Certified Ethical Hacker (CEH) Practice Questions
Certified Ethical Hacker (CEH) Practice Questions
These are attacks on the actual programming code and software logic of an application.
A) Misconfiguration attack
B) Application level attack
C) Shrink wrap attack
D) OS attack
Explanation: Application-level attacks are attacks on the actual programming itself (the code
and software logic). A shrink-wrap attack takes advantage of built-in code and scripts that come
with most off the shelf applications. OS attacks target operating system vulnerabilities and
default installation behavior. Misconfiguration attacks take advantage of systems that are not
properly configured for security.
This attack takes advantage of built-in code and scripts in off the shelf applications and other
free libraries and code.
A) Application level attack
B) Shrink wrap attack
C) Misconfiguration attack
D) Roger-wrap attack
Explanation: Shrink wrap (or shrink-wrap) is correct. Application-level attacks are attacks on
the actual programming itself (the code and software logic). Misconfiguration attacks take
advantage of systems that are not properly configured for security. Roger-wrap attack is a
made up answer.
In this type of test, the ethical hacker has no knowledge of the target.
A) Grey box
B) White box
C) Black box
D) Blue box
Explanation: Black box testing is generally where the ethical hacker has no knowledge of the
target, so it will simulate a “real attacker.” Grey box testing is a partial knowledge test to
simulate more of an insider attack. White box testing is where full knowledge of the network is
known (i.e.- the network infrastructure, critical business systems, etc…). Blue box is a made up
answer.
This is used to identify systems and processes that are critical for operations.
A) Black box test
B) BIA
C) BCP
D) DRP
Explanation: This is not mentioned in the official ECC book. The Business Impact Analysis
(BIA) is correct. Business Continuity Plan (BCP) is a set of plans and procedures to follow in the
event of a failure or disaster to main business operations, The Disaster Recovery Plan (DRP)
addresses what to do to recover IT systems after a disaster has occured. The Black box test is
generally where the ethical hacker has no knowledge of the target, so it will simulate a “real
attacker” and does not apply.
This is a Windows command line tool that can be used to assign, display, or modify access
control lists.
A) cacls.exe
B) assign.exe
C) adjust.exe
D) aclss.exe
Explanation: This is not mentioned in the official ECC material. The command is cacls.exe and
all of the other answers listed are made up.
This defines the hostname and port number of servers providing specific services, such as a
Directory Services server.
A) SOA
B) MX
C) SRV
D) CNAME
Explanation: SRV (Service) is correct. SOA (Start of Authority) identifies the primary name
server for the zone. MX (Mail Exchange) identifies the e-mail servers within the domain.
CNAME (Canonical Name) provides domain name aliases within your zone.
This identifies the primary name server for the zone and contains the hostname of the server
responsible for all DNS records within a namespace.
A) PTR
B) SOA
C) CNAME
D) NS
Explanation: The SOA (Start of Authority) identifies the primary name server for the zone. The
CNAME (Canonical Name) provides domain name aliases within your zone. The Pointer (PTR)
maps an IP address to a hostname. The Name Server (NS) defines the name servers within
your namespace.
This record contains the source host, contact e-mail, serial number, refresh time, retry time,
expire time, and TTL (time to live).
A) SOA
B) MX
C) CNAME
D) PTR
Explanation: MX (Mail Exchange) identifies the e-mail servers within the domain. The CNAME
(Canonical Name) provides domain name aliases within your zone. The Pointer (PTR) maps an
IP address to a hostname.
This is the part of the SOA (Start of Authority) record that is the revision number of the zone file
that increments each time a zone file changes. It is used by a secondary server to know when
to update its copy.
A) MX
B) Serial Number
C) Name Server (NS)
D) PTR
Explanation: MX (Mail Exchange) identifies the e-mail servers within the domain. The Name
Server (NS) defines the name servers within your namespace. The Pointer (PTR) maps an IP
address to a hostname.
The hacker in the hoodie used nslookup to get a copy of a zone transfer. In the below output,
what is 2013090800?
Listing domain [madeup.com]
Server: dn1234.madeup.com
Host or domain name Resource Record Info.
madeup.com SOA dn1234.madeup.com
hostmaster.madeup.com (2013090800 86400 900 1209600 3600)
madeup.com NS DN1234.madeup.com
madeup.com NS DN5678.madeup.com
madeup.com A 172.16.55.12
madeup.com MX 30 mailsrv.madeup.com
mailsrv A 172.16.101.5
www CNAME madeup.com
fprtone A 172.16.101.15
fprttwo A 172.16.101.16
A) refresh interval
B) serial number
C) TTL
D) retry time
Explanation: The refresh interval is 86400. The TTL (time to live) is 3600. The retry time is 900.
