the following results: 

TTL: 64 

Window Size: 5840 

What is the OS running on the target machine? 

 

يحاول هاريس تحديد نظام التشغيل الذي يعمل على الجهاز المستهدف. قام بفحص TTL الأولي في رأس IP وحجم نافذة TCP ذات الصلة وحصل على النتائج التالية:
TTL: 64
حجم النافذة: 5840
ما هو نظام التشغيل الذي يعمل على الجهاز المستهدف؟
A- Solaris OS
B- Linux OS
C- Mac OS
D- Windows OS
To hide the file on a Linux system, you have to start the filename with a specific character. What is the character?
 
لإخفاء الملف على نظام Linux ، يجب أن تبدأ اسم الملف بحرف معين. ما هو الحرف؟
A- Tilde (-)
B- Period (.)
C- Exclamation mark (!)
D- Underscore (_)

What is the following command used for? 

sqlmap.py-u "http://10.10.1.20/?p=1&forumaction=search" -dbs
A- Creating backdoors using SQL injection
B- Searching database statements at the IP address given
C- Enumerating the databases in the DBMS for the URL
D- Retrieving SQL statements being executed on the database
Jack, a professional hacker, targets an organization and performs vulnerability scanning on the target web server to identify any possible weaknesses, vulnerabilities, and misconfigurations. In this process jack uses an automated tool that eases his work and performs vulnerability scanning to find hosts, services, and other vulnerabilities in the target server.
Which of the following tools is used by Jack to perform vulnerability scanning?
 
جاك، مخترق محترف، يستهدف منظمة ويقوم بإجراء مسح لمواطن الضعف على خادم الويب الهدف لتحديد أي نقاط ضعف، وخلل في التكوينات. في هذه العملية، يستخدم أداة آلية تعمل على تسهيل عمله وإجراء مسح لمواطن الضعف للعثور على المضيفين 
والخدمات ومواطن الضعف الأخرى في الخادم الهدف.
ما هي إحدى الأدوات التالية التي يستخدمها جاك لإجراء مسح الضعف؟
A- Netsparker
B- Infoga
C- NCollector Studio
D- WebCopier Pro
Henry is a penetration tester who works for XYZ organization. While performing enumeration on a client organization, he queries the DNS server for a specific cached DNS record. Further, by using this cached record, he determines the sites recently visited by the organization’s user.
What is the enumeration technique used by Henry on the organization?
 
هنري هو أختصاصي الاختراق الذي يعمل في منظمة XYZ. أثناء إجراء التعداد على مؤسسة ، يستفسر من خادم DNS عن سجل DNS معين مخزن مؤقتا. بالإضافة إلى ذلك، من خلال إستخدام هذا السجل المخزن مؤقتا، فإنه يحدد المواقع التي زارها مستخدم المؤسسة مؤخرا.
ما هي تقنية التعداد التي استخدمها هنري في المؤسسة؟
A- DNS zone walking
B- DNS cache poisoning
C- DNSSEC zone walking
D- DNS cache snooping
Thomas, a cloud security professional, is performing security assessment on cloud services to identify any loopholes. He detects a vulnerability in a bare-metal cloud server that can enable hackers to implant malicious backdoors in its firmware. He also identified that an installed backdoor can persist even if the server is reallocated to new clients or businesses that use it as an laaS.
What is the type of cloud attack that can be performed by exploiting the vulnerability discussed in the above scenario?
 
 
يقوم توماس، وهو متخصص في أمن الشبكات، بإجراء تقييم أمني لخدمات الشبكات لتحديد أي ثغرات. فهو يكتشف نقطة ضعف في سحابة الأجهزة الخادمة التي تعمل والتي يمكن قراصنة الشبكة من زرع أبواب خلفية خبيثة في برمجياتها الثابتة. كما حدد أن الباب الخلفي المثبت يمكن أن يستمر حتى إذا تم إعادة توزيع الخادم على عملاء جدد أو شركات جديدة تستخدمه كخدمة مؤقتة.
 
ما هو نوع الهجمة السحابية التي يمكن تنفيذها عن طريق إستغلال الضعف الذي تمت مناقشته في السيناريو المذكور أعلاه؟
A- Man-in-the-cloud (MITC) attack
B- Cloud cryptojacking
C- Metadata spoofing attack
D- Cloudborne attack
An attacker utilizes a Wi-Fi Pineapple to run an access point with a legitimate-looking SSID for a nearby business in order to capture the wireless password.
What kind of attack is this?
 
