Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ECCouncil > CEH v13 > 312-50v13

312-50v13 Certified Ethical Hacker Exam (CEHv13) Question and Answers

Question # 4

During an internal red team engagement at a financial services firm, an ethical hacker named Anika tests persistence mechanisms after successfully gaining access to a junior employee’s workstation. As part of her assessment, she deploys a lightweight binary into a low-visibility system folder. To maintain long-term access, she configures it to launch automatically on every system reboot without requiring user interaction.

Which of the following techniques has most likely been used to ensure the persistence of the attacker’s payload?

A.

Installing a keylogger

B.

Creating scheduled tasks

C.

Modifying file attributes

D.

Injecting into the startup folder

Full Access
Question # 5

A penetration tester detects malware on a system that secretly records all keystrokes entered by the user. What type of malware is this?

A.

Rootkit

B.

Ransomware

C.

Keylogger

D.

Worm

Full Access
Question # 6

During a security assessment, an attacker identifies a flaw in a multi-user file system. The system first verifies access rights to a temporary file created by a user. However, immediately after this verification, and before the file is processed, the attacker manages to swap the original file with a malicious version. This manipulation happens in the brief interval between the system ' s access verification and the moment it handles the file, resulting in the malicious file being treated as legitimate. Which vulnerability is the attacker exploiting?

A.

Time-of-validation/time-of-execution issue in resource management logic.

B.

Improper certificate validation in trusted communication channels.

C.

Integer overflow during arithmetic computations with limited memory bounds.

D.

Null pointer dereference leading to unexpected application behavior.

Full Access
Question # 7

Which advanced session hijacking technique is the most difficult to detect and mitigate?

A.

Credential stuffing

B.

Clickjacking

C.

CSRF

D.

Session replay attack

Full Access
Question # 8

During an internal red team engagement at a software company in Boston, ethical hacker Meera gains access to a developer ' s workstation. To ensure long-term persistence, she plants a lightweight binary in a hidden directory and configures it to automatically launch every time the system is restarted. Days later, even after the host was rebooted during patching, the binary executed again without requiring user interaction, giving Meera continued access.

Which technique most likely enabled this persistence?

A.

Scheduled Tasks

B.

Creating a new service

C.

Startup Folder

D.

Registry run keys

Full Access
Question # 9

A penetration tester is tasked with identifying vulnerabilities on a web server running outdated software. The server hosts several web applications and is protected by a basic firewall. Which technique should the tester use to exploit potential server vulnerabilities?

A.

Conduct a SQL injection attack on the web application ' s login form

B.

Perform a brute-force login attack on the admin panel

C.

Execute a buffer overflow attack targeting the web server software

D.

Use directory traversal to access sensitive configuration files

Full Access
Question # 10

You are investigating unauthorized access to a web application using token-based authentication. Tokens expire after 30 minutes. Server logs show multiple failed login attempts using expired tokens within a short window, followed by successful access with a valid token. What is the most likely attack scenario?

A.

The attacker captured a valid token before expiration and reused it

B.

The attacker brute-forced the token generation algorithm

C.

The attacker exploited a race condition allowing expired tokens to be validated

D.

The attacker performed a token replay attack that confused the server

Full Access
Question # 11

During a red team engagement at a retail company in Atlanta, ethical hacker James crafts a session with the company ' s shopping portal and deliberately shares that session ID with an unsuspecting employee by embedding it in a link. When the employee clicks and logs in, their activity is bound to the attacker ' s pre-assigned session. Later, James retrieves the employee ' s input from that same session to demonstrate the flaw to management.

Which session hijacking technique is James most likely using?

A.

Session Donation Attack

B.

Session Replay Attack

C.

Session Prediction

D.

Session Fixation Attack

Full Access
Question # 12

A cyber adversary wants to enumerate firewall rules while minimizing noise and mimicking normal traffic behavior. Which reconnaissance technique enables mapping of firewall filtering behavior using TTL-manipulated packets?

A.

Sending ICMP Echo requests to the network ' s broadcast address

B.

Passive DNS monitoring to observe domain-to-IP relationships

C.

Conducting full SYN scans on all ports for each discovered IP

D.

Firewalking with manipulated TTL values to analyze ACL responses

Full Access
Question # 13

Customer data in a cloud environment was exposed due to an unknown vulnerability. What is the most likely cause?

A.

Misconfigured security groups

B.

Brute force attack

C.

DoS attack

D.

Side-channel attack

Full Access
Question # 14

A senior executive receives a personalized email with the subject line “Annual Performance Review 2024.” The email contains a downloadable PDF that installs a backdoor when opened. The email appears to come from the CEO and includes company branding. Which phishing method does this best illustrate?

A.

Broad phishing sent to all employees

B.

Pharming using DNS poisoning

C.

Whaling attack aimed at high-ranking personnel

D.

Email clone attack with altered attachments

Full Access
Question # 15

You are part of a red team hired to assess the cybersecurity posture of a large retail chain headquartered in New York. The client wants to know whether their defenses can anticipate future attack patterns before they occur. To meet this objective, your team deploys an AI-enabled platform that analyzes previous breaches and anomaly data to forecast potential attack vectors. Which benefit of AI-driven ethical hacking is most critical in this case?

A.

Scalability

B.

Predictive analysis

C.

Enhanced reporting

D.

Simulation and testing

Full Access
Question # 16

In the financial hub of Charlotte, North Carolina, ethical hacker Raj Patel is contracted by TrustBank, a regional U.S. bank, to evaluate their online loan application portal. During testing, Raj submits crafted input into the portal ' s form fields and notices that the server ' s HTTP responses are unexpectedly altered. His payloads cause additional headers to appear and even inject unintended content into the output, creating opportunities for attackers to manipulate web page behavior and deliver malicious data to users.

Which type of vulnerability is Raj most likely exploiting in TrustBank ' s online loan application portal?

A.

HTTP Response Splitting

B.

XML Poisoning

C.

XML External Entity (XXE) Injection

D.

Server-Side Request Forgery (SSRF)

Full Access
Question # 17

A penetration tester discovers that a web application uses unsanitized user input to dynamically generate file paths. The tester identifies that the application is vulnerable to Remote File Inclusion (RFI). Which action should the tester take to exploit this vulnerability?

A.

Inject a SQL query into the input field to perform SQL injection

B.

Use directory traversal to access sensitive system files on the server

C.

Provide a URL pointing to a remote malicious script to include it in the web application

D.

Upload a malicious shell to the server and execute commands remotely

Full Access
Question # 18

A penetration tester is investigating a web server that allows unrestricted file uploads without validating file types. Which technique should be used to exploit this vulnerability and potentially gain control of the server?

A.

Perform a SQL injection attack to extract sensitive database information

B.

Upload a shell script disguised as an image file to execute commands on the server

C.

Conduct a brute-force attack on the server ' s FTP service to gain access

D.

Use a Cross-Site Scripting (XSS) attack to steal user session cookies

Full Access
Question # 19

A financial services firm is experiencing a sophisticated DoS attack on their DNS servers using DNS amplification and on their web servers using HTTP floods. Traditional firewall rules and IDS are failing to mitigate the attack effectively. To protect their infrastructure without impacting legitimate users, which advanced mitigation strategy should the firm implement?

A.

Increase server capacity and implement simple rate limiting

B.

Block all incoming traffic from suspicious IP ranges using access control lists

C.

Deploy a Web Application Firewall (WAF) to filter HTTP traffic

D.

