You have been authorized to perform a penetration test against a website. You want to use
Google dorks to footprint the site but only want results that show file extensions. What
Google dork operator would you use? Correct Ans-filetype
Which of these is capable of searching for and locating rogue access points? Correct Ans-
WIPS
Miley, a professional hacker, decided to attack a target organization's network. To perform the
attack, she used a tool to send fake ARP messages over the target network to link her MAC
address with the target system's IP address. By performing this, Miley received messages
directed to the victim's MAC address and further used the tool to intercept, steal, modify, and
block sensitive communication to the target system. What is the tool employed by Miley to
perform the above attack? Correct Ans-BetterCAP
, CEH V12 Version 2-Questions and Answers
Which of the following Bluetooth hacking techniques refers to the theft of information from a
wireless device through Bluetooth? Correct Ans-Bluesnarfing
Bob was recently hired by a medical company after it experienced a major cyber security
breach. Many patients are complaining that their personal medical records are fully exposed
on the Internet and someone can find them with a simple Google search. Bob's boss is very
worried because of regulations that protect those dat a. Which of the following regulations is
mostly violated? Correct Ans-HIPPA/PHl
_________ is a type of phishing that targets high-profile executives such as CEOs, CFOs,
politicians, and celebrities who have access to confidential and highly valuable information.
Correct Ans-Whaling
By performing a penetration test, you gained access under a user account. During the test,
you established a connection with your own machine via the SMB service and occasionally
entered your login and password in plaintext. Correct Ans-.bash_history
, CEH V12 Version 2-Questions and Answers
An attacker is trying to redirect the traffic of a small office. That office is using their own mail
server, DNS server and NTP server because of the importance of their job. The attacker gain
access to the DNS server and redirect the direction www.google.com to his own IP address.
Now when the employees of the office want to go to Google they are being redirected to the
attacker machine. What is the name of this kind of attack? Correct Ans-DNS spoofing
Ralph, a professional hacker, targeted Jane, who had recently bought new systems for her
company. After a few days, Ralph contacted Jane while masquerading as a legitimate
customer support executive, informing that her systems need to be serviced for proper
functioning and that customer support will send a computer technician. Jane promptly replied
positively. Ralph entered Jane's company using this opportunity and gathered sensitive
information by scanning terminals for passwords, searching for important documents in
desks, and rummaging bins. Correct Ans-Impersonation
A security analyst uses Zenmap to perform an ICMP timestamp ping scan to acquire
information related to the current time from the target host machine. Which of the following