 
يستخدم مهاجم جهاز Wi-Fi لتشغيل نقطة وصول مزودة بمعرف SSID شرعية للعمل في مكان قريب من أجل التقاط كلمة المرور اللاسلكية. ما نوع هذا الهجوم؟
A- Phishing attack
B- MAC spoofing attack
C- EviI-twin attack
D- War driving attack
The security team of Debry Inc. Decided to upgrade Wi-Fi security to thwart attacks such as dictionary attacks and key recovery attacks. For this purpose, the security team started implementing cutting-edge technology that uses a modern key establishment protocol called the simultaneous authentication of equals (SAE), also known as dragonfly key exchange, which replaces the PSK concept.
What is the Wi-Fi encryption technology implemented by Debry Inc.?
 
قرر فريق الأمن التابع لشركة Debry Inc. ترقية أمان Wi-Fi لإحباط هجمات مثل هجمات القواميس وهجمات إسترداد البيانات الرئيسية. لهذا الغرض، بدأ فريق الأمن في تنفيذ تكنولوجيا متطورة تستخدم بروتوكول إنشاء مفاتيح حديث يسمى المصادقة المتزامنة (SAE)، والمعروف أيضا باسم تبادل مفاتيح ، الذي يحل محل مفهوم PSK.
 
ما هي تقنية تشفير Wi-Fi التي تنفذها شركة Debry Inc.؟
A- WPA
B- WPA2
C- WEP
D- WPA3
Mike, a security engineer, was recently hired by BigFox Ltd. The company recently experienced disastrous DoS attacks. The management had instructed Mike to build defensive strategies for the company's IT infrastructure to thwart DoS/DDoS attacks. Mike deployed some countermeasures to handle jamming and scrambling attacks.
What is the countermeasure Mike applied to defend against jamming and scrambling attacks?
 
 
مايك، مهندس أمن، تم تعيينه مؤخرا من قبل شركة بيج فوكس المحدودة . طلبت الإدارة من مايك بناء إستراتيجيات دفاعية لهجمات  البنية التحتية لتكنولوجيا المعلومات في الشركة لإحباط هجمات DoS/DDoS. أستخدم مايك بعض التدابير المضادة للتعامل مع التشويش وهجمات الاندفاع.
 
ما هو الإجراء المضاد الذي طبقه مايك للدفاع ضد التشويش وهجمات الاندفاع؟
A- Allow the usage of functions such as gets and strcpy
B- Disable TCP SYN cookie protection
C- Implement cognitive radios in the physical layer
D- Allow the transmission of all types of addressed packets at the ISP level
A post-breach forensic investigation revealed that a known vulnerability in Apache Struts was to blame for the Equifax data breach that affected 143 million customers. A fix was available from the software vendor for several months prior to the intrusion. This is likely a failure in which of the following security processes?
 
 
كشف تحقيق الطب الشرعى بعد الاختراق أن نقطة ضعف معروفة في شركة أباتشى ستورتس هى المسئولة عن انتهاك بيانات شركة ايكوفاكس الذى أصاب 143 مليون عميل. تم توفير إصلاح من مورد البرامج لعدة أشهر قبل الاختراق. من المحتمل أن يكون هذا فشلا في أي من العمليات الأمنية التالية؟
A- Patch management
B- Security awareness training
C- Vendor risk management
D- Secure development lifecycle
This type of injection attack does not show any error message. It is difficult to exploit as it returns information when the application is given SQL payloads that elicit a true or false response from the server. By observing the response, an attacker can extract sensitive information.
What type of attack is this?
 
لا يظهر هذا النوع من هجمات الحقن أي رسالة خطأ. من الصعب إستغلالها لأنها ترجع معلومات عندما يتم إعطاء التطبيق أحمال SQL التي تستقطب إستجابة صحيحة أو خاطئة من الخادم. بمراقبة الاستجابة، يمكن للمهاجم إستخلاص معلومات حساسة.
 