Utilize a cloud-based DDoS protection service with traffic scrubbing capabilities

Full Access
Question # 20

A security researcher reviewing an organization ' s website source code finds references to Amazon S3 file locations. What is the most effective way to identify additional publicly accessible S3 bucket URLs used by the target?

A.

Exploit XSS to force the page to reveal the S3 links

B.

Use Google advanced search operators to enumerate S3 bucket URLs

C.

Use SQL injection to extract internal file paths from the database

D.

Perform packet sniffing to intercept internal S3 bucket names

Full Access
Question # 21

While assessing a web server, a tester sends malformed HTTP requests and compares responses to identify the server type and version. What technique is being employed?

A.

Fingerprinting server identity using banner-grabbing techniques

B.

Sending phishing emails to extract web server login credentials

C.

Conducting session fixation using malformed cookie headers

D.

Injecting scripts into headers for persistent XSS attacks

Full Access
Question # 22

During an internal security assessment of a medium-sized enterprise network, a security analyst notices an unusual spike in ARP traffic. Closer inspection reveals that one particular MAC address is associated with multiple IP addresses across different subnets. The ARP packets were unsolicited replies rather than requests, and several employees from different departments have reported intermittent connection drops, failed logins, and broken intranet sessions. The analyst suspects an intentional interference on the local network segment. What is the most likely cause of this abnormal behavior?

A.

ARP poisoning causing routing inconsistencies

B.

DHCP snooping improperly configured

C.

Legitimate ARP table refresh on all clients

D.

Port security restricting all outbound MAC responses

Full Access
Question # 23

While evaluating a smart card implementation, a security analyst observes that an attacker is measuring fluctuations in power consumption and timing variations during encryption operations on the chip. The attacker uses this information to infer secret keys used within the device. What type of exploitation is being carried out?

A.

Disrupt control flow to modify instructions

B.

Observe hardware signals to deduce secrets

C.

Crack hashes using statistical collisions

D.

Force session resets through input flooding

Full Access
Question # 24

In an enterprise environment, the network security team detects unusual behavior suggesting advanced sniffing techniques exploiting legacy protocols to intercept sensitive communications. Which of the following sniffing-related techniques presents the greatest challenge to detect and neutralize, potentially compromising confidential enterprise data?

A.

Steganographic payload embedding within SMTP email headers

B.

Encrypted data extraction via HTTP header field overflows

C.

Covert data interception via X2S packet fragmentation

D.

Covert channel establishment through Modbus protocol manipulation

Full Access
Question # 25

While testing a web application that relies on JavaScript-based client-side security controls, which method is most effective for bypassing these controls without triggering server-side alerts?

A.

Reverse-engineering the proprietary encryption algorithm

B.

Disabling JavaScript in the browser and submitting invalid data

C.

Injecting malicious JavaScript into the login page

D.

Using a proxy tool to intercept and modify client-side requests

Full Access
Question # 26

While auditing legacy network devices at a public hospital in Miami, Jason, a penetration tester, needs to verify what SNMP traffic is leaking across the internal segment. Instead of running structured queries, he decides to capture live network traffic and manually review the protocol fields. This method allows him to see SNMP requests and responses in transit but requires manual parsing of OIDs, community strings, and variable bindings.

Which method should Jason use in this situation?

A.

Nmap

B.

Wireshark

C.

SnmpWalk

D.

SoftPerfect Network Scanner

Full Access
Question # 27

In Austin, Texas, ethical hacker Michael Reyes is conducting a red team exercise for Horizon Tech, a software development firm. During his assessment, Michael crafts a malicious link that appears to lead to the company ' s internal project management portal. When an unsuspecting employee clicks the link, it redirects them to a login session that Michael has already initialized with the server. After the employee logs in, Michael uses that session to access the portal in a controlled test, demonstrating a vulnerability to the IT team.

Which session hijacking technique is Michael using in this red team exercise?

A.

Session donation attack

B.

Session replay attack

C.

Session sniffing

D.

Session fixation attack

Full Access
Question # 28

Which advanced session-hijacking technique is hardest to detect and mitigate?

A.

Covert XSS attack

B.

Man-in-the-Browser (MitB) attack

C.

Passive sniffing on Wi-Fi

D.

Session fixation

Full Access
Question # 29

During a black-box penetration test, an attacker runs the following command:

nmap -p25 --script smtp-enum-users --script-args EXPN,RCPT < target IP >

The script successfully returns multiple valid usernames. Which server misconfiguration is being exploited?

A.

The SMTP server allows authentication without credentials

B.

The SMTP server has disabled STARTTLS, allowing plaintext enumeration

C.

SMTP user verification commands are exposed without restrictions

D.

DNS MX records point to an internal mail relay

Full Access
Question # 30

During a cybersecurity awareness drill at Quantum Analytics in San Francisco, California, the ethical hacking team tests the company’s defenses against social media-based threats. Nadia creates a fake LinkedIn profile posing as a senior HR manager from Quantum Analytics, using a stolen company logo and publicly available employee details. Nadia sends connection requests to several employees, including data analyst Priya Sharma, inviting them to join a private group called Quantum Analytics Innovation Hub. The group’s page prompts members to share their work email and department role for exclusive project updates.

What social engineering threat to corporate networks is Nadia’s exercise primarily simulating?

A.

Loss of Productivity

B.

Involuntary Data Leakage

C.

Spam and Phishing

D.

Network Vulnerability Exploitation

Full Access
Question # 31

A multinational company plans to deploy an IoT-based environmental control system across global manufacturing units. The security team must identify the most likely attack vector an Advanced Persistent Threat (APT) group would use to compromise the system. What is the most plausible method?

A.

Launching a DDoS attack to overload IoT devices

B.

Compromising the system using stolen user credentials

C.

Exploiting zero-day vulnerabilities in IoT device firmware

D.

Performing an encryption-based Man-in-the-Middle attack

Full Access
Question # 32

During a late-night shift at IronWave Logistics in Seattle, cybersecurity analyst Marcus Chen notices a pattern of high-port outbound traffic from over a dozen internal machines to a previously unseen external IP. Each system had recently received a disguised shipping report, which, when opened, initiated a process that spread autonomously to other workstations using shared folders and stolen credentials. Upon investigation, Marcus discovers that the machines now contain hidden executables that silently accept remote instructions and occasionally trigger coordinated background tasks. The compromised endpoints are behaving like zombies, and malware analysts confirm that the payload used worm-like propagation to deliver a backdoor component across the network.

Which is the most likely objective behind this attack?

A.

To exfiltrate sensitive information and tracking data

B.

To execute a ransomware payload and encrypt all data

C.

To establish a botnet for remote command and control

D.

To deploy a Remote Access Trojan (RAT) for stealthy surveillance

Full Access
Question # 33

A penetration tester is investigating a web server that allows unrestricted file uploads without validating file types. Which technique should be used to exploit this vulnerability and potentially gain control of the server?

A.

Perform a SQL injection attack to extract sensitive database information

B.

Upload a shell script disguised as an image file to execute commands on the server

C.

Conduct a brute-force attack on the server ' s FTP service to gain access

D.

Use a Cross-Site Scripting (XSS) attack to steal user session cookies

Full Access
Question # 34

A penetration tester performs a vulnerability scan on a company’s web server and identifies several medium-risk vulnerabilities related to misconfigured settings. What should the tester do to verify the vulnerabilities?

A.

Use publicly available tools to exploit the vulnerabilities and confirm their impact

B.

Ignore the vulnerabilities since they are medium-risk

C.

Perform a brute-force attack on the web server ' s login page

D.