1209600 is also the expiry time (not one of the answers).
The formula for calculating the annualized loss expectancy (ALE) is:
A) HKC + LEO = ALE
B) ALE = SLE x ARO
C) ALE = SRT + REO
D) ABH = ALE x GTO
Explanation: The formula is ALE (annualized loss expectancy) = SLE (single loss expectancy)
x ARO (annual rate of occurrence). For your exam, just know what the letters stand for.
In the domain of cyber security, CIA stands for (choose the BEST answer):
A) Central Intelligence Agency
B) confidentiality, integrity, and availability
C) that movie with Dwayne “The Rock” Johnson
D) confidence, intelligence, and acumen
Explanation: The correct answer is confidentiality, integrity, and availability. The other answers
are made up in regard to the topic of cyber security.
I use hacking tools developed by others, but I have no clue what I am really doing at a technical
level. I am a:
A) Black Hat
B) White Hat
C) Script Kiddie
D) Big Bird
Explanation: The answer is script kiddie. Black and White Hat hackers know what they are
doing at a technical level (at least we assume so). Big Bird is nothing nefarious (depending on
your perspective) and is the bird on Sesame Street.
As an Ethical Hacker, I should start my pentest (choose the BEST answer):
A) before I have a written agreement in place
B) after I have a written agreement in place from the system owner that outlines
exactly what is to be tested and what is off limits to eliminate any “gray” areas
C) at the convenience of the customer
D) at the direction of my boss
Explanation: Always get permission first and make sure it is in writing to avoid visits from
friendly people in nice suits.
I am a new hacker and want to see what old versions of a popular website looked like. I can go
to (visit these sites at your own risk):
A) www.dudewheresmycare.com
B) www.archive.org
C) www.youtube.com
D) www.funnycatvideos.com
Explanation: www.archive.org allows you to see copies of old websites, like Amazon. It’s kind
of neat to reminisce.
In this, name lookups generally use UDP and zone transfers generally use TCP.
A) DNS
B) DIG
C) ECC
D) FTX
Explanation: DIG is a tool used for DNS queries. ECC stands for EC-Council. FTX stands for
field training exercise (from the military).
This tool can be used for social engineering (choose the BEST answer).
A) Maltego
B) Trout
C) VisualRoute
D) Ping Plotter
Explanation: Maltego can be used for social engineering, but is really useful for aggregating
data about different social networks, online posts a person does, etc… You don’t need hands-
on with it to pass the CEH, but definitely one (of many) tools you want to play with, if you decide
to be a pentester. The other tools listed are Traceroute tools.
This TCP header flag is set during the establishment of initial communication. It indicates the
negotiation of parameters and sequence numbers.
A) ACK
B) SYN
C) RST
D) PSH
Explanation: The ACK (Acknowledgment) flag is set as an acknowledgment to SYN flags. The
RST (Reset) flag forces a termination of communications in both directions (think of your kid
pulling the power cord on your XBox). The PSH (Push) flag forces the delivery of data without
concern for any buffering, so the receiving device does not need to wait for the buffer to fill up
before processing the data.
Johnny wants an ordered close to communications. He should use this TCP header flag.
A) SYN
B) ACK
C) RST
D) FIN
Explanation: The Finish (FIN) flag signifies an ordered close to communications. The SYN
(Synchronize) flag is set during the establishment of initial communication and indicates the
negotiation of parameters and sequence numbers. The ACK (Acknowledgment) flag is set as an
acknowledgment to SYN flags. The RST (Reset) flag forces a termination of communications in
both directions.
When this TCP header flag is set, it indicates the data inside is being sent out of band.
A) PSH
B) URG
C) SYN
D) RST
Explanation: The Urgent (URG) flag is correct. The PSH (Push) flag forces the delivery of data
without concern for any buffering, so the receiving device does not need to wait for the buffer to
fill up before processing the data. The SYN (Synchronize) flag is set during the establishment of
initial communication and indicates the negotiation of parameters and sequence numbers. The
RST (Reset) flag forces a termination of communications in both directions.