ما نوع هذا الهجوم؟
A- Union SQL injection
B- Time-based SQL injection
C- Blind SQL injection
D- Error-based SQL injection
Attacker Steve targeted an organization’s network with the aim of redirecting the company's web traffic to another malicious website. To achieve this goal, Steve performed DNS cache poisoning by exploiting the vulnerabilities in the DNS server software and modified the original IP address of the target website to that of a fake website.
What is the technique employed by Steve to gather information for identity theft?
 
استهدف المهاجم ستيف شبكة إحدى المنظمات بهدف إعادة توجيه حركة المرور على شبكة الإنترنت للشركة إلى موقع آخر ضار. ولتحقيق هذا الهدف، قام ستيف بتعديل ذاكرة التخزين المؤقت ل DNS عن طريق إستغلال نقاط الضعف في برنامج خادم DNS وتعديل عنوان IP الأصلي لموقع الويب الهدف إلى عنوان موقع ويب مزيف.
 
ما هي التقنية التي يستخدمها ستيف لجمع المعلومات لسرقة الهوية؟
A- Wardriving
B- Pretexting
C- Pharming
D- Skimming
Techno Security Inc. Recently hired John as a penetration tester. He was tasked with identifying open ports in the target network and determining whether the ports are online and any firewall rule sets are encountered. John decided to perform a TCP SYN ping scan on the target network.
Which of the following Nmap commands must John use to perform the TCP SYN ping scan?
 
قامت شركة Techno Security Inc. مؤخرا بتوظيف جون كمختبر إختراق. وكلف بتحديد المنافذ المفتوحة في الشبكة المستهدفة وتحديد ما إذا كانت المنافذ متصلة بالإنترنت وما إذا كانت هناك مجموعات قواعد لجدار الحماية. قرر جون إجراء فحص فحص TCP SYN على الشبكة المستهدفة.
 
أي من أوامر Nmap التالية يجب أن يستخدمها John لتنفيذ فحص TCP SYN؟
A- nmap -sn -PP < target IP address >
B- nmap -sn -PS < target IP address >
C- nmap -sn -PO < target IP address >
D- nmap -sn -PA < target IP address >
Which of the following types of SQL injection attacks extends the results returned by the original query, enabling attackers to run two or more statements if they have the same structure as the original one?
 
أي من الأنواع التالية من هجمات حقن SQL توسع النتائج التي تم إرجاعها من خلال الاستعلام الأصلي، مما يمكن المهاجمين من تشغيل بيانين أو أكثر إذا كان لديهم نفس البنية التي كانت عليها البنية الأصلية؟
A- Blind SQL injection
B- Error-based injection
C- Union SQL injection
D- Boolean-based blind SQL injection
John, a security analyst working for an organization, found a critical vulnerability on the organization’s LAN that allows him to view financial and personal information about the rest of the employees. Before reporting the vulnerability, he examines the information shown by the vulnerability for two days without disclosing any information to third parties or other internal employees. He does so out of curiosity about the other employees and may take advantage of this information later.
What would John be considered as?
 
وجد جون، وهو محلل أمني يعمل في إحدى المؤسسات، نقطة ضعف خطيرة في الشبكة المحلية للمنظمة تسمح له بالاطلاع على المعلومات المالية والشخصية عن باقي الموظفين. قبل الإبلاغ عن الضعف، يدرس المعلومات التي تظهر بسبب الضعف لمدة يومين دون الكشف عن أي معلومات إلى أطراف ثالثة أو موظفين داخليين آخرين. ويفعل ذلك بدافع الفضول عن الموظفين الآخرين وقد يستفيد من هذه المعلومات لاحقا.
 
ماذا كان جون سيعتبر؟
A- Gray hat
B- Black hat
C- Cybercriminal
D- White hat
Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations. Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA. In this context, what can you say?
 
استنتج بوب، وهو مسؤول النظام في TPNQM SA، ذات يوم أنه لا توجد حاجة إلى DMZ إذا قام بتهيئة جدار الحماية بشكل صحيح للسماح بالوصول فقط إلى الخوادم/المنافذ، والتي يمكن أن يكون لها وصول مباشر إلى الإنترنت، ومنع الوصول إلى محطات العمل. كما استنتج بوب أن DMZ تصبح منطقية فقط عندما يتوفر جدار حماية على قدر من الاستبانة، وهو ما لا ينطبق على DMZ من TPNQM SA. وفي هذا السياق، ماذا يمكنكم ان تقولوا؟
A- Bob is partially right. DMZ does not make sense when a stateless firewall is available.
B- Bob can be right since DMZ does not make sense when combined with stateless firewalls.
C- Bob is partially right. He does not need to separate networks if he can create rules by destination IPs, one by one.
D- Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations.
You have been authorized to perform a penetration test against a website. You want to use Google dorks to footprint the site but only want results that show file extensions.
What Google dork operator would you use?
 