Conduct a denial-of-service (DoS) attack to test the server ' s resilience

Full Access
Question # 35

A penetration tester is tasked with assessing the security of an Android mobile application that stores sensitive user data. The tester finds that the application does not use proper encryption to secure data at rest. What is the most effective way to exploit this vulnerability?

A.

Access the local storage to retrieve sensitive data directly from the device

B.

Use SQL injection to retrieve sensitive data from the backend server

C.

Execute a Cross-Site Scripting (XSS) attack to steal session cookies

D.

Perform a brute-force attack on the application ' s login credentials

Full Access
Question # 36

What is the main difference between ethical hacking and malicious hacking?

A.

Ethical hacking is illegal, while malicious hacking is legal

B.

Ethical hackers use different tools than malicious hackers

C.

Ethical hacking is performed with permission, while malicious hacking is unauthorized

D.

Ethical hackers always work alone, while malicious hackers work in teams

Full Access
Question # 37

A penetration tester runs a vulnerability scan and identifies an outdated version of a web application running on the company’s server. The scan flags this as a medium-risk vulnerability. What is the best next step for the tester?

A.

Ignore the vulnerability since it is only flagged as medium-risk

B.

Brute-force the admin login page to gain unauthorized access

C.

Perform a denial-of-service (DoS) attack to crash the web application

D.

Research the vulnerability to check for any available patches or known exploits

Full Access
Question # 38

During a cloud security assessment, you discover a former employee still has access to critical cloud resources months after leaving. Which practice would most effectively prevent this?

A.

Real-time traffic analysis

B.

Regular penetration testing

C.

Enforcing timely user de-provisioning

D.

Multi-cloud deployment

Full Access
Question # 39

A penetration tester evaluates the security of an iOS mobile application that handles sensitive user information. The tester discovers that the application is vulnerable to insecure data transmission. What is the most effective method to exploit this vulnerability?

A.

Execute a SQL injection attack to retrieve data from the backend server

B.

Perform a man-in-the-middle attack to intercept unencrypted data transmitted over the network

C.

Conduct a brute-force attack on the app’s authentication system

D.

Use a Cross-Site Request Forgery (CSRF) attack to steal user session tokens

Full Access
Question # 40

During a red team assessment, an ethical hacker must map a large multinational enterprise’s external attack surface. Due to strict rules of engagement, no active scans may be used. The goal is to identify publicly visible subdomains to uncover forgotten or misconfigured services. Which method should the ethical hacker use to passively enumerate the organization’s subdomains?

A.

Leverage tools like Netcraft or DNSdumpster to gather subdomain information

B.

Attempt to guess admin credentials and access the company’s DNS portal

C.

Conduct a brute-force DNS subdomain enumeration

D.

Request internal DNS records using spoofed credentials

Full Access
Question # 41

On July 25, 2025, during a penetration test at Horizon Financial Services in Chicago, Illinois, cybersecurity specialist Laura Bennett is analyzing an attack simulation targeting the company ' s online banking portal. The system logs reveal a coordinated barrage of traffic from multiple compromised systems, orchestrated through a central command-and-control server, flooding the portal and rendering it unavailable to legitimate users. The attack leverages a network of infected devices, likely recruited via malicious links on social media.

What is the structure or concept most likely used to launch this coordinated attack?

Full Access
Question # 42

An ethical hacker needs to gather sensitive information about a company ' s internal network without engaging directly with the organization ' s systems to avoid detection. Which method should be employed to obtain this information discreetly?

A.

Analyze the organization ' s job postings for technical details

B.

Exploit a public vulnerability in the company ' s web server

C.

Perform a WHOIS lookup on the company ' s domain registrar

D.

Use port scanning tools to probe the company ' s firewall

Full Access
Question # 43

Packet fragmentation is used as an evasion technique. Which IDS configuration best counters this?

A.

Recognizing regular fragmented packet intervals

B.

Anomaly-based IDS detecting irregular traffic patterns

C.

Rejecting all fragmented packets

D.

Signature-based IDS detecting fragmented packet signatures

Full Access
Question # 44

Which technique is least useful during passive reconnaissance?

A.

WHOIS lookup

B.

Search engines

C.

Social media monitoring

D.

Nmap scanning

Full Access
Question # 45

An IDS generates alerts during normal user activity. What is the most likely cause?

A.

Firewall failure

B.

IDS outdated

C.

Excessive IDS sensitivity causing false positives

D.

Users triggering protocols

Full Access
Question # 46

A penetration tester targets a company ' s executive assistants by referencing upcoming board meetings in an email requesting access to confidential agendas. What is the most effective social engineering technique to obtain the necessary credentials without raising suspicion?

A.

Create a personalized email referencing specific meetings and request access

B.

Call posing as a trusted IT support to verify credentials

C.

Send a mass phishing email with a fake meeting link

D.

Develop a fake LinkedIn profile to connect and request information

Full Access
Question # 47

A cybersecurity team identifies suspicious outbound network traffic. Investigation reveals malware utilizing the Background Intelligent Transfer Service (BITS) to evade firewall detection. Why would attackers use this service to conceal malicious activities?

A.

Because BITS packets appear identical to normal Windows Update traffic.

B.

Because BITS operates exclusively through HTTP tunneling.

C.

Because BITS utilizes IP fragmentation to evade intrusion detection systems.

D.

Because BITS traffic uses encrypted DNS packets.

Full Access
Question # 48

At a government research lab, cybersecurity officer Nikhil is compiling a vulnerability assessment report after scanning the internal subnet. As part of his documentation, he lists the IP addresses of all scanned hosts and specifies which machines are affected. He includes tables categorizing discovered vulnerabilities by type such as outdated software, default credentials, and open ports.

Which section of the vulnerability assessment report is Nikhil working on?

A.

Findings

B.

Risk Assessment

C.

Supporting Information

D.

Assessment Overview

Full Access
Question # 49

During a red team operation on a segmented enterprise network, the testers discover that the organization’s perimeter devices deeply inspect only connection-initiation packets (such as TCP SYN and HTTP requests). Response packets and ACK packets within established sessions, however, are minimally inspected. The red team needs to covertly transmit payloads to an internal compromised host by blending into normal session traffic. Which approach should they take to bypass these defensive mechanisms?

A.

Port knocking

B.

SYN scanning

C.

ICMP flooding

D.

ACK tunneling

Full Access
Question # 50

During an authorized wireless security assessment, an ethical hacker captures traffic between client devices and a corporate access point to evaluate the strength of the implemented encryption mechanism. Packet analysis reveals that before protected data exchange begins, the client and access point complete a structured four-message key negotiation process. Subsequent traffic is encrypted using an AES-based counter mode protocol that integrates message authentication for integrity protection. Based on these observations, identify the wireless encryption standard deployed on the network.

A.

WEP

B.

WPA

C.

WPA2

D.

WPA3

Full Access
Question # 51

A BLE attack captured LL_ENC_REQ and LL_ENC_RSP packets but not the LTK. What is the next step?

A.

Decrypt pcap using -o option

B.

Attack cannot continue without LTK

C.

Use hcitool inq

D.

Use Btlejacking

Full Access
Question # 52

A penetration tester is attacking a wireless network running WPA3 encryption. Since WPA3 handshake protections prevent offline brute-force cracking, what is the most effective approach?

A.

Downgrade the connection to WPA2 and capture the handshake to crack the key

B.

Execute a dictionary attack on the WPA3 handshake using common passwords

C.

Perform a brute-force attack directly on the WPA3 handshake

D.

Perform a SQL injection attack on the router ' s login page

Full Access
Question # 53

A penetration tester finds that a web application does not properly validate user input and is vulnerable to reflected Cross-Site Scripting (XSS). What is the most appropriate approach to exploit this vulnerability?

A.

Perform a brute-force attack on the user login form to steal credentials

B.

Embed a malicious script in a URL and trick a user into clicking the link

C.

Inject a SQL query into the search form to attempt SQL injection

D.

Use directory traversal to access sensitive files on the server

Full Access
Question # 54

Which countermeasure best mitigates brute-force attacks on Bluetooth SSP?

A.

Use BLE exclusively

B.

Increase Diffie-Hellman key length

C.

Apply rate-limiting

D.

Device whitelisting

Full Access
Question # 55

A penetration tester targets a WPA2-PSK wireless network. The tester captures the handshake and wants to speed up cracking the pre-shared key. Which approach is most effective?

A.

Conduct a Cross-Site Scripting (XSS) attack on the router ' s login page

B.

Use a brute-force attack to crack the pre-shared key manually

C.

Use a dictionary attack with a large wordlist to crack the WPA2 key

D.

Perform a SQL injection attack to bypass the WPA2 authentication

Full Access
Question # 56

A penetration tester is conducting an external assessment of a corporate web server. They start by accessing https://www.targetcorp.com/robots.txt and observe multiple Disallow entries that reference directories such as /admin-panel/, /backup/, and /confidentialdocs/. When the tester directly visits these paths via a browser, they find that access is not restricted by authentication and gain access to sensitive files, including server configuration and unprotected credentials. Which stage of the web server attack methodology is demonstrated in this scenario?

A.

Injecting malicious SQL queries to access sensitive database records

B.

Performing a cross-site request forgery (CSRF) attack to manipulate user actions

C.

Gathering information through exposed indexing instructions

D.

Leveraging the directory traversal flaw to access critical server files

Full Access
Question # 57

A penetration tester evaluates a secure web application using HTTPS, secure cookies, and multi-factor authentication. To hijack a legitimate user’s session without triggering alerts, which technique should be used?

A.

Exploit a browser zero-day vulnerability to inject malicious scripts

B.

Implement a man-in-the-middle attack by compromising a trusted network device

C.

Perform a Cross-Site Request Forgery (CSRF) attack to manipulate session tokens

D.

Utilize a session token replay attack by capturing encrypted tokens

Full Access
Question # 58

You are Jordan, a cryptographic assessor at Cascade Data in Portland, Oregon, reviewing the protection applied to telemetry logs. Your review finds an algorithm that operates on 128-bit blocks, accepts keys up to 256 bits, and the documentation notes it was one of the finalists in the AES selection process that aimed to replace legacy DES. Which symmetric encryption algorithm should you identify as being used?

A.

RC4

B.

AES

C.

Blowfish

D.

Twofish

Full Access
Question # 59

During a red team operation on a segmented enterprise network, the testers discover that the organization’s perimeter devices deeply inspect only connection-initiation packets (such as TCP SYN and HTTP requests). Response packets and ACK packets within established sessions, however, are minimally inspected. The red team needs to covertly transmit payloads to an internal compromised host by blending into normal session traffic. Which approach should they take to bypass these defensive mechanisms?

A.

Port knocking

B.

SYN scanning

C.

ICMP flooding

D.

ACK tunneling

Full Access
Question # 60

A penetration tester is running a vulnerability scan on a company’s network. The scan identifies an open port with a high-severity vulnerability linked to outdated software. What is the most appropriate next step for the tester?

A.

Execute a denial-of-service (DoS) attack on the open port

B.

Perform a brute-force attack on the service running on the open port

C.

Research the vulnerability and determine if it has a publicly available exploit

D.

Ignore the vulnerability and focus on finding more vulnerabilities

Full Access
Question # 61

A WPA2-PSK wireless network is tested. Which method would allow identification of a key vulnerability?

A.

De-authentication attack to capture the four-way handshake

B.

MITM to steal the PSK directly

C.

Jamming to force PSK disclosure

D.

Rogue AP revealing PSK

Full Access
Question # 62

A penetration tester is testing a web application ' s product search feature, which takes user input and queries the database. The tester suspects inadequate input sanitization. What is the best approach to confirm the presence of SQL injection?

A.

Inject a script to test for Cross-Site Scripting (XSS)

B.

Input DROP TABLE products; -- to see if the table is deleted

C.

Enter 1 ' OR ' 1 ' = ' 1 to check if all products are returned

D.

Use directory traversal syntax to access restricted files on the server

Full Access
Question # 63

A penetration tester identifies malware that monitors the activities of a user and secretly collects personal information, such as login credentials and browsing habits. What type of malware is this?

A.

Worm

B.

Rootkit

C.

Spyware

D.

Ransomware

Full Access
Question # 64

A cybersecurity company wants to prevent attackers from gaining information about its encrypted traffic patterns. Which of the following cryptographic algorithms should they utilize?

A.

HMAC

B.

RSA

C.

DES

D.

AES

Full Access
Question # 65

A penetration tester is tasked with identifying vulnerabilities on a web server running outdated software. The server hosts several web applications and is protected by a basic firewall. Which technique should the tester use to exploit potential server vulnerabilities?

A.

Conduct a SQL injection attack on the web application ' s login form

B.

Perform a brute-force login attack on the admin panel

C.

Execute a buffer overflow attack targeting the web server software

D.

Use directory traversal to access sensitive configuration files

Full Access
Question # 66

A senior executive receives a personalized email titled “Annual Performance Review 2024.” The email includes a malicious PDF that installs a backdoor when opened. The message appears to originate from the CEO and uses official company branding. Which phishing technique does this scenario best illustrate?

A.

Email clone attack with altered attachments

B.

Broad phishing sent to all employees

C.

Pharming using DNS poisoning

D.

Whaling attack targeting high-ranking personnel

Full Access
Question # 67

During a red team simul-ation, an attacker crafts packets with malformed checksums so the IDS accepts them but the target silently discards them. Which evasion technique is being employed?

A.

Insertion attack

B.

Polymorphic shellcode

C.

Session splicing

D.

Fragmentation attack

Full Access
Question # 68

A system analyst wants to implement an encryption solution that allows secure key distribution between communicating parties. Which encryption method should the analyst consider?

A.

Disk encryption

B.

Symmetric encryption

C.

Hash functions

D.

Asymmetric encryption

Full Access
Question # 69

A financial technology firm in Atlanta, Georgia launches an internal investigation after multiple employees report that a popular messaging application on their Android devices has begun displaying excessive advertisements and behaving unpredictably. Security analysts discover that users had installed a utility application from a third-party marketplace weeks earlier. Further examination shows that this application silently replaced certain legitimate apps already present on the device. The compromised applications were then used to generate large volumes of advertisements and collect user data for external transmission. Based on the observed behavior, what malware is most consistent with this incident?

A.

Mamo

B.

Pegasus

C.

Agent Smith

D.

GoldPickaxe

Full Access
Question # 70

A cybersecurity company wants to prevent attackers from gaining information about its encrypted traffic patterns. Which of the following cryptographic algorithms should they utilize?

A.

HMAC

B.

RSA

C.

DES

D.

AES

Full Access
Question # 71

As a network administrator, you explain to your team that a recent DDoS attack targeted the application layer of your company’s web server. Which type of DDoS attack was most likely used?

A.

HTTP flood attack

B.

UDP flood attack

C.

ICMP flood attack

D.

SYN flood attack

Full Access
Question # 72

During a security assessment of an internal network, a penetration tester discovers that UDP port 123 is open, indicating that the NTP service is active. The tester wants to enumerate NTP peers, check synchronization status, offset, and stratum levels. Which command should the tester use?

A.

ntpdc

B.

ntpq

C.

ntptrace

D.

ntpdate

Full Access
Question # 73

During an ethical hacking exercise, a security analyst is testing a web application that manages confidential information and suspects it may be vulnerable to SQL injection. Which payload would most likely reveal whether the application is vulnerable to time-based blind SQL injection?

A.

UNION SELECT NULL, NULL, NULL--

B.

' OR ' 1 ' = ' 1 ' --

C.

' OR IF(1=1,SLEEP(5),0)--

D.

AND UNION ALL SELECT ' admin ' , ' admin ' --

Full Access
Question # 74

A multinational company plans to deploy an IoT-based environmental control system across global manufacturing units. The security team must identify the most likely attack vector an Advanced Persistent Threat (APT) group would use to compromise the system. What is the most plausible method?

A.

Launching a DDoS attack to overload IoT devices

B.

Compromising the system using stolen user credentials

C.

Exploiting zero-day vulnerabilities in IoT device firmware

D.

Performing an encryption-based Man-in-the-Middle attack

Full Access
Question # 75

As a Certified Ethical Hacker assessing session management vulnerabilities in a secure web application using MFA, encrypted cookies, and a WAF, which technique would most effectively exploit a session management weakness while bypassing these defenses?

A.

Utilizing Session Fixation to force a victim to use a known session ID

B.

Executing a Cross-Site Request Forgery (CSRF) attack

C.

Exploiting insecure deserialization vulnerabilities for code execution

D.

Conducting Session Sidejacking using captured session tokens

Full Access
Question # 76

In downtown Chicago, Illinois, security analyst Mia Torres investigates a breach at Windy City Enterprises, a logistics firm running an Apache HTTP Server. The attacker exploited a known vulnerability in an outdated version, gaining unauthorized access to customer shipment data. Mia ' s analysis reveals the server lacked recent security updates, leaving it susceptible to remote code execution. Determined to prevent future incidents, Mia recommends a strategy to the IT team to address this exposure. Which approach should Mia recommend to secure Windy City Enterprises ' Apache HTTP Server against such vulnerabilities?

A.

Conduct an extensive risk assessment to determine which segments of the network are most vulnerable or at high risk that need to be patched first

B.

Use a dedicated machine as a web server

C.

Block all unnecessary ports, ICMP traffic, and unnecessary protocols such as NetBIOS and SMB

D.

Eliminate unnecessary files within the jar files

Full Access
Question # 77

A penetration tester has gained access to a target system using default credentials. What is the most effective next step to escalate privileges on the system?

A.

Perform a denial-of-service (DoS) attack to crash the system

B.

Use a known local privilege escalation vulnerability to gain admin access

C.

Execute a Cross-Site Scripting (XSS) attack on the system ' s login page

D.

Use a dictionary attack to brute-force the root password

Full Access
Question # 78

During a red team exercise, a Certified Ethical Hacker (CEH) is attempting to exploit a potential vulnerability in a target organization’s web server. The CEH has completed the information gathering and footprinting phases and has mirrored the website for offline analysis. It has also been discovered that the server is vulnerable to session hijacking. Which of the following steps is most likely to be part of a successful attack methodology while minimizing the possibility of detection?

A.

Hijack an active session and immediately modify server configuration files.

B.

Attempt SQL injection to extract sensitive database information.

C.

Perform vulnerability scanning using automated tools to identify additional weaknesses.

D.

Launch a direct brute-force attack to crack the server’s administrative password.

Full Access
Question # 79

During a penetration test at a technology startup in Austin, Texas, an ethical hacker is tasked with evaluating defenses against stealthy scanning techniques. She selects an approach that involves sending TCP packets with no flags, relying on the way target systems respond to infer whether ports are open or closed. This allows her to remain less visible to intrusion detection systems compared to a full handshake. Which scanning method is she using?

A.

TCP Connect Scan

B.

FIN Scan

C.

NULL Scan

D.

ACK Scan

Full Access
Question # 80

An attacker examines differences in ciphertext outputs resulting from small changes in the input to deduce key patterns in a symmetric algorithm. What method is being employed?

A.

Differential cryptanalysis on input-output differences

B.

Timing attack to infer key bits based on processing time

C.

Brute-force attack to try every possible key

D.

Chosen-ciphertext attack to decrypt arbitrary ciphertexts

Full Access
Question # 81

In the bustling financial hub of Charlotte, North Carolina, ethical hacker Raj Patel is contracted by TrustBank, a regional US bank, to evaluate their online loan application portal. On April 22, 2025, Raj tests a feature allowing customers to upload structured financial documents for loan processing. By submitting a specially crafted document, he triggers a response that exposes internal server file paths and sensitive configuration data, including database connection strings. The issue arises from the portal ' s handling of external references in document parsing, not from response manipulation, authentication weaknesses, or undetected attack attempts. Raj compiles a detailed report to assist TrustBank ' s security team in mitigating the vulnerability.

Which type of vulnerability is Raj most likely exploiting in TrustBank ' s online loan application portal?

A.

Identification and Authentication Failures

B.

HTTP Response Splitting

C.

XML External Entity (XXE) Injection

D.

Security Logging and Monitoring Failures

Full Access
Question # 82

A city’s power management system relies on SCADA infrastructure. Recent anomalies include inconsistent sensor readings and intermittent outages. Security analysts suspect a side-channel attack designed to extract sensitive information covertly from SCADA devices. Which investigative technique would best confirm this type of attack?

A.

Measuring unusual physical or electrical fluctuations during device operation at the hardware level.

B.

Identifying weak cryptographic configurations in device communications.

C.

Assessing SCADA user interfaces for unauthorized access or misuse.

Full Access
Question # 83

Amid the vibrant buzz of Miami’s digital scene, ethical hacker Sofia Alvarez embarks on a mission to fortify the web server of Sunshine Media’s streaming platform. Diving into her security assessment, Sofia sends a meticulously crafted GET / HTTP/1.0 request to the server, scrutinizing its response. The server obligingly returns headers exposing its software version and operating system, a revelation that could empower malicious actors to tailor their attacks. Committed to bolstering the platform’s defenses, Sofia documents her findings to urge the security team to address this exposure.

What approach is Sofia using to expose the vulnerability in Sunshine Media’s web server?

A.

Information Gathering from Robots.txt File

B.

Vulnerability Scanning

C.

Directory Brute Forcing

D.

Web Server Footprinting Banner Grabbing

Full Access
Question # 84

In Denver, Colorado, ethical hacker Sophia Nguyen is hired by Rocky Mountain Insurance to assess the effectiveness of their network security controls. During her penetration test, she attempts to evade the company ' s firewall by fragmenting malicious packets to avoid detection. The IT team, aware of such techniques, has implemented a security measure to analyze packet contents beyond standard headers. Sophia ' s efforts are thwarted as the system identifies and blocks her fragmented packets.

Which security measure is the IT team most likely using to counter Sophia ' s firewall evasion attempt?

A.

Deep Packet Inspection

B.

Anomaly-Based Detection

C.

Signature-Based Detection

D.

Stateful Packet Inspection

Full Access
Question # 85

During a cloud security assessment, you discover a former employee still has access to critical cloud resources months after leaving. Which practice would most effectively prevent this?

A.

Real-time traffic analysis

B.

Regular penetration testing

C.

Enforcing timely user de-provisioning

D.

Multi-cloud deployment

Full Access
Question # 86

You are Liam Chen, an ethical hacker at CyberGuard Analytics, hired to test the social engineering defenses of Coastal Trends, a retail chain in Los Angeles, California. During a covert assessment, you craft a deceptive message sent to the employees’ company phones, claiming a critical account update is needed and directing them to a link that installs monitoring software. Several employees interact with the link, exposing a vulnerability to a specific mobile attack vector. Based on this approach, which mobile attack type are you simulating?

A.

Bluebugging

B.

SMS Phishing

C.

Call Spoofing

D.

OTP Hijacking

Full Access
Question # 87

A tester evaluates a login form that constructs SQL queries using unsanitized user input. By submitting ' C ' ll-T; —, the tester gains unauthorized access to the application. What type of SQL injection has occurred?

A.

Tautology-based SQL injection

B.

Error-based SQL injection

C.

Union-based SQL injection

D.

Time-based blind SQL injection

Full Access
Question # 88

An attacker analyzes how small changes in plaintext input affect ciphertext output to deduce encryption key patterns in a symmetric algorithm. What technique is being used?

A.

Differential cryptanalysis

B.

Timing attack

C.

Chosen-ciphertext attack

D.

Brute-force attack

Full Access
Question # 89

A hacker is analyzing a system that uses two rounds of symmetric encryption with different keys. To speed up key recovery, the attacker encrypts the known plaintext with all possible values of the first key and stores the intermediate ciphertexts. Then, they decrypt the final ciphertext using all possible values of the second key and compare the results to the stored values. Which cryptanalytic method does this approach represent?

A.

Flood memory with brute-forced credentials

B.

Scrape electromagnetic leakage for bits

C.

Use midpoint collision to identify key pair

D.

Reverse permutations to bypass encryption

Full Access
Question # 90

Which advanced session hijacking technique is hardest to detect and mitigate in a remote-access environment?

A.

Session sidejacking over public Wi-Fi

B.

ARP spoofing on local networks

C.

Brute-force session guessing

D.

Cookie poisoning

Full Access
Question # 91

An Android device has an unpatched permission-handling flaw and updated antivirus. What is the most effective undetected exploitation approach?

A.

SMS phishing

B.

Rootkit installation

C.

Custom exploit with obfuscation

D.

Metasploit payload

Full Access
Question # 92

A known vulnerability exists on a production server, but patching is delayed due to operational constraints. What immediate action can reduce risk without disrupting operations?

A.

Conduct a full penetration test

B.

Shut down the server

C.

Monitor traffic continuously

D.

Implement Virtual Patching

Full Access
Question # 93

A penetration tester discovers that a web application uses unsanitized user input to dynamically generate file paths. The tester identifies that the application is vulnerable to Remote File Inclusion (RFI). Which action should the tester take to exploit this vulnerability?

A.

Inject a SQL query into the input field to perform SQL injection

B.

Use directory traversal to access sensitive system files on the server

C.

Provide a URL pointing to a remote malicious script to include it in the web application

D.

Upload a malicious shell to the server and execute commands remotely

Full Access
Question # 94

You are performing a security audit for a regional hospital in Dallas, Texas. While monitoring the network, you discover that an unknown actor has been silently capturing clear-text credentials and analyzing unencrypted traffic flowing across the internal Wi-Fi network. No modifications have been made to the data, and the attack remained undetected until your assessment. Based on this activity, what type of attack is most likely being conducted?

A.

Passive attack

B.

Distribution attack

C.

Close-in attack

D.

Insider attack

Full Access
Question # 95

A penetration tester alters the " file " parameter in a web application (e.g., view?file=report.txt) to ../../../../etc/passwd and successfully accesses restricted system files. What attack method does this scenario illustrate?

A.

Conduct a brute-force attack to obtain administrative credentials

B.

Use directory traversal sequences in URL parameters to retrieve unauthorized system content

C.

Inject malicious scripts into web pages to manipulate content via XSS vulnerabilities

D.

Exploit buffer overflow issues by injecting oversized data in HTTP request headers

Full Access
Question # 96

A penetration tester finds malware that spreads across a network without user interaction, replicating itself from one machine to another. What type of malware is this?

A.

Keylogger

B.

Ransomware

C.

Virus

D.

Worm

Full Access
Question # 97

In the vibrant startup scene of Austin, Texas, ethical hacker Daniel Ruiz is hired by TechNexus, a U.S.-based logistics software provider, to evaluate their internal administration portal. During testing, Daniel observes that certain input fields forward user-supplied data directly to underlying system functions. By carefully crafting his entries, he is able to trigger execution of unexpected system commands, resulting in unauthorized control over the operating environment. His findings reveal that the flaw stems from poor validation of input processed by system-level functions.

Which vulnerability is Daniel most likely demonstrating?

A.

Shell Injection

B.

LDAP Injection

C.

SQL Injection

D.

Cross-Site Scripting (XSS)

Full Access
Question # 98

In Portland, Oregon, ethical hacker Olivia Harper is hired by Cascade Biotech to test the security of their research network. During her penetration test, she simulates an attack by sending malicious packets to a server hosting sensitive genetic data. To evade detection, she needs to understand the monitoring system deployed near the network’s perimeter firewall, which analyzes incoming and outgoing traffic for suspicious patterns across the entire subnet. Olivia’s goal is to bypass this system to highlight vulnerabilities for the security team.

Which security system is Olivia attempting to bypass during her penetration test of Cascade Biotech’s network?

A.

Network-Based Intrusion Detection System

B.

Host-Based Firewalls

C.

Network-Based Firewalls

D.

Host-Based Intrusion Detection System

Full Access
Question # 99

A payload causes a significant delay in response without visible output when testing an Oracle-backed application. What SQL injection technique is being used?

A.

Time-based SQL injection using WAITFOR DELAY

B.

Heavy query-based SQL injection

C.

Union-based SQL injection

D.

Out-of-band SQL injection

Full Access
Question # 100

A senior executive receives a personalized email titled “Annual Performance Review 2024.” The email includes a malicious PDF that installs a backdoor when opened. The message appears to originate from the CEO and uses official company branding. Which phishing technique does this scenario best illustrate?

A.

Email clone attack with altered attachments

B.

Broad phishing sent to all employees

C.

Pharming using DNS poisoning

D.

Whaling attack targeting high-ranking personnel

Full Access
Question # 101

During a red team engagement at a manufacturing company in Dallas, penetration tester Tyler gains access to a Windows workstation. Later in the exercise, he reviews his exfiltrated logs and finds detailed records of employee logins, email drafts, and sensitive data entered into desktop applications. The collection occurred without requiring browser injection or physical device access, and no kernel drivers were installed.

Which type of keylogger did Tyler most likely deploy?

A.

JavaScript Keylogger

B.

Hardware Keylogger

C.

Kernel Keylogger

D.

Application Keylogger

Full Access
Question # 102

During an IDS audit, you notice numerous alerts triggered by legitimate user activity. What is the most likely cause?

A.

Regular users are unintentionally triggering security protocols

B.

The firewall is failing to block malicious traffic

C.

The IDS is outdated and unpatched

D.

The IDS is configured with overly sensitive thresholds

Full Access
Question # 103

Maya Patel from SecureHorizon Consulting is called to investigate a security breach at Dallas General Hospital in Dallas, Texas, where a lost employee smartphone was used to access sensitive patient records. During her analysis, Maya finds that the hospital ' s mobile security policy failed to include a contingency to remotely secure compromised devices, allowing continued access to confidential data even after the device was lost. Based on this gap, which mobile security guideline should Maya recommend preventing similar incidents?

A.

Utilize a secure VPN connection while accessing public Wi-Fi networks

B.

