100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CEH v11 EXAM | Questions And Answers Latest {} A+ Graded | 100% Verified $13.48   Add to cart

Exam (elaborations)

CEH v11 EXAM | Questions And Answers Latest {} A+ Graded | 100% Verified

 4 views  0 purchase
  • Course
  • Top Academic Resources 2024/2025
  • Institution
  • Top Academic Resources 2024/2025

CEH v11 EXAM | Questions And Answers Latest {} A+ Graded | 100% Verified

Preview 3 out of 16  pages

  • August 20, 2024
  • 16
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Top Academic Resources 2024/2025
  • Top Academic Resources 2024/2025
avatar-seller
oneclass
CEH v11 EXAM | Questions And Answers Latest {2024- 2025} A+ Graded | 100% Verified


An attacker changes the profile information of a particular user (victim) on the target website. The
attacker uses this string to update the victim's profile to a text file and then submit the data to the
attacker's database.

< iframe src="http://www.vulnweb.com/updateif.php" style="display:none" > < /iframe >

What is this type of attack (that can use either HTTP GET or HTTP POST) called? - Cross-Site Request
Forgery (CSRF)



You have compromised a server and successfully gained a root access. You want to pivot and pass traffic
undetected over the network and evade any possible Intrusion Detection System. What is the best
approach? - Install cryptcat and encrypt traffic



While browsing his Facebook feed, Matt sees a picture one of his friends posted with the caption, Learn
more about your friends, as well as a number of personal questions. Matt is suspicious and texts his
friend, who confirms that he did indeed post it. With assurance that the post is legitimate, Matt
responds to the questions on the post. A few days later, Matt's bank account has been accessed, and the
password has been changed. What most likely happened? - Matt inadvertently provided the answers to
his security questions when responding to the post



By performing a penetration test, you gained access under a user account. During the test, you
established a connection with your own machine via the SMB service and occasionally entered your
login and password in plaintext.

Which file do you have to clean to clear the password? - .bash_history



What type of a vulnerability/attack is it when the malicious person forces the user's browser to send an
authenticated request to a server? - Cross-site request forgery (CSRF)



Which Metasploit Framework tool can help penetration tester for evading Antivirus Systems? -
msfencode



Chandler works as a pentester in an IT company in New York. As a part of detecting viruses in the
systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual
machine to simulate CPU and memory activities. Which type of virus detection method did Chandler use
in this context? - Code Emulation

,Jane, an ethical hacker, is testing a target organization's web server and website to identify security
loopholes. In this process, she copied the entire website and its content on a local drive to view the
complete profile of the site's directory structure, file structure, external links, images, web pages, and so
on. This information helps Jane map the website's directories and gain valuable information. What is the
attack technique employed by Jane in the above scenario? - Website mirroring



Richard, an attacker, aimed to hack IoT devices connected to a target network. In this process, Richard
recorded the frequency required to share information between connected devices. After obtaining the
frequency, he captured the original data when commands were initiated by the connected devices.
Once the original data were collected, he used free tools such as URH to segregate the command
sequence. Subsequently, he started injecting the segregated command sequence on the same frequency
into the IoT network, which repeats the captured signals of the devices.

What is the type of attack performed by Richard in the above scenario? - Replay attack



Harry, a professional hacker, targets the IT infrastructure of an organization. After preparing for the
attack, he attempts to enter the target network using techniques such as sending spear-phishing emails
and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully
deployed malware on the target system to establish an outbound connection. What is the APT lifecycle
phase that Harry is currently executing? - Initial intrusion



Scenario: Joe turns on his home computer to access personal online banking. When he enters the URL
www.bank.com, the website is displayed, but it prompts him to re-enter his credentials as if he has
never visited the site before. When he examines the website URL closer, he finds that the site is not
secure and the web address appears different.

What type of attack he is experiencing? - DNS hijacking



What are common files on a web server that can be misconfigured and provide useful information for a
hacker such as verbose error messages? - php.ini



At what stage of the cyber kill chain theory model does data exfiltration occur? - Actions on objective



Heather's company has decided to use a new customer relationship management tool. After performing
the appropriate research, they decided to purchase a subscription to a cloud-hosted solution. The only
administrative task that Heather will need to perform is the management of user accounts. The provider

, will take care of the hardware, operating system, and software administration including patching and
monitoring.

Which of the following is this type of solution? - SaaS



If you send a TCP ACK segment to a known closed port on a firewall but it does not respond with an RST,
what do you know about the firewall you are scanning? - It is a stateful firewall



Steven connected his iPhone to a public computer that had been infected by Clark, an attacker. After
establishing the connection with the public computer, Steven enabled iTunes Wi-Fi sync on the
computer so that the device could continue communication with that computer even after being
physically disconnected. Now, Clark gains access to Steven's iPhone through the infected computer and
is able to monitor and read all of Steven's activity on the iPhone, even after the device is out of the
communication zone. Which of the following attacks is performed by Clark in the above scenario? - iOS
trustjacking



Bob was recently hired by a medical company after it experienced a major cybersecurity breach. Many
patients are complaining that their personal medical records are fully exposed on the Internet and
someone can find them with a simple Google search. Bob's boss is very worried because of regulations
that protect those data.

Which of the following regulations is mostly violated? - HIPPA/PHI



In the Common Vulnerability Scoring System (CVSS) v3.1 severity ratings, what range does medium
vulnerability fall in? - 0.1 - 3.9 Low

4.0 - 6.9 Medium

7.0 - 8.9 High

9.0 - 10.0 Critical



What piece of hardware on a computer's motherboard generates encryption keys and only releases a
part of the key so that decrypting a disk on a new piece of hardware is not possible? - TPM (Trusted
Platform Module)



What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an
organization? - The attacker makes a request to the DNS resolver

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller oneclass. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.48. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73314 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.48
  • (0)
  Add to cart