Which of the following programs is usually targeted at Microsoft Office products? Correct
Ans-Macro virus
How can rainbow tables be defeated? Correct Ans-Password salting
What does the -oX flag do in an Nmap scan Correct Ans-Output the results in XML format
to a file
Mr. Omkar performed tool-based vulnerability assessment and found two vulnerabilities.
During analysis, he found that these issues are not true vulnerabilities. What will you call
these issues? Correct Ans-False positives
Henry is a penetration tester who works for XYZ organization. While performing enumeration
on a client organization, he queries the DNS server for a specific cached DNS record. Further,
, CEH V12 Version 3-Questions and Answers
by using this cached record, he determines the sites recently visited by the organization's
user. What is the enumeration technique used by Henry on the organization? Correct Ans-
DNS cache snooping
Kate dropped her phone and subsequently encountered an issue with the phone's internal
speaker. Thus, she is using the phone's loudspeaker for phone calls and other activities. Bob,
an attacker, takes advantage of this vulnerability and secretly exploits the hardware of Kate's
phone so that he can monitor the loudspeaker's output from data sources such as voice
assistants, multimedia messages, and audio files by using a malicious app to breach speech
privacy. What is the type of attack Bob performed on Kate in the above scenario? Correct
Ans-aLTEr attack
Which command can be used to show the current TCP/IP connections? Correct Ans-Netstat
A new wireless client is configured to join a 802.11 network. This client uses the same
hardware and software as many of the other clients on the network. The client can see the
, CEH V12 Version 3-Questions and Answers
network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point
(WAP) is not responding to the association requests being sent by the wireless client. What is
a possible source of this problem? Correct Ans-The WAP does not recognize the client's
MAC address
Richard, an attacker, aimed to hack IoT devices connected to a target network. In this process,
Richard recorded the frequency required to share information between connected devices.
After obtaining the frequency, he captured the original data when commands were initiated
by the connected devices. Once the original data were collected, he used free tools such as
URH to segregate the command sequence.Subsequently, he started injecting the segregated
command sequence on the same frequency into the IoT network, which repeats the captured
signals of the devices.What is the type of attack performed by Richard in the above scenario?
Correct Ans-Replay attack
_________ is a tool that can hide processes from the process list, can hide files, registry
entries, and intercept keystrokes. Correct Ans-RootKit