تم تكليفك لإجراء إختبار أختراق لموقع ويب. ترغب في إستخدام مهام Google لجمع معلومات عن الموقع ولكن تريد فقط نتائج تظهر امتدادات الملفات.
 
أي مشغل قوقل ل سوف تستخدم؟
A- inurl site
B- filetype
C- ext
D- wxt
Juliet, a security researcher in an organization, was tasked with checking for the authenticity of images to be used in the organization's magazines. She used these images as a search query and tracked the original source and details of the images, which included photographs, profile pictures.
Which of the following footprinting techniques did Rachel use to finish her task?
 
كلفت جولييت، وهي باحثة أمنية في إحدى المنظمات، بالتحقق من الصور التي ستستخدم في جريدة المنظمة. تم إستخدام هذه الصور كاستعلام بحث وتعقب المصدر الأصلي وتفاصيل الصورة، التي تتضمن الصور، ملفات التعريف . أي من الاساليب التالية لجمع المعلومات أستخدمتها لإتمام مهمتها؟
A- Reverse image search
B- Google advanced search
C- Advanced image search
D- Meta search engines
What would be the purpose of running "wget 192.168.0.15 -q -S" against a web server? £ Performing content enumeration on the web server to discover hidden folders Flooding the web server with requests to perform a DoS attack Downloading all the contents of the web page locally for further examination Using wget to perform banner grabbing on the webserver.
Which Nmap switch helps evade IDS or firewalls?
 
ما هو الغرض من تشغيل "wget 192.168.0.15 -q -s" ضد خادم ويب؟
 
تنفيذ تعداد المحتوى على خادم الويب لاكتشاف المجلدات المخفية
 
يغمر خادم الويب بطلبات لتنفيذ هجوم DoS
 
تنزيل كافة محتويات صفحة الويب محليا لإجراء مزيد من الفحص باستخدام wget لتنفيذ التقاط الشعارات على خادم الويب.
 
أي مفتاح Nmap يساعد في تجنب IDS أو جدران الحماية؟
A- -D
B- -0N/-0X/-0G
C- T
D- -n/-R
Peter, a system administrator working at a reputed IT firm, decided to work from his home and login remotely. Later, he anticipated that the remote connection could be exposed to session hijacking. To curb this possibility, he implemented a technique that creates a safe and encrypted tunnel over a public network to securely send and receive sensitive information and prevent hackers from decrypting the data flow between the endpoints.
What is the technique followed by Peter to send files securely through a remote connection?
 
قرر بيتر، وهو مدير نظام يعمل في شركة معروفة في مجال تقنية المعلومات، العمل من منزله وتسجيل الدخول عن بعد. وفي وقت لاحق، توقع أن الاتصال عن بعد قد يتعرض لاختطاف جلسة العمل. وللحد من هذا الاحتمال، قام بتنفيذ تقنية لخلق نفق آمن ومشفر على شبكة عامة لإرسال واستقبال المعلومات الحساسة بأمان ومنع المتسللين من فك تشفير تدفق البيانات بين نقاط النهاية.
 
ما هي التقنية التي يتبعها بيتر لإرسال الملفات بأمان عبر اتصال بعيد؟
A- VPN
B- SMB signing
C- DMZ
D- Switch network
Shiela is an information security analyst working at HiTech Security Solutions. She is performing service version discovery using Nmap to obtain information about the running services and their versions on a target system.
Which of the following Nmap options must she use to perform service version discovery on the target host?
 
شيلا محلل لأمن المعلومات يعمل في شركة HiTech Security Solutions. تقوم بإجراء اكتشاف إصدار الخدمة باستخدام Nmap للحصول على معلومات حول الخدمات قيد التشغيل وإصداراتها على النظام الهدف.
 