A SYN packet is sent from computer A to computer B, with sequence number 105. A SYN/ACK
packet is then sent back to computer A, with the 105 incremented by:
A) two
B) three
C) one
D) depends on network latency
Explanation: The SYN/ACK packet sent back by Computer B would be incremented by one
(so, 106). It would also contain its own sequence number (let’s pretend 221). Computer A then
would send back an ACK packet that would contain the sequence number (106) from computer
B and an increment of one on its sequence number (so, 222 in this example). You will need to
know how much a SYN/ACK response increments by for the exam.
POP3
A) port 110
B) port 25
C) port 389
D) port 88
Explanation: Port 25 is SMTP. Port 389 is LDAP. Port 88 is Kerberos.
HTTPS
A) port 53
B) port 443
C) port 22
D) port 23
Explanation: Port 53 is DNS. Port 22 is SSH. Port 23 is Telnet.
Kerberos
A) port 23
B) port 21
C) port 88
D) port 3389
Explanation: Port 23 is Telnet. Port 21 is FTP. Port 3389 is RDP.
LDAP
A) port 3389
B) port 389
C) port 443
D) port 53
Explanation: Port 3389 is RDP. Port 443 is HTTPS. Port 53 is DNS.
Tameka wants to open an SSH connection. She should use which port?
A) port 23
B) port 53
C) port 22
D) port 21
Explanation: Port 23 is Telnet. Port 53 is DNS. Port 21 is FTP.
Port 80
A) HTTPS
B) HTTP
C) DNS
D) LDAP
Explanation: HTTPS is port 443. DNS is port 53. LDAP is port 389.
TFTP
A) port 110
B) port 69
C) port 25
D) port 3389
Explanation: Port 110 is POP3. Port 25 is SMTP. Port 3389 RDP.
A port state of _____ means that the remote side of your connection has closed the connection.
A) TIME_WAIT
B) CLOSE_WAIT
C) OPEN_WAIT
D) YELLOW_WAIT
Explanation: The TIME_WAIT state indicates that your side has closed the connection. OPEN
and YELLOW_WAIT are made up answers.
Typing this netstat command will display all connections and listening ports.
A) netstat -an
B) netstat -k
C) netstat -all
D) netstat -j
Explanation: netstat -an will display all connections and listening ports, with the addresses and
port numbers in numerical form. The other answers are made up.
MAC broadcast:
A) LL:LL:LL:LL:LL:LL
B) FF:FF:FF:FF:FF:FF
C) PP:PP:PP:PP:PP:PP
D) MAC:MAC:MAC:MAC:MAC:MAC
Explanation: The other answers are made up.
Johnny, the world’s worst hacker, gets an ICMP Type 3 Code 13 packet. This means:
A) nothing, everything is fine
B) a congestion control message
C) the destination is unreachable because the communication is administratively
prohibited (i.e.- traffic is being blocked or filtered by a firewall or router)
D) destination is unreachable and the network is unknown
Explanation: ICMP message Type 4 is a congestion control message. ICMP message Type 3
Code 6 is the destination unreachable and the network is unknown. The “nothing, everything is
fine” is a made up answer.
This type of port scan is also known as TCP connect or full open.
A) Full connect
B) Stealth
C) XMAS
D) Inverse
Explanation: A Full connect (TCP connect, full open) scan runs through a full connection (the
three-way handshake) on all ports. It is easy to detect, but is considered the most reliable.
Open ports will respond with a SYN/ACK and closed ports respond with a RST. Know that for
the CEH exam. The Stealth scan (half-open or SYN) scan is where only SYN packets are sent
to ports, so no completion of the three-way handshake occurs. The XMAS (Christmas) scan is
where all of the flags are turned on (so, it’s lit up like a Christmas tree). XMAS scans do not
work against Windows machines. Know that for your exam. Finally, Inverse scan uses the FIN,
URG, and/or PSH flag to check system ports. If the port is open, there will be no response. If
the port is closed, a RST/ACK will be sent as a response. Know that as well for the exam.
Tasha is a pentester using this nmap command: nmap 192.168.1.1/24 -sn What is she doing?
A) pinging 192.168.1.1
B) disabling port scanning
C) scanning a specific ip
D) performing a SYN scan
Explanation: The command as -sn can be found on the official nmap website under Ref Guide,
then Host Discovery. Scanning a specific IP address would be nmap 192.168.1.1 192.168.2.1.
A SYN scan would be nmap 192.168.1.1 -sS A ping of an IP address would be ping 192.168.1.1
Keisha wants to enable OS detection, version detection, script scanning, and traceroute.
