100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CEH V12 Exam Prep (Latest 2024/ 2025 Update) Qs & As | Grade A| 100% Correct (Verified Answers)

Rating
-
Sold
-
Pages
186
Grade
A+
Uploaded on
17-09-2024
Written in
2024/2025

CEH V12 Exam Prep (Latest 2024/ 2025 Update) Qs & As | Grade A| 100% Correct (Verified Answers) Q: Which of the following is the type of violation when an unauthorized individual enters a building following an employee through the employee entrance? A) Reverse Social Engineering B) Tailgating C) Pretexting D) Announced Answer: Tailgating Q: Maria conducted a successful attack and gained access to a linux server. She wants to avoid that NIDS will not catch the succeeding outgoing traffic from this server in the future. Which of the following is the best way to avoid detection of NIDS? A) Protocol Isolation B) Out of band signaling C) Encryption D) Alternate Data Streams Answer: Encryption Q: The company "Usual company" asked a cybersecurity specialist to check their perimeter email gateway security. To do this, the specialist creates a specially formatted email message: From: To: Subject: Test message Date: 5/8/2021 11:22 He sends this message over the Internet, and a "Usual company " employee receives it. This means that the gateway of this company doesn't prevent _____. A) Email phishing B) Email harvesting C) Email spoofing D) Email masquerading Answer: Email Spoofing Q: How works the mechanism of a Boot Sector Virus? A) Moves the MBR to another location on the Random-access memory and copies itself to the original location of the MBR B) Overwrites the original MBR and only executes the new virus code C) Modifies directory table entries to point to the virus code instead of the actual MBR D) Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR Answer: Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR Q: Which of the options presented below is not a Bluetooth attack? A) Bluesnarfing B) Bluesmacking C) Bluejacking D) Bluedriving Answer: Bluedriving Q: Determine the type of SQL injection: SELECT * FROM user WHERE name='x' AND userid IS NULL; --'; A) UNION SQL Injection B) End of Line Comment C) Illegal/Logically Incorrect Query D) Tautology Answer: End of Line Comment Q: Viktor, a white hat hacker, received an order to perform a penetration test from the company "Test us". He starts collecting information and finds the email of an employee of this company in free access. Viktor decides to send a letter to this email, "". He asks the employee to immediately open the "link with the report" and check it. An employee of the company "Test us" opens this link and infects his computer. Thanks to these manipulations, Viktor gained access to the corporate network and successfully conducted a pentest. What type of attack did Viktor use? A) Eavesdropping B) Piggybacking C) Tailgating D) Social engineering Answer: Social Engineering Q: Michael works as a system administrator. He receives a message that several sites are no longer available. Michael tried to go to the sites by URL, but it didn't work. Then he tried to ping the sites and enter IP addresses in the browser and it worked. What problem could Michael identify? A) Traffic is blocked on UDP port 69 B) Traffic is blocked on UDP port 88 C) Traffic is blocked on UDP port 56 D) Traffic is blocked on UDP port 53 Answer: Traffic is blocked on UDP port 53 Q: Benjamin performs a cloud attack during the translation of the SOAP message in the TLS layer. He duplicates the body of the message and sends it to the server as a legitimate user. As a result of these actions, Benjamin managed to access the server resources to unauthorized access. A) Cloud Hopper B) Side-channel C) Cloudborne D) Wrapping Answer: Wrapping Q: Ivan, an evil hacker, conducts an SQLi attack that is based on True/False questions. What type of SQLi does Ivan use? A) DMS-specific SQLi B) Compound SQLi C) Blind SQLi D) Classic SQLi Answer: Blind SQLi

Show more Read less
Institution
CEH V12
Course
CEH V12











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CEH V12
Course
CEH V12

Document information

Uploaded on
September 17, 2024
Number of pages
186
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CEHIV12IExamIPrepI(LatestI2024/I2025I
Update)IQsI&IAsI|IGradeIA|I100%ICorrect
I(VerifiedIAnswers)

Q:IWhichIofItheIfollowingIisItheItypeIofIviolationIwhenIanIunauthorizedIindividualIentersIaI
buildingIfollowingIanIemployeeIthroughItheIemployeeIentrance?

A)IReverseISocialIEngineeringI
B)ITailgatingI
C)IPretextingI
D)IAnnounced


Answer:
Tailgating




Q:IMariaIconductedIaIsuccessfulIattackIandIgainedIaccessItoIaIlinuxIserver.ISheIwantsItoIav
oidIthatINIDSIwillInotIcatchItheIsucceedingIoutgoingItrafficIfromIthisIserverIinItheIfuture.IWh
ichIofItheIfollowingIisItheIbestIwayItoIavoidIdetectionIofINIDS?

A)IProtocolIIsolationI
B)IOutIofIbandIsignalingI
C)IEncryptionI
D)IAlternateIDataIStreams


Answer:
Encryption




Q:ITheIcompanyI"UsualIcompany"IaskedIaIcybersecurityIspecialistItoIcheckItheirIperimeterI
emailIgatewayIsecurity.IToIdoIthis,ItheIspecialistIcreatesIaIspeciallyIformattedIemailImessage:
From:
To:
Subject:ITestImessage

,Date:I5/8/2021I11:22
HeIsendsIthisImessageIoverItheIInternet,IandIaI"UsualIcompanyI"IemployeeIreceivesIit.IThisI
meansIthatItheIgatewayIofIthisIcompanyIdoesn'tIpreventI_____.