أي من خيارات Nmap التالية يجب أن تستخدمها لتنفيذ اكتشاف إصدار الخدمة على المضيف الهدف؟
A- -sV
B- -sF
C- -sX
D- -sN
Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the response of a honeypot to a manual SYN request.
Which of the following techniques is employed by Dayn to detect honeypots?
 
وكان المهاجم دين يريد ان يكتشف ما إذا كانت اية قدور عسل مثبتة في شبكة الهدف. لهذا الغرض، أستخدم طريقة أخذ بصمات TCP على أساس الوقت للتحقق من الاستجابة لكمبيوتر عادي واستجابة قاعدة عسل لطلب SYN يدوي. أي من التقنيات التالية يستخدمها دين لاكتشاف قدور العسل؟
 
 
داين أحد المهاجمين أراد اكتشاف ما إذا تم تثبيت أي مواضع جذب في شبكة مستهدفة. لهذا الغرض ، استخدم طريقة بصمة TCP المستندة إلى الوقت للتحقق من صحة الاستجابة لجهاز كمبيوتر عادي واستجابة موضع الجذب لطلب SYN اليدوي.
 
أي من الأساليب التالية تستخدمها داين لاكتشاف مواضع الجذب؟
A- Detecting the presence of Snortjnline honeypots
B- Detecting the presence of Honeyd honeypots
C- Detecting honeypots running on VMware
D- Detecting the presence of Sebek-based honeypots
BitLocker encryption has been implemented for all the Windows-based computers in an organization. You are concerned that someone might lose their cryptographic key. Therefore, a mechanism was implemented to recover the keys from Active Directory.
What is this mechanism called in cryptography?
 
تم تطبيق تشفير BitLocker لكافة أجهزة الكمبيوتر التي تستند إلى Windows في إحدى المؤسسات. أنت قلق من أن شخص ما قد يفقد مفتاحه الشفري. لذلك، تم تنفيذ آلية لاسترداد المفاتيح من Active Directory. ما اسم هذه الآلية في التشفير؟
A- Key archival
B- Certificate rollover
C- Key escrow
D- Key renewal
Mary, a penetration tester, has found password hashes in a client system she managed to breach. She needs to use these passwords to continue with the test, but she does not have time to find the passwords that correspond to these hashes.
Which type of attack can she implement in order to continue?
 
وجدت ماري، وهي مختبرة إختراقات كلمة المرور في نظام العميل الذي تمكنت من إختراقه. تحتاج إلى إستخدام كلمات المرور هذه لمتابعة الاختبار، ولكن ليس لديها الوقت للعثور على كلمات المرور التي تتوافق مع هذه التجزئة.
 
أي نوع من الهجمات يمكنها تنفيذه من أجل الاستمرار؟
A- Internal monologue attack
B- Pass the ticket
C- Pass the hash
D- LLMNR/NBT-NS poisoning
Upon establishing his new startup, Tom hired a cloud service provider (CSF service and wanted to move to another.
What part of the contract might prevent him from doing so?
 
عند تأسيس شركة بدء تشغيل جديدة، استأجر توم موفر خدمة السحاب (خدمة CSF) وأراد الانتقال إلى آخر. أي جزء من العقد قد يمنعه من ذلك؟
A- Lock-down
B- Lock-up
C- Lock-in
D- Virtualization
Ben purchased a new smartphone and received some updates on it through the OTA method. He received two messages: one with a PIN from the network operator and another asking him to enter the PIN received from the operator. As soon as he entered the PIN, the smartphone started functioning in an abnormal manner.
What is the type of attack performed on Ben in the above scenario?
 
اشترى بن هاتفا ذكيا جديدا وتلقى بعض التحديثات عليه من خلال طريقة OTA. تلقى رسالتين: إحداهما تحمل رقم التعريف الشخصي من مشغل الشبكة، وأخرى تطلب منه إدخال رقم التعريف الشخصي الذي تلقاه من المشغل. بمجرد دخوله رمز PIN، بدأ الهاتف الذكي يعمل بطريقة غير طبيعية. ما هو نوع الهجوم الذي شن على بن في السيناريو المذكور اعلاه؟
A- Bypass SSL pinning
B- Advanced SMS phishing
C- Phishing
D- Tap 'n ghost attack
According to the NIST cloud deployment reference architecture, which of the following provides connectivity and transport services to consumers?
 