A) nmap 192.168.1.1 -A
B) nmap 192.168.1.1 -T5
C) nmap 192.168.1.1 -sA
D) nmap 192.168.1.1 -sU
Explanation: Nmap commands can be found in-depth on the nmap.org website (I strongly
suggest you look through them). The -T5 is to run an insanely fast scan. -sA is a TCP ACK port
scan. -sU is a UDP port scan.
Johnny, a Hollywood hacker wearing a hoodie and gloves, is trying to do a port scan only.
A) nmap 192.168.1.1/24 -sn
B) nmap 192.168.1.1-5 -Pn
C) nmap 192.168.1.1
D) nmap 192.168.1.1 -sT
Explanation: I recommend reviewing the nmap.org website. -sn is to disable port scanning. The
nmap 192.168.1.1 answer is just scanning a single IP. -sT is to perform a TCP connect port
scan.
Veena understands that for a nmap scan speed, -T0 to -T5 can be used. -T0 is:
A) fast scan
B) super fast scan
C) slow scan
D) middleground scan
Explanation: T0 is considered the slowest scan speed, with -T5 being the fastest.
Amar wants to perform a SYN scan on ports 50-60. Which hping command should he use?
A) hping3 -1 50-60 -S 10.0.0.25
B) hping3 -2 50-60 -S 10.0.0.25
C) hping3 -8 50-60 -S 10.0.0.25
D) hping3 -9 50-60 -S 10.0.0.25
Explanation: The -1 is used to set ICMP mode, the -2 is used to set UDP mode, and the -9 is
used to set hping into listen mode, so it triggers on a signature argument (i.e.- hping3 -9 HTTP -l
eth0 would look for HTTP signature packets on eth0).
Sara is wanting to fragment a SYN scan, while doing OS fingerprinting. She could use:
A) nmap -sS -A -f 172.17.15.12
B) nmap -sS -A 172.17.15.12
C) nmap -sA 172.17.15.12
D) nmap -sX 172.17.15.12
Explanation: The -f gives this one away. The -sA is for an ACK scan. The -sX is for the Xmas
scan. The other answer does not include fragmentation and is only performing a SYN scan,
while doing OS fingerprinting.
In its simplest form, this system is an intermediary between you and your targets.
A) honeypot
B) proxy
C) Google search
D) Nessus
Explanation: A honeypot is used to draw in attackers and see what/how they are attacking.
Nessus is a vulnerability scanner. Google search is used for searching.
This is a live operating system that can be run from a USB and is intended to anonymize the
source.
A) Windows
B) Linux
C) Tails
D) Mac OS
Explanation: Tails is correct. Windows is probably the least anonymous of the others listed.
The White Hat hacker is using what tool for banner grabbing here?
nc 192.168.1.20 80
A) netcat
B) telnet
C) Nessus
D) Ecora Auditor
Explanation: Ecora Auditor (as the name implies) is used for auditing. Nessus is a vulnerability
scanner.
This command should be piped to netcat and sends continuous text to netcat, until either host
terminates the session by sending a break signal or by killing the terminal process.
A) piper
B) plumb
C) yes
D) no
Explanation: The yes command should be piped to netcat and sends continuous text to netcat,
until either host terminates the session by sending a break signal or by killing the terminal
process.. The other answers are made up.
This SMTP command provides the actual delivery addresses of mailing lists and aliases.
A) VRFY
B) EXPN
C) RCPT TO
D) telnet
Explanation: The EXPN command provides the actual delivery addresses of mailing lists and
aliases. The RCPT TO command defines recipients. The VRFY command validates the user.
Telnet is not a SMTP command.
This is the process of maliciously changing the ARP cache on a machine to inject faulty entries.
A) ARP poisoning
B) ARP listening
C) ARP attack
D) DHCP starvation
Explanation: ARP poisoning is correct. The other ARP answers are made up. DHCP starvation
is where attackers try to exhaust all available addresses from the server.
This type of IDS (Intrusion Detection System) compares packets against a list of known traffic
patterns that indicate an attack.
A) anomaly-based
B) signature-based
C) forensic-based
D) Wireshark-based
Explanation: A signature-based IDS compares packets against a list of known traffic patterns
that indicate an attack. An anomaly-based IDS learns the “normal” behavior of the network and
alerts on anything outside of that behavior. One downside is if the network was already
compromised before the anomaly-based IDS was added. Forensic-based and WIreshark-based
are both made up answers.