A)IEmailIphishingI
B)IEmailIharvestingI
C)IEmailIspoofingI
D)IEmailImasquerading


Answer:
EmailISpoofing




Q:IHowIworksItheImechanismIofIaIBootISectorIVirus?
A)IMovesItheIMBRItoIanotherIlocationIonItheIRandom-
accessImemoryIandIcopiesIitselfItoItheIoriginalIlocationIofItheIMBR
B)IOverwritesItheIoriginalIMBRIandIonlyIexecutesItheInewIvirusIcodeI
C)IModifiesIdirectoryItableIentriesItoIpointItoItheIvirusIcodeIinsteadIofItheIactualIMBR
D)IMovesItheIMBRItoIanotherIlocationIonItheIhardIdiskIandIcopiesIitselfItoItheIoriginalIlocati
onIofItheIMBR


Answer:
MovesItheIMBRItoIanotherIlocationIonItheIhardIdiskIandIcopiesIitselfItoItheIoriginalIlocationI
ofItheIMBR




Q:IWhichIofItheIoptionsIpresentedIbelowIisInotIaIBluetoothIattack?
A)IBluesnarfingI
B)IBluesmackingI
C)IBluejackingI
D)IBluedriving


Answer:
Bluedriving

,Q:IDetermineItheItypeIofISQLIinjection:I
SELECTI*IFROMIuserIWHEREIname='x'IANDIuseridIISINULL;I--';I

A)IUNIONISQLIInjectionI
B)IEndIofILineICommentI
C)IIllegal/LogicallyIIncorrectIQueryI
D)ITautology


Answer:
EndIofILineIComment




Q:IViktor,IaIwhiteIhatIhacker,IreceivedIanIorderItoIperformIaIpenetrationItestIfromItheIcomp
anyI"TestIus".IHeIstartsIcollectingIinformationIandIfindsItheIemailIofIanIemployeeIofIthisIcom
panyIinIfreeIaccess.IViktorIdecidesItoIsendIaIletterItoIthisIemail,I"".IHeIasksIt
heIemployeeItoIimmediatelyIopenItheI"linkIwithItheIreport"IandIcheckIit.IAnIemployeeIofItheI
companyI"TestIus"IopensIthisIlinkIandIinfectsIhisIcomputer.IThanksItoItheseImanipulations,IVi
ktorIgainedIaccessItoItheIcorporateInetworkIandIsuccessfullyIconductedIaIpentest.IWhatItypeIo
fIattackIdidIViktorIuse?

A)IEavesdropping
B)IPiggybackingI
C)ITailgatingI
D)ISocialIengineering


Answer:
SocialIEngineering




Q:IMichaelIworksIasIaIsystemIadministrator.IHeIreceivesIaImessageIthatIseveralIsitesIareIno
IlongerIavailable.IMichaelItriedItoIgoItoItheIsitesIbyIURL,IbutIitIdidn'tIwork.IThenIheItriedItoI
pingItheIsitesIandIenterIIPIaddressesIinItheIbrowserIandIitIworked.IWhatIproblemIcouldIMich
aelIidentify?

A)ITrafficIisIblockedIonIUDPIportI69
B)ITrafficIisIblockedIonIUDPIportI88

, C)ITrafficIisIblockedIonIUDPIportI56
D)ITrafficIisIblockedIonIUDPIportI53


Answer:
TrafficIisIblockedIonIUDPIportI53




Q:IBenjaminIperformsIaIcloudIattackIduringItheItranslationIofItheISOAPImessageIinItheITL
SIlayer.IHeIduplicatesItheIbodyIofItheImessageIandIsendsIitItoItheIserverIasIaIlegitimateIuser.I
AsIaIresultIofItheseIactions,IBenjaminImanagedItoIaccessItheIserverIresourcesItoIunauthorized
Iaccess.I

A)ICloudIHopper
B)ISide-channelI
C)ICloudborneI
D)IWrapping


Answer:
Wrapping




Q:IIvan,IanIevilIhacker,IconductsIanISQLiIattackIthatIisIbasedIonITrue/FalseIquestions.IWha
tItypeIofISQLiIdoesIIvanIuse?

A)IDMS-specificISQLi
B)ICompoundISQLiI
C)IBlindISQLi
D)IClassicISQLi


Answer:
BlindISQLi




Q:IPhillip,IaIcybersecurityIspecialist,IneedsIaItoolIthatIcanIfunctionIasIaInetworkIsniffer,Irec
ordInetworkIactivity,IpreventIandIdetectInetworkIintrusion.IWhichIofItheIfollowingItoolsIisIsui
tableIforIPhillip?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
nurse_steph Rasmussen College
View profile
Follow You need to be logged in order to follow users or courses
Sold
9356
Member since
5 year
Number of followers
5135
Documents
7547
Last sold
1 day ago
Exams, Study guides, Reviews, Notes

All study solutions.

3.9

1673 reviews

5
841
4
296
3
258
2
77
1
201

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions