Last Updated on July 25, 2021 by InfraExam

312-50v11 : Certified Ethical Hacker v11 Exam : Part 09

  1. An organization has automated the operation of critical infrastructure from a remote location. For this purpose, all the industrial control systems are connected to the Internet. To empower the manufacturing process, ensure the reliability of industrial networks, and reduce downtime and service disruption, the organization decided to install an OT security tool that further protects against security incidents such as cyber espionage, zero-day attacks, and malware.

    Which of the following tools must the organization employ to protect its critical infrastructure?

    • Robotium
    • BalenaCloud
    • Flowmon
    • IntentFuzzer
  2. Ralph, a professional hacker, targeted Jane, who had recently bought new systems for her company. After a few days, Ralph contacted Jane while masquerading as a legitimate customer support executive, informing that her systems need to be serviced for proper functioning and that customer support will send a computer technician. Jane promptly replied positively. Ralph entered Jane’s company using this opportunity and gathered sensitive information by scanning terminals for passwords, searching for important documents in desks, and rummaging bins.

    What is the type of attack technique Ralph used on Jane?

    • Impersonation
    • Dumpster diving
    • Shoulder surfing
    • Eavesdropping
  3. Bella, a security professional working at an IT firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames, and passwords are shared in plaintext, paving the way for hackers to perform successful session hijacking. To address this situation, Bella implemented a protocol that sends data using encryption and digital certificates.

    Which of the following protocols is used by Bella?

    • FTPS
    • FTP
    • HTTPS
    • IP
  4. Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfiltrated by an attacker. AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any non-whitelisted programs.

    What type of malware did the attacker use to bypass the company’s application whitelisting?

    • File-less malware
    • Zero-day malware
    • Phishing malware
    • Logic bomb malware
  5. Kevin, a professional hacker, wants to penetrate CyberTech Inc’s network. He employed a technique, using which he encoded packets with Unicode characters. The company’s IDS cannot recognize the packets, but the target web server can decode them.

    What is the technique used by Kevin to evade the IDS system?

    • Session splicing
    • Urgency flag
    • Obfuscating
    • Desynchronization
  6. To invisibly maintain access to a machine, an attacker utilizes a rootkit that sits undetected in the core components of the operating system. What is this type of rootkit an example of?

    • Hypervisor rootkit
    • Kernel rootkit
    • Hardware rootkit
    • Firmware rootkit
  7. Which of the following information security controls creates an appealing isolated environment for hackers to prevent them from compromising critical targets while simultaneously gathering information about the hacker?

    • Botnet
    • Intrusion detection system
    • Firewall
    • Honeypot
  8. Jim, a professional hacker, targeted an organization that is operating critical industrial infrastructure. Jim used Nmap to scan open ports and running services on systems connected to the organization’s OT network. He used an Nmap command to identify Ethernet/IP devices connected to the Internet and further gathered information such as the vendor name, product code and name, device name, and IP address.

    Which of the following Nmap commands helped Jim retrieve the required information?

    • nmap -Pn -sT –scan-delay 1s –max-parallelism 1 -p < Port List > < Target IP >
    • nmap -Pn -sU -p 44818 –script enip-info < Target IP >
    • nmap -Pn -sT -p 46824 < Target IP >
    • nmap -Pn -sT -p 102 –script s7-info < Target IP >
  9. In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?

    • IDEA
    • Triple Data Encryption Standard
    • AES
    • MD5 encryption algorithm
  10. Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed.

    What is the port scanning technique used by Sam to discover open ports?

    • Xmas scan
    • IDLE/IPID header scan
    • TCP Maimon scan
    • ACK flag probe scan
  11. Gerard, a disgruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attacks and bring down its reputation in the market. To launch the attacks process, he performed DNS footprinting to gather information about DNS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names, IP addresses, DNS records, and network Whois records. He further exploited this information to launch other sophisticated attacks.

    What is the tool employed by Gerard in the above scenario?

    • Towelroot
    • Knative
    • zANTI
    • Bluto
  12. Steven connected his iPhone to a public computer that had been infected by Clark, an attacker. After establishing the connection with the public computer, Steven enabled iTunes Wi-Fi sync on the computer so that the device could continue communication with that computer even after being physically disconnected. Now, Clark gains access to Steven’s iPhone through the infected computer and is able to monitor and read all of Steven’s activity on the iPhone, even after the device is out of the communication zone.

    Which of the following attacks is performed by Clark in the above scenario?

    • Man-in-the-disk attack
    • iOS jailbreaking
    • iOS trustjacking
    • Exploiting SS7 vulnerability
  13. John, a professional hacker, decided to use DNS to perform data exfiltration on a target network. In this process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using this technique, John successfully injected malware to bypass a firewall and maintained communication with the victim machine and C&C server.

    What is the technique employed by John to bypass the firewall?

    • DNSSEC zone walking
    • DNS cache snooping
    • DNS enumeration
    • DNS tunneling method
  14. Abel, a cloud architect, uses container technology to deploy applications/software including all its dependencies, such as libraries and configuration files, binaries, and other resources that run independently from other processes in the cloud environment. For the containerization of applications, he follows the five-tier container technology architecture. Currently, Abel is verifying and validating image contents, signing images, and sending them to the registries.

    Which of the following tiers of the container technology architecture is Abel currently working in?

    • Tier-1: Developer machines
    • Tier-2: Testing and accreditation systems
    • Tier-3: Registries
    • Tier-4: Orchestrators
  15. Taylor, a security professional, uses a tool to monitor her company’s website, analyze the website’s traffic, and track the geographical location of the users visiting the company’s website.

    Which of the following tools did Taylor employ in the above scenario?

    • Webroot
    • Web-Stat
    • WebSite-Watcher
    • WAFW00F
  16. Attacker Rony installed a rogue access point within an organization’s perimeter and attempted to intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack.

    What is the type of vulnerability assessment performed by Johnson in the above scenario?

    • Wireless network assessment
    • Application assessment
    • Host-based assessment
    • Distributed assessment
  17. You start performing a penetration test against a specific website and have decided to start from grabbing all the links from the main page.

    What is the best Linux pipe to achieve your milestone?

    • wget | grep “<a href=\“http” | grep “”
    • curl -s | grep “<a href=\“http” | grep “” | cut -d “\”” -f 2
    • dirb | grep “site”
    • wget | cut -d “http”
  18. Joe works as an IT administrator in an organization and has recently set up a cloud computing service for the organization. To implement this service, he reached out to a telecom company for providing Internet connectivity and transport services between the organization and the cloud service provider.

    In the NIST cloud deployment reference architecture, under which category does the telecom company fall in the above scenario?

    • Cloud consumer
    • Cloud broker
    • Cloud auditor
    • Cloud carrier
  19. A post-breach forensic investigation revealed that a known vulnerability in Apache Struts was to blame for the Equifax data breach that affected 143 million customers. A fix was available from the software vendor for several months prior to the intrusion. This is likely a failure in which of the following security processes?

    • Secure development lifecycle
    • Security awareness training
    • Vendor risk management
    • Patch management
  20. Don, a student, came across a gaming app in a third-party app store and installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after installing the app.

    What is the attack performed on Don in the above scenario?

    • SIM card attack
    • Clickjacking
    • SMS phishing attack
    • Agent Smith attack