A hacker can try to bypass an IDS with this:
A) TCP packets
B) fragmentation
C) IPv6 packets
D) wiretapping
Explanation: Fragmentation is where the attacker sends fragmented packets that will be
reassembled after going past the IDS. The other answer choices are made up.
tcp.flags == 0x16
A) looks for SYN packets
B) looks for ACK packets
C) looks for RST packets
D) looks for URG packets
Explanation: This command is looking for ACK packets. In Wireshark filtering, the assigned
decimal numbers for packets are: FIN=1 SYN=2 RST=4 PSH=8 ACK=16 URG=32 In this
example, we were looking at the number 16, which tells us it is ACK packets. For example, if
we had tcp.flags==0x18 it would tell us that we are looking for both SYN (2) and ACK (16)
packets.
This Snort file resides in /etc/snort on Linux computers and c:\snort\etc\ on Windows.
A) log file
B) configuration file
C) user file
D) etc file
Explanation: The Snort configuration file resides in /etc/snort on Linux computers and
c:\snort\etc\ on Windows. The other answer choices are made up.
_____ means if there is not a firewall rule defined to allow a packet to pass, the packet is
blocked.
A) implicit deny
B) implicit approve
C) explicit allowed
D) always allowed
Explanation: Implicit deny is correct. An administrator can explicitly allow certain packets to
pass the firewall. The other two answers are made up. A key point to remember for the exam
is an implicit deny rule should always be the last rule. For example, if the firewall checks its
ruleset and sees the implicit deny, it will block all remaining traffic, even if you have a hundred
other rules in place.
NAT is:
A) network address translation
B) new address translation
C) network add-on transport
D) new add-on transport
Explanation: NAT stands for network address translation. The other answers are made up.
PAT is:
A) pacific address time
B) port address translation
C) patterned address transport
D) protocol and transport
Explanation: PAT stands for port address translation. Like, NAT (network address translation)
it is used to allow an internal address to use an external address. With PAT; however, many
internal addresses can use a single external address.
This sits between the internal and external network and is designed to help protect the internal
network resources from attack.
A) bastion host
B) Snort
C) Wireshark
D) tcpdump
Explanation: Snort is an IDS. Wireshark and tcpdump can be used for packet sniffing.
This type of firewall looks at the headers of packets coming through a port and decide whether
to allow them, based on the access control lists (ACLs) that are configured.
A) stateful inspection
B) packet-filtering
C) circuit-level gateway
D) application-level
Explanation: A packet-filtering firewall looks at the headers of packets coming through a port
and decide whether to allow them, based on the access control lists (ACLs) that are configured.
A stateful inspection firewall allows for tracking of the status of the connection. For example, if a
packet arrives with an ACK flag set, but there is no record of the original SYN packet being sent,
it would be considered malicious traffic. The circuit-level gateway firewall works at the Session
layer (OSI model layer 5) and allows or prevents data streams (it is not necessarily concerned
with individual packets). The application-level firewall filters traffic like a proxy in that it allows
specific applications (services) in and out of the network based on its rule set.
A hacker wants to bypass a firewall with HTTPS tunneling. He knows this port is used.
A) 23
B) 25
C) 443
D) 80
Explanation: Port 443 is for HTTPS. Port 23 is telnet. Port 25 is SMTP. Port 80 is for HTTP.
This is the process of walking through every port against a firewall to determine what is open.
A) firewalking
B) pathing
C) firepathing
D) firewallrunning
Explanation: Firewalking is the process of walking through every port against a firewall to
determine what is open. The other answers are made up.
In _____ hashing, a password of seven characters or less will result in the hash value
AAD3B435B51404EE for the last seven, blank characters.
A) AM
B) LM
C) OM
D) RM
Explanation: LM hashing is correct. The other answers are made up.
This is designed to exchange structured information in web services and uses XML to format
information. It allows applications running on one platform to communicate with applications
running on a different platform.
A) SQL
B) XSS
C) SOAP
D) CSRF
Explanation: SOAP (Simple Object Access Protocol) is designed to exchange structured
information in web services and uses XML to format information. It allows applications running
on one platform to communicate with applications running on a different platform. SQL, XSS,
and CSRF are all types of Web attacks.
Phishing fraud where the attacker utilizes SMS to send messages to the victim that contain a
malicious link or telephone number.