Install device tracking software that allows the device to be located remotely

C.

Register devices with a remote locate and wipe facility

D.

Use anti-virus and data loss prevention DLP solutions

Full Access
Question # 104

You are Evelyn, an ethical hacker at LoneStar Health in Austin, Texas, engaged to investigate a recent compromise of archived patient records. During the investigation you recover a large set of encrypted records from a compromised backup and, separately, obtain several original template records (standard headers and form fields) that correspond to some entries in the encrypted set. You plan to use these paired examples (the original templates and their encrypted counterparts) to attempt to recover keys or deduce other plaintext values. Which cryptanalytic approach is most appropriate for this situation?

A.

Chosen-ciphertext attack

B.

Known-plaintext attack

C.

Chosen-plaintext attack

D.

Ciphertext-only attack

Full Access
Question # 105

During an internal assessment, a penetration tester gains access to a hash dump containing NTLM password hashes from a compromised Windows system. To crack the passwords efficiently, the tester uses a high-performance CPU setup with Hashcat, attempting millions of password combinations per second. Which technique is being optimized in this scenario?

A.

Spoof NetBIOS to impersonate a file server

B.

Leverage hardware acceleration for cracking speed

C.

Dump SAM contents for offline password retrieval

D.

Exploit dictionary rules with appended symbols

Full Access
Question # 106

A company hires a hacker to test its network security by simulating real-world attacks. The hacker has permission and operates within legal boundaries. What is this type of hacker called?

A.

Script Kiddie

B.

Black Hat Hacker

C.

Grey Hat Hacker

D.

White Hat Hacker

Full Access
Question # 107

During a penetration testing engagement at First Union Bank in Chicago, ethical hacker Rachel Morgan is assigned to assess the internal network for potential sniffing activity that could compromise sensitive customer data. While inspecting traffic in the loan processing department, Rachel observes that a workstation is receiving packets not addressed to it, raising suspicion of a sniffing tool operating in promiscuous mode. To validate her hypothesis, she prepares to conduct an active verification using a classic detection approach.

Which detection technique should Rachel use to confirm the presence of a sniffer in this case?

A.

Sniffer detection using an NSE script to check for promiscuous mode

B.

DNS method by monitoring reverse DNS lookup traffic

C.

ARP method by sending non-broadcast ARP requests

D.

Ping method by sending packets with an incorrect MAC address

Full Access
Question # 108

During a red team engagement at a healthcare organization in Chicago, ethical hacker Devon intercepts Kerberos authentication material from a compromised workstation. Instead of cracking the data, he reuses the stolen tickets to authenticate directly to other systems within the domain. This allows him to access shared resources and servers without needing the users ' plaintext credentials. No NTLM hashes or broadcast poisoning were involved.

Which attack technique did Devon most likely perform?

A.

LLMNR/NBT-NS Poisoning

B.

Pass-the-Ticket Attack

C.

Kerberoasting

D.

Pass-the-Hash

Full Access
Question # 109

An attacker performs DNS cache snooping using the dig command with the +norecurse flag against a known DNS server. The server returns NOERROR but provides no answer to the query. What does this most likely suggest?

A.

The record was found in the DNS cache and successfully returned.

B.

The DNS server failed to resolve the request.

C.

No client from the DNS server’s network has recently accessed the queried domain.

D.

The queried domain has expired and no longer exists.

Full Access
Question # 110

In the bustling tech hub of Boston, Massachusetts, ethical hacker Zara Nguyen dives into the digital fortifications of CloudCrafter, a US-based platform hosting web applications for small businesses. Tasked with probing the application’s input processing, Zara submits specially crafted inputs to a server administration panel. Her tests uncover a severe vulnerability: the system performs unintended operations at the system level, enabling access to restricted server resources. Further scrutiny reveals the flaw lies in the application’s failure to sanitize user input passed to system-level execution, not in altering directory service queries, injecting newline characters, or targeting cloud-specific environments. Dedicated to strengthening the platform, Zara drafts a precise report to guide CloudCrafter’s security team toward urgent fixes.

Which injection attack type is Zara most likely exploiting in CloudCrafter’s web application?

A.

Shell Injection

B.

CRLF Injection

C.

LDAP Injection

D.

Command Injection

Full Access
Question # 111

A penetration tester identifies malware on a system that hides its presence and gives an attacker access to administrative functions without being detected. What type of malware is this?

A.

Virus

B.

Keylogger

C.

Ransomware

D.

Rootkit

Full Access
Question # 112

As part of a penetration test for a financial firm’s smart headquarters in Denver, Colorado, ethical hacker Jordan Lee begins evaluating the IoT infrastructure responsible for lighting, HVAC, and badge-controlled access. Jordan documents details such as device models, manufacturer names, firmware versions, and supported protocols like Zigbee and BLE. This information is used to understand the device ecosystem. Which step of the IoT hacking methodology is being carried out in this phase?

A.

Information gathering

B.

Launch attacks

C.

Vulnerability scanning

D.

Gain remote access

Full Access
Question # 113

On 10th of July this year, during a security penetration test at IntelliCore Systems in Raleigh, North Carolina, the ethical hacking team evaluates the stability of the company’s file-sharing server. Sofia crafts and transmits a sequence of oversized, malformed packets designed to test how the server handles unexpected input. Shortly after, the system begins crashing intermittently due to processing failures triggered by these anomalous network requests. The security team onsite is tasked with identifying the root cause behind the packet-induced instability and attributing it to a known DoS tactic.

Which of the following best explains the technique Sofia used to trigger the server crashes?

A.

ICMP Flood Attack

B.

Ping of Death PoD

C.

Smurf Attack

D.

ACK Flood Attack

Full Access
Question # 114

During an external assessment of a healthcare insurance company in Houston, a penetration tester identifies a service running on TCP port 389. When queried, the service accepts anonymous binds and reveals directory data. By structuring his search filter, the tester is able to obtain usernames, departmental details, and organizational units. This information could potentially be used for targeted password attacks or privilege escalation.

Which classification best describes this enumeration activity?

A.

SMTP Enumeration

B.

DNS Enumeration

C.

LDAP Enumeration

D.

NTP Enumeration

Full Access
Question # 115

During a red team assessment of an enterprise LAN environment, the tester discovers an access switch that connects multiple internal workstations. The switch has no port security measures in place. To silently intercept communication between different hosts without deploying ARP poisoning or modifying the routing table, the tester launches a MAC flooding attack using the macof utility from the dsniff suite. This command sends thousands of Ethernet frames per minute, each with random, spoofed source MAC addresses. Soon after the flooding begins, the tester puts their network interface into promiscuous mode and starts capturing packets. They observe unicast traffic between internal machines appearing in their packet sniffer—traffic that should have been isolated. What internal switch behavior is responsible for this sudden exposure of isolated traffic?

A.

The switch performed ARP spoofing to misroute packets.

B.

The switch entered hub-like behavior due to a full CAM table.

C.

The interface performed DHCP starvation to capture broadcasts.

D.

The switch disabled MAC filtering due to duplicate address conflicts.

Full Access
Question # 116

During a high-stakes engagement, a penetration tester abuses MS-EFSRPC to force a domain controller to authenticate to an attacker-controlled server. The tester captures the NTLM hash and relays it to AD CS to obtain a certificate granting domain admin privileges. Which network-level hijacking technique is illustrated?

A.

Hijacking sessions using a PetitPotam relay attack

B.

Exploiting vulnerabilities in TLS compression via a CRIME attack

C.

Stealing session tokens using browser-based exploits

D.