وفقا للبنية المرجعية لنشر شبكات NIST، أي مما يلي يوفر خدمات الاتصال والنقل للمستهلكين؟
A- Cloud connector
B- Cloud broker
C- Cloud provider
D- Cloud carrier
Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as?
 
غالبا ما يرفع المتسللون مستوى الثقة في رسالة التصيد الاحتيالي عن طريق تصميم البريد الإلكتروني ليبدو مشابها للبريد الإلكتروني الداخلي المستخدم من قبل الشركة الهدف. ويشمل ذلك إستخدام الشعارات والتنسيق وأسماء الشركة المستهدفة. غالبا ما تستخدم رسالة التصيد الاحتيالي اسم الرئيس التنفيذي للشركة أو الرئيس أو المديرين. يعرف الوقت الذي يقضيه المخترق في إجراء البحوث لتحديد هذه المعلومات عن الشركة باسم؟
A- Exploration
B- Investigation
C- Reconnaissance
D- Enumeration
Leverox Solutions hired Arnold, a security professional, for the threat intelligence process. Arnold collected information about specific threats against the organization. From this information, he retrieved contextual information about security events and incidents that helped him disclose potential risks and gain insight into attacker methodologies. He collected the information from sources such as humans, social media, and chat rooms as well as from events that resulted in cyberattacks. In this process, he also prepared a report that includes identified malicious activities, recommended courses of action, and warnings for emerging attacks.
What is the type of threat intelligence collected by Arnold in the above scenario?
 
وظفت شركة Leverox Solutions أرنولد، وهو متخصص في شؤون الأمن، للقيام بعملية الإستخبارات المتعلقة بالتهديدات. جمع أرنولد معلومات عن تهديدات محددة ضد المنظمة. ومن هذه المعلومات، استرجع معلومات سياقية حول الأحداث والحوادث الأمنية التي ساعدته على الكشف عن المخاطر المحتملة واكتساب نظرة ثاقبة على منهجيات المهاجمين. جمع المعلومات من مصادر مثل البشر، وسائل التواصل الاجتماعي، وغرف الدردشة، وكذلك من الأحداث التي أدت إلى الهجمات الإلكترونية. وفي هذه العملية، أعد أيضا تقريرا يتضمن أنشطة خبيثة محددة، ومسارات عمل موصى بها، وتحذيرات من الهجمات الناشئة.
 
ما هو نوع المعلومات الاستخبارية التي جمعها أرنولد حول التهديد في السيناريو أعلاه؟
A- Strategic threat intelligence
B- Tactical threat intelligence
C- Technical threat intelligence
D- Operational threat intelligence
Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the information, he successfully performed an attack on the target government organization without being traced.
Which of the following techniques is described in the above scenario?
 
لويس، وهو أحد المخترقين المحترفين، قد أستخدم أدوات متخصصة أو محركات بحث لتشفير كل نشاطه في التصفح والتصفح دون ذكر اسمه للحصول على معلومات حساسة/مخفية عن قواعد البيانات الحكومية أو الفيدرالية الرسمية. وبعد جمع المعلومات، نفذ بنجاح هجوما على المنظمة الحكومية المستهدفة دون أن يتم تعقبه.
 
أي من التقنيات التالية موصوفة في السيناريو أعلاه؟
A- VPN footprinting
B- VoIP footprinting
C- Dark web footprinting
D- Website footprinting
Allen, a professional pen tester, was hired by XpertTech Solutions to perform an attack simulation on the organization's network resources. To perform the attack, he took advantage of the NetBIOS API and targeted the NetBIOS service. By enumerating NetBIOS, he found that port 139 was open and could see the resources that could be accessed or viewed on a remote system. He came across many NetBIOS codes during enumeration.
Identify the NetBIOS code used for obtaining the messenger service running for the logged-in user?
 
 ألين، وهو مختبر قلم محترف، تم تعيين من قبل شركة XpertTech Solutions لإجراء محاكاة هجوم على موارد الشبكة في المؤسسة. ولتنفيذ الهجوم، استغل واجهة برمجة تطبيقات NetBIOS واستهدف خدمة NetBIOS. من خلال تعداد NetBIOS، وجد أن المنفذ 139 مفتوح ويمكن رؤية الموارد التي يمكن الوصول إليها أو عرضها على نظام بعيد. لقد صادف العديد من رموز NetBIOS أثناء التعداد.
 