A) Zishing
B) SMiShing
C) ZitMo
D) Lishing
Explanation: SMiShing is correct. ZitMo (Zeus in the MIddle) is a type of malware for Android
phones. The other two answers (Lishing and Zishing) are made up.
This is shared by several organizations, usually with the same policy and compliance
considerations.
A) private cloud
B) public cloud
C) community cloud
D) platform cloud
Explanation: Community clouds are shared by several organizations, usually with the same
policy and compliance considerations. A private cloud is operated for a single organization
(single tenant environment). A public cloud is a model where services are provided over the
Internet for public use. Platform cloud is a made up answer.
This is a leading professional organization that is devoted to promoting cloud security best
practices and organizing cloud security professionals.
A) CIA
B) CSA
C) NSA
D) FBI
Explanation: CSA (Cloud Security Alliance) is a leading professional organization that is
devoted to promoting cloud security best practices and organizing cloud security professionals.
The other choices are agencies of the United States government and are not industry
professional organizations (CIA = Central Intelligence Agency, NSA = National Security Agency,
FBI = Federal Bureau of Investigation).
In this type of attack, a SOAP message is intercepted and the data in the envelope is changed
and then replayed.
A) Session riding
B) side channel
C) wrapping
D) CSRF
Explanation: In a wrapping attack, a SOAP message is intercepted and the data in the
envelope is changed and then replayed. Session riding and CSRF (Cross-Site Request
Forgery) are similar. A side channel (aka- cross-guest VM breach) attack is where an attacker
gains control of an existing VM on the same physical host as the target.
These are programs that allow you to bind the executable of your choice (say a Trojan) to an
innocent file that your target will not mind opening.
A) crypters
B) wrappers
C) packers
D) lovers
Explanation: Wrappers are programs that allow you to bind the executable of your choice (say
a Trojan) to an innocent file that your target will not mind opening. A crypter is a tool that uses a
combination of encryption and code manipulation to render malware undetectable to antivirus
and other security monitoring products. Packers use compression to pack the malware
executable into a smaller size, which is intended to make the malware harder to detect for some
antivirus programs. Lovers might be nice, but it is a made up answer in the context of security.
These are tools that use a combination of encryption and code manipulation to render malware
undetectable to antivirus and other security monitoring products.
A) crypter
B) packer
C) wrapper
D) exploit kit
Explanation: A crypter is a tool that uses a combination of encryption and code manipulation to
render malware undetectable to antivirus and other security monitoring products. A packer uses
compression to pack the malware executable into a smaller size, which is intended to make the
malware harder to detect for some antivirus programs. A wrapper is a program that allows you
to bind the executable of your choice (say a Trojan) to an innocent file that your target will not
mind opening. An exploit kit is a platform from which you can deliver payloads and exploits (i.e.-
Blackhole, Bleeding Life, etc…).
This is software that appears to perform a desirable function for the user running it, but instead it
performs a function, usually without the user’s knowledge, that steals information or harms
system data.
A) packer
B) Trojan
C) wrapper
D) crypter
Explanation: A packer uses compression to pack the malware executable into a smaller size,
which is intended to make the malware harder to detect for some antivirus programs. A wrapper
is a program that allows you to bind the executable of your choice (say a Trojan) to an innocent
file that your target will not mind opening. A crypter is a tool that uses a combination of
encryption and code manipulation to render malware undetectable to antivirus and other
security monitoring products.
This is a self-replicating program that reproduces its code by attaching copies into other
executable codes (it produces a copy of itself by attaching itself to another program or
document).
A) worm
B) crypter
C) crypto
D) virus
Explanation: A worm replicates, executes, and spreads itself across network connections. A
crypter is a tool that uses a combination of encryption and code manipulation to render malware
undetectable to antivirus and other security monitoring products. Crypto is a made up answer.
Johnny downloaded a file from a torrent and now is locked out of his system, with a message
that he must pay 2 Bitcoin to get access to his files.
A) Boot sector virus
B) ransomware
C) Shell virus
D) Polymorphic code virus
Explanation: Ransomware is malware that locks you out of your own system resources and
demands an online payment of some sort. A Boot sector virus (aka a system virus) moves the
boot sector to another location on the hard drive, forcing the virus code to be executed first,
which makes this type of virus nearly impossible to get rid of. A Shell virus works similar to a
Boot sector virus in that it wraps itself around an application’s code and causes the virus code to
be run before the application’s code. A Polymorphic code virus mutates its code, using a built-in
polymorphic engine, and is difficult to detect and remove because its signature constantly
changes.
