Certified Ethical Hacker v12 Exam v1.0 (312-50v12)

Page:    1 / 21   
Total 309 questions

Richard, an attacker, aimed to hack IoT devices connected to a target network. In this process, Richard recorded the frequency required to share information between connected devices. After obtaining the frequency, he captured the original data when commands were initiated by the connected devices. Once the original data were collected, he used free tools such as URH to segregate the command sequence. Subsequently, he started injecting the segregated command sequence on the same frequency into the IoT network, which repeats the captured signals of the devices.
What is the type of attack performed by Richard in the above scenario?

  • A. Cryptanalysis attack
  • B. Reconnaissance attack
  • C. Side-channel attack
  • D. Replay attack


Answer : D

Which of the following allows attackers to draw a map or outline the target organization's network infrastructure to know about the actual environment that they are going to hack?

  • A. Vulnerability analysis
  • B. Malware analysis
  • C. Scanning networks
  • D. Enumeration


Answer : C

Your company was hired by a small healthcare provider to perform a technical assessment on the network. What is the best approach for discovering vulnerabilities on a Windows-based computer?

  • A. Use the built-in Windows Update tool
  • B. Use a scan tool like Nessus
  • C. Check MITRE.org for the latest list of CVE findings
  • D. Create a disk image of a clean Windows installation


Answer : B

Susan, a software developer, wants her web API to update other applications with the latest information. For this purpose, she uses a user-defined HTTP callback or push APIs that are raised based on trigger events; when invoked, this feature supplies data to other applications so that users can instantly receive real-time information.
Which of the following techniques is employed by Susan?

  • A. Web shells
  • B. Webhooks
  • C. REST API
  • D. SOAP API


Answer : B

Which IOS jailbreaking technique patches the kernel during the device boot so that it becomes jailbroken after each successive reboot?

  • A. Tethered jailbreaking
  • B. Semi-untethered jailbreaking
  • C. Semi-tethered jailbreaking
  • D. Untethered jailbreaking


Answer : D

Stella, a professional hacker, performs an attack on web services by exploiting a vulnerability that provides additional routing information in the SOAP header to support asynchronous communication. This further allows the transmission of web-service requests and response messages using different TCP connections.
Which of the following attack techniques is used by Stella to compromise the web services?

  • A. Web services parsing attacks
  • B. WS-Address spoofing
  • C. SOAPAction spoofing
  • D. XML injection


Answer : B

Attacker Steve targeted an organization’s network with the aim of redirecting the company’s web traffic to another malicious website. To achieve this goal, Steve performed DNS cache poisoning by exploiting the vulnerabilities in the DNS server software and modified the original IP address of the target website to that of a fake website.
What is the technique employed by Steve to gather information for identity theft?

  • A. Pharming
  • B. Skimming
  • C. Pretexting
  • D. Wardriving


Answer : A

What is the port to block first in case you are suspicious that an IoT device has been compromised?

  • A. 22
  • B. 48101
  • C. 80
  • D. 443


Answer : B

Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection.
Identify the behavior of the adversary in the above scenario.

  • A. Unspecified proxy activities
  • B. Use of command-line interface
  • C. Data staging
  • D. Use of DNS tunneling


Answer : B

What firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?

  • A. Packet fragmentation scanning
  • B. Spoof source address scanning
  • C. Decoy scanning
  • D. Idle scanning


Answer : D

By performing a penetration test, you gained access under a user account. During the test, you established a connection with your own machine via the SMB service and occasionally entered your login and password in plaintext.
Which file do you have to clean to clear the password?

  • A. .xsession-log
  • B. .profile
  • C. .bashrc
  • D. .bash_history


Answer : D

Jack, a disgruntled ex-employee of Incalsol Ltd., decided to inject fileless malware into Incalsol's systems. To deliver the malware, he used the current employees' email IDs to send fraudulent emails embedded with malicious links that seem to be legitimate. When a victim employee clicks on the link, they are directed to a fraudulent website that automatically loads Flash and triggers the exploit.
What is the technique used by Jack to launch the fileless malware on the target systems?

  • A. In-memory exploits
  • B. Legitimate applications
  • C. Script-based injection
  • D. Phishing


Answer : D

Wilson, a professional hacker, targets an organization for financial benefit and plans to compromise its systems by sending malicious emails. For this purpose, he uses a tool to track the emails of the target and extracts information such as sender identities, mail servers, sender IP addresses, and sender locations from different public sources. He also checks if an email address was leaked using the haveibeenpwned.com API.
Which of the following tools is used by Wilson in the above scenario?

  • A. Factiva
  • B. ZoomInfo
  • C. Netcraft
  • D. Infoga


Answer : D

David is a security professional working in an organization, and he is implementing a vulnerability management program in the organization to evaluate and control the risks and vulnerabilities in its IT infrastructure. He is currently executing the process of applying fixes on vulnerable systems to reduce the impact and severity of vulnerabilities.
Which phase of the vulnerability-management life cycle is David currently in?

  • A. Remediation
  • B. Verification
  • C. Risk assessment
  • D. Vulnerability scan


Answer : A

Alice, a professional hacker, targeted an organization’s cloud services. She infiltrated the target’s MSP provider by sending spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud service. Further, she accessed the target customer profiles with her MSP account, compressed the customer data, and stored them in the MSP. Then, she used this information to launch further attacks on the target organization.
Which of the following cloud attacks did Alice perform in the above scenario?

  • A. Cloud cryptojacking
  • B. Man-in-the-cloud (MITC) attack
  • C. Cloud hopper attack
  • D. Cloudborne attack


Answer : C

Page:    1 / 21   
Total 309 questions