هل تريد تحديد كود NetBIOS المستخدم للحصول على تشغيل خدمة Messenger للمستخدم الذي قام بتسجيل الدخول؟
A- <20>
B- <1B>
C- <00>
D- <03>
Kate dropped her phone and subsequently encountered an issue with the phone’s internal speaker. Thus, she is using the phone's loudspeaker for phone calls and other activities. Bob, an attacker, takes advantage of this vulnerability and secretly exploits the hardware of Kate's phone so that he can monitor the loudspeaker's output from data sources such as voice assistants, multimedia messages, and audio files by using a malicious app to breach speech privacy.
What is the type of attack Bob performed on Kate in the above scenario?
 
أسقطت كيت هاتفها، ثم واجهت مشكلة مع مكبر الهاتف الداخلي. وهكذا، تستعمل مكبر الصوت في الهاتف للمكالمات الهاتفية والنشاطات الاخرى. ويستغل بوب، وهو مهاجم، هذا الضعف ويستغل سرا أجهزة هاتف كيت حتى يتمكن من مراقبة مخرجات مكبر الصوت من مصادر البيانات مثل المساعدين الصوتي ورسائل الوسائط المتعددة والملفات الصوتية باستخدام تطبيق ضار لاختراق خصوصية الكلام.
 
ما هو نوع الهجوم الذي نفذه بوب على كيت في السيناريو أعلاه؟
 
 
A- SIM card attack
B- Spearphone attack
C- Man-in-the-disk attack
D- aLTEr attack
You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet.
What is the recommended architecture in terms of server placement?
A- All three servers need to face the Internet so that they can communicate between themselves
B- A web server facing the Internet, an application server on the internal network, a database server on the internal network
C- All three servers need to be placed internally
D- A web server and the database server facing the Internet, an application server on the internal network
Mirai malware targets loT devices. After infiltration, it uses them to propagate and create botnets that are then used to launch which types of attack?
A- Password attack
B- DDoS attack
C- Birthday attack
D- QMITM attack
Josh has finished scanning a network and has discovered multiple vulnerable services. He knows that several of these usually have protections against external sources but are frequently susceptible to internal users. He decides to draft an email, spoof the sender as the internal IT team, and attach a malicious file disguised as a financial spreadsheet. Before Josh sends the email, he decides to investigate other methods of getting the file onto the system. For this particular attempt, what was the last stage of the cyber kill chain that Josh performed?
A- Reconnaissance
B- Delivery
C- Exploitation
D- Weaponization
Jude, a pen tester, examined a network from a hacker's perspective to identify exploits and vulnerabilities accessible to the outside world by using devices such as firewalls, routers, and servers. In this process, he also estimated the threat of network security attacks and determined the level of security of the corporate network.
What is the type of vulnerability assessment that Jude performed on the organization?
A- Host-based assessment
B- Application assessment
C- Passive assessment
D- External assessment
Jack, a disgruntled ex-employee of Incalsol Ltd., decided to inject fileless malware into Incalsol's systems. To deliver the malware, he used the current employees' email IDs to send fraudulent emails embedded with malicious links that seem to be legitimate. When a victim employee clicks on the link, they are directed to a fraudulent website that automatically loads Flash and triggers the exploit.
What is the technique used by Jack to launch the fileless malware on the target systems?
A- Legitimate applications
B- In-memory exploits
C- Phishing
D- Script-based injection
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.
What is the most likely cause?
A- Proper chain of custody was not observed while collecting the logs.
B- The security breach was a false positive.
C- The attacker altered or erased events from the logs.
D- The network devices are not all synchronized.
Which rootkit is characterized by its function of adding code and/or replacing some of the operating-system kernel code to obscure a backdoor on a system?
A- Library-level rootkit
B- User-mode rootkit
C- Kernel-level rootkit
D- Hypervisor-level rootkit
Tony is a penetration tester tasked with performing a penetration test. After gaining initial access to a target system, he finds a list of hashed passwords.
Which of the following tools would not be useful for cracking the hashed passwords?
A- Hashcat
B- THC-Hydra
C- John the Ripper
D- netcat
Gregory, a professional penetration tester working at Sys Security Ltd., is tasked with performing a security test of web applications used in the company. For this purpose, Gregory uses a tool to test for any security loopholes by hijacking a session between a client and server. This tool has a feature of intercepting proxy that can be used to inspect and modify the traffic between the browser and target application. This tool can also perform customized attacks and can be used to test the randomness of session tokens.
 