This type of virus modifies directory table entries, so that the user or system processes are
pointed to the virus code itself, instead of the intended application. It does not change the files
themselves or plant additional files. It is only changing the pointers for the directory.
A) Boot sector virus
B) Cluster virus
C) Shell virus
D) ransomware
Explanation: Cluster virus is correct. A Boot sector virus (aka a system virus) moves the boot
sector to another location on the hard drive, forcing the virus code to be executed first, which
makes this type of virus nearly impossible to get rid of. A Shell virus works similar to a Boot
sector virus in that it wraps itself around an application’s code and causes the virus code to be
run before the application’s code. Ransomware is malware that locks you out of your own
system resources and demands an online payment of some sort.
Sara is scared of a virus that is designed to infect Microsoft Office products, like Word and
Excel.
A) Macro virus
B) Polymorphic code virus
C) Shell virus
D) Stealth virus
Explanation: A Macro virus is usually written in Visual Basic and infects template files created
by Word and Excel (most newer versions of these automatically disable Macros). An example
is the Melissa virus. A Polymorphic code virus mutates its code, using a built-in polymorphic
engine, and is difficult to detect and remove because its signature constantly changes. A Shell
virus works similar to a Boot sector virus in that it wraps itself around an application’s code and
causes the virus code to be run before the application’s code. A stealth virus (aka tunneling
virus) attempts to evade antivirus by intercepting the antivirus’ request to the operating system
and returning them to itself, instead of the OS. The virus then alters the requests and sends
them back to the antivirus as uninfected, which makes the virus appear to be clean.
This was a denial of service worm that attacked buffer overflow weaknesses in Microsoft SQL
services that could fit inside a single packet.
A) Code Red
B) Darlloz
C) Slammer
D) Nimda
Explanation: Slammer is also known as SQL Slammer and is only briefly mentioned in the ECC
material. Code Red is a worm that exploits Microsoft IIS servers and was seen back in 2001.
Darlloz is known as the worm for the Internet of Things. It is a Linux-based worm that targets
things like security cameras and routers. Nimda was a worm that spread through e-mail,
network shares, and websites. It also took advantage of backdoors left behind by the Code Red
worm.
This is a system that is set up to check physical media, device drivers, and other files for
malware before introducing them to the network.
A) Cowdip
B) Sheepdip
C) Goatdip
D) Elephantdip
Explanation: Sheepdip is a system that is set up to check physical media, device drivers, and
other files for malware before introducing them to the network. This is normally a computer that
is isolated from the network and only used for this purpose. The other answer choices are
made up.
This type of attack consumes all available bandwidth for a system or service.
A) SYN flood
B) Volumetric
C) Fragmentation
D) TCP state-exhaustion
Explanation: A Volumetric (or bandwidth) attack consumes all available bandwidth for a system
or service. A SYN flood is where thousands of SYN packets are sent to the target, but no
response is ever given to the SYN/ACK packets sent by the target system. The target must wait
a certain amount of time to receive an an answer to the SYN/ACK packets it had sent, so this
then causes the system to become bogged down. A fragmentation attack takes advantage of
the system’s inability to reconstruct fragmented packets. A TCP state-exhaustion attack
attempts to consume the connection state tables of load balancers, firewalls, and application
servers.
This type of attack sends a large number of pings to the broadcast address of the subnet, with
the IP address spoofed to that of the intended target. This then causes all devices on the
subnet to begin sending a ping response to the target system, exhausting all of its resources.
A) teardrop
B) smurf
C) LAND
D) LOIC
Explanation: A smurf attack is correct. A teardrop attack is where a large number of garbled IP
fragments, with overlapping and oversized payloads, are sent to the target system. A LAND
attack sends a SYN packet to the target system, with the IP address spoofed to that of the
target. This can cause the target system to loop endlessly and crash. The LOIC (Low Orbit Ion
Cannon) is used to flood targets with TCP, UDP, and HTTP requests.
In this IPSec mode, the payload and ESP trailer are encrypted; however, the header of the
original packet is not.
A) transport mode
B) tunnel mode
C) VPN mode
D) NAT mode
Explanation: IPSec is also mentioned throughout the ECC text. In transport mode, the header
of the original packet is not encrypted. In tunnel mode, the original packet is encapsulated in the
new IPSec shell, so everything is encrypted. Know the difference between these for the CEH
exam. VPN mode and NAT (network address translation) mode are made up answers.
This type of encryption uses a single key or shared key. Basically, one key is used to encrypt
and decrypt the data.
A) asymmetric
B) Ettercap
C) symmetric
D) ADS spy
Explanation: Symmetric encryption uses a single or shared key to encrypt and decrypt the
data. It is faster than asymmetric encryption. This type of encryption provides confidentiality,
but not nonrepudiation. Asymmetric encryption is a key pair system. One key is used to encrypt
the data and another key is used to decrypt (public and private key). The private key is kept
secured on the system and the public key (the encrypting key) is what is sent to the receiver.
Ettercap is a sniffer and tool that can be used for attacks, like man-in-the-middle. ADS spy helps
you locate alternate data streams.
This is a stream cipher and not a block cipher.
A) Blowfish
B) RC5
C) RC4
D) Twofish
Explanation: RC4 is a variable key-size symmetric-keystream cipher. RC5 is a symmetric-key
block cipher. Blowfish and Twofish are also block ciphers, but not really mentioned in the ECC
material.
This is a block cipher that is used in PGP (Pretty Good Privacy) for bulk message encryption.
A) RC4
B) IDEA
C) RSA
D) RC5
Explanation: IDEA (International Data Encryption Algorithm) is a block cipher that is used in
PGP (Pretty Good Privacy) for bulk message encryption. It uses a 128 bit key and was designed
to replace DES. RSA is also used in PGP; however, it is used for key transport. RC4 is a
variable key-size symmetric-keystream cipher. RC5 is a symmetric-key block cipher.
SHA-1 has:
A) 128 bit hash
B) 160 bit hash
C) 256 bit hash
D) 2048 bit hash
Explanation: SHA-1 has a 160 bit hash value output. The other answers are made up.
Tony wants to use a technique that makes cracking passwords more difficult.
A) salting
B) peppering
C) GAK
D) CA
Explanation: Salting is the process of using random bits to generate different hashes of the
same password. Peppering is a made up answer. GAK (government access to keys) is also
referred to as key escrow and is where companies provide their encryption keys to the
government, and the government promises to only use them when they really need to. CA
(Certificate Authority) acts as a third party to the organization. Its job is to create and issue
digital certificates that can then be used to verify identity. It also tracks certificates with a
certificate management system and maintains a certificate revocation list to see which
certificates have problems or which have been revoked.
An attacker wears a fake badge and attempts to gain access to a secure area by closely
following an authorized person through the door. It implies this access is gained without the
authorized user’s consent.
A) piggybacking
B) rubbernecking
C) tailgating
D) POODLE
Explanation: Tailgating is correct. Piggybacking is where the attacker will request for an
authorized person to open the door, citing things like they had forgotten their badge at home.
The main difference between tailgating and piggybacking you will probably see asked pertains
to the attacker wearing a fake bade to gain access and if the authorized user actually knows
what is occurring (consent). POODLE is an attack that interrupts all handshake attempts by TLS
and forces the browser to degrade back to using SSL. Rubbernecking is a made up answer.
This is a spouse, friend, or event client of an employee that uses the employee’s credentials to
gain access, even if this is without the consent of the employee.
A) pure insider
B) insider associate
C) insider affiliate
D) outside affiliate
Explanation: Insider affiliate is correct. A pure insider is the employee (aka- insider threat). The
insider associate is someone with limited, but authorized access. This could be people like
guards or the cleaning crew. The outside affiliate is a non-trusted outsider who uses open
access to gain access to the company’s resources. So, for example, this could be someone
gaining unauthorized access to wireless access points.
The OWASP Top Ten for IoT vulnerabilities includes all the following, EXCEPT:
A) Insecure Web interface
B) Privacy concerns
C) Insecure cloud interface
D) Secure software development
Explanation: Having secure software development principles used in IoT design is not a
vulnerability listed on the OWASP Top Ten list.
The Common Vulnerability Scoring System (CVSS) consists of three metrics, which include all
the following EXCEPT:
A) Base Metrics
B) PW Metrics
C) Temporal Metrics
D) Environment Metrics
Explanation: PW Metrics is a made up answer. Base Metrics represents the inherent qualities
to a vulnerability. Temporal Metrics represents the features that keep changing during the
lifetime of a vulnerability. Environmental Metrics represent the vulnerabilities that are based on
a particular environment or implementation.