Which of the following tools is used by Gregory in the above scenario?
A- Nmap
B- Burp Suite
C- Wireshark
D- CxSAST
Calvin, a software developer, uses a feature that helps him auto-generate the content of a web page without manual involvement and is integrated with SSI directives. This leads to a vulnerability in the developed web application as this feature accepts remote user inputs and uses them on the page. Hackers can exploit this feature and pass malicious SSI directives as input values to perform malicious activities such as modifying and erasing server files.
 
What is the type of injection attack Calvin's web application is susceptible to?
A- Server-side JS injection
B- Server-side template injection
C- Server-side includes injection
D- CRLF injection
A newly joined employee, Janet, has been allocated an existing system used by a previous employee. Before issuing the system to Janet, it was assessed by Martin, the administrator. Martin found that there were possibilities of compromise through user directories, registries, and other system parameters. He also identified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors.
 
What is the type of vulnerability assessment performed by Martin?
A- Host-based assessment
B- Distributed assessment
C- Credentialed assessment
D- Database assessment
A group of hackers were roaming around a bank office building in a city, driving a luxury car. They were using hacking tools on their laptop with the intention to find a free-access wireless network.
 
What is this hacking process known as?
A- Wireless sniffing
B- Wardriving
C- Spectrum analysis
D- GPS mapping
Alex, a cloud security engineer working in Eyecloud Inc. Is tasked with isolating applications from the underlying infrastructure and stimulating communication via well-defined channels. For this purpose, he used an open-source technology that helped him in developing, packaging, and running applications; further, the technology provides PaaS through OS-level virtualization, delivers containerized software packages, and promotes fast software delivery.
 
What is the cloud technology employed by Alex in the above scenario?
A- Serverless computing
B- Virtual machine
C- Zero trust network
D- Docker
Sam, a web developer, was instructed to incorporate a hybrid encryption software program into a web application to secure email messages. Sam used an encryption software, which is a free implementation of the OpenPGP standard that uses both symmetric-key cryptography and asymmetric-key cryptography for improved speed and secure key exchange.
 
What is the encryption software employed by Sam for securing the email messages?
A- SMTP
B- pgp
C- GPG
D- S/MIME
Which of the following tactics uses malicious code to redirect users' web traffic?
A- Spear-phishing
B- spimming
C- Pharming
D- Phishing
John, a professional hacker, targeted CyberSol Inc., an MNC. He decided to discover the loT devices connected in the target network that are using default credentials and are vulnerable to various hijacking attacks. For this purpose, he used an automated tool to scan the target network for specific types of loT devices and detect whether they are using the default, factory-set credentials.
 
What is the tool employed by John in the above scenario?
A- loTSeeker
B- QAT&T IoT Platform
C- loT Inspector
D- Azure IoT Central
Which wireless security protocol replaces the personal pre-shared key (PSK) authentication with Simultaneous Authentication of Equals (SAE) and is therefore resistant to offline dictionary attacks?
A- Bluetooth
B- WPA3-Personal
C- zigBee
D- WPA2-Enterprise
Bob wants to ensure that Alice can check whether his message has been tampered with. He creates a checksum of the message and encrypts it using asymmetric cryptography.
 
What key does Bob use to encrypt the checksum for accomplishing this goal?
A- His own public key
B- His own private key
C- Alice's private key
D- Alice's public key
{"name":"CEH Questions Part (1)", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"-------is a type of phishing that targets high-profile executives such as CEOs, CFOs, politicians, and celebrities who have access to confidential and highly valuable information., Ron, a security professional, was pen testing web applications and SaaS platforms used by his company. While testing, he found a vulnerability that allows hackers to gain unauthorized access to API objects and perform actions such as view, update, and delete sensitive data of the company. What is the API vulnerability revealed in the above scenario?, Scenario: Joe turns on his home computer to access personal online banking. When he enters the URL www.bank.com, the website is displayed, but it prompts him to re-enter his credentials as if he has never visited the site before. When he examines the website URL closer, he finds that the site is not secure and the web address appears different. What type of attack he is experiencing?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Make your own Survey
- it's free to start.