Employing a session donation method to transfer tokens

Full Access
Question # 117

A malware analyst finds JavaScript and /OpenAction keywords in a suspicious PDF using pdfid. What should be the next step to assess the potential impact?

A.

Upload the file to VirusTotal

B.

Extract and analyze stream objects using PDFStreamDumper

C.

Compute file hashes for signature matching

Full Access
Question # 118

A penetration tester is hired to legally assess the security of a company ' s network by identifying vulnerabilities and attempting to exploit them. What type of hacker is this?

A.

Black Hat

B.

Grey Hat

C.

Script Kiddie

D.

White Hat

Full Access
Question # 119

Which approach should an ethical hacker avoid to maintain passive reconnaissance?

A.

Direct interaction with the threat actor

B.

WHOIS and DNS lookups

C.

Anonymous browsing via Tor

D.

Using the Wayback Machine

Full Access
Question # 120

In Seattle, Washington, ethical hacker Mia Chen is hired by Pacific Trust Bank to test the security of their corporate network, which stores sensitive customer financial data. During her penetration test, Mia conducts a thorough reconnaissance, targeting a server that appears to host a critical database of transaction records. As she interacts with the server, she notices it responds promptly to her queries but occasionally returns error messages that seem inconsistent with a production system’s behavior, such as unexpected protocol responses. Suspicious that this server might be a decoy designed to monitor her actions, Mia applies a technique to detect inconsistencies that may reveal the system as a honeypot.

Which technique is Mia most likely using to determine if the server at Pacific Trust Bank is a honeypot?

A.

Analyzing Response Time

B.

Analyzing MAC Address

C.

Fingerprinting the Running Service

D.

Analyzing System Configuration and Metadata

Full Access
Question # 121

In your role as a cybersecurity analyst at a large e-commerce company, you have been tasked with reinforcing the firm’s defenses against potential Denial-of-Service (DoS) attacks. During a recent review, you noticed several IP addresses generating excessive traffic, causing an unusually high server load. Inspection of packets revealed that the TCP three-way handshake was never completed, leaving multiple connections in a SYN_RECEIVED state. The intent appears to be saturating server resources without completing connections. Which type of DoS attack is most likely being executed?

A.

SYN Flood

B.

Smurf Attack

C.

Ping of Death

D.

UDP Flood

Full Access
Question # 122

A financial services firm is experiencing a sophisticated DoS attack on their DNS servers using DNS amplification and on their web servers using HTTP floods. Traditional firewall rules and IDS are failing to mitigate the attack effectively. To protect their infrastructure without impacting legitimate users, which advanced mitigation strategy should the firm implement?

A.

Increase server capacity and implement simple rate limiting

B.

Block all incoming traffic from suspicious IP ranges using access control lists

C.

Deploy a Web Application Firewall (WAF) to filter HTTP traffic

D.

Utilize a cloud-based DDoS protection service with traffic scrubbing capabilities

Full Access
Question # 123

You discover an unpatched Android permission-handling vulnerability on a device with fully updated antivirus software. What is the most effective exploitation approach that avoids antivirus detection?

A.

Develop a custom exploit using obfuscation techniques

B.

Use Metasploit to deploy a known payload

C.

Install a rootkit to manipulate the device

D.

Use SMS phishing to trick the user

Full Access
Question # 124

A penetration tester is mapping a Windows-based internal network. The tester notices that TCP port 139 and UDP port 137 are open on multiple systems. File and printer sharing is enabled. To retrieve hostnames, user details, and domain roles without triggering alerts, which tool and method would be most effective?

A.

Perform LDAP enumeration via anonymous bind

B.

Use pspasswd to change remote passwords

C.

Run nbtstat -A to query the NetBIOS name table

D.

Use psloggedon to retrieve remote login sessions

Full Access
Question # 125

A penetration tester is assessing an organization ' s cloud infrastructure and discovers misconfigured IAM policies on storage buckets. The IAM settings grant read and write permissions to any authenticated user. What is the most effective way to exploit this misconfiguration?

A.

Use leaked API keys to access the cloud storage buckets and exfiltrate data

B.

Execute a SQL injection attack on the organization ' s website to retrieve sensitive information

C.

Create a personal cloud account to authenticate and access the misconfigured storage buckets

D.

Perform a Cross-Site Scripting (XSS) attack on the cloud management portal to gain access

Full Access
Question # 126

Which social engineering attack involves impersonating a co-worker or authority figure to extract confidential information?

A.

Phishing

B.

Pretexting

C.

Quid pro quo

D.

Baiting

Full Access
Question # 127

A cybersecurity analyst monitors competitors’ web content for changes indicating strategic shifts. Which missing component is most crucial for effective passive surveillance?

A.

Participating in competitors’ blogs and forums

B.

Setting up Google Alerts for competitor names and keywords

C.

Using a VPN to hide the analyst’s IP address

D.

Hiring a third party to hack competitor databases

Full Access
Question # 128

During a red team assessment of an enterprise LAN environment, the tester discovers an access switch that connects multiple internal workstations. The switch has no port security measures in place. To silently intercept communication between different hosts without deploying ARP poisoning or modifying the routing table, the tester launches a MAC flooding attack using the macof utility from the dsniff suite. This command sends thousands of Ethernet frames per minute, each with random, spoofed source MAC addresses. Soon after the flooding begins, the tester puts their network interface into promiscuous mode and starts capturing packets. They observe unicast traffic between internal machines appearing in their packet sniffer—traffic that should have been isolated. What internal switch behavior is responsible for this sudden exposure of isolated traffic?

A.

The switch performed ARP spoofing to misroute packets.

B.

The switch entered hub-like behavior due to a full CAM table.

C.

The interface performed DHCP starvation to capture broadcasts.

D.

The switch disabled MAC filtering due to duplicate address conflicts.

Full Access
Question # 129

A penetration tester identifies that a web application ' s login form is not using secure password hashing mechanisms, allowing attackers to steal passwords if the database is compromised. What is the best approach to exploit this vulnerability?

A.

Perform a dictionary attack using a list of commonly used passwords against the stolen hash values

B.

Input a SQL query to check for SQL injection vulnerabilities in the login form

C.

Conduct a brute-force attack on the login form to guess weak passwords

D.

Capture the login request using a proxy tool and attempt to decrypt the passwords

Full Access
Question # 130

At Bayview University in San Francisco, California, ethical hacker Sofia Patel is evaluating security controls on Android 11 tablets used by staff. To simulate an attack, she installs KingoRoot.apk directly on one of the devices. The application leverages system vulnerabilities to elevate privileges without requiring a computer connection. Based on the module, which feature of this rooting approach makes the attack effective?

A.

It uses a tethered jailbreak to restart the device with patched kernel functions

B.

It is an APK that can run directly on the device without a PC

C.

It relies on weak SSL validation to bypass application controls

D.

It exploits Bluetooth pairing flaws to gain device-level privileges

Full Access
Question # 131

A security analyst is tasked with gathering detailed information about an organization ' s network infrastructure without making any direct contact that could be logged or trigger alarms. Which method should the analyst use to obtain this information covertly?

A.

Examine leaked documents or data dumps related to the organization

B.

Use network mapping tools to scan the organization ' s IP range

C.

Initiate social engineering attacks to elicit information from employees

D.

Perform a DNS brute-force attack to discover subdomains

Full Access
Question # 132

Systems are communicating with unknown external entities, raising concerns about exfiltration or malware. Which strategy most directly identifies and mitigates the risk?

A.

Aggressive zero-trust shutdown

B.

Deep forensic analysis

C.

Behavioral analytics profiling normal interactions

D.

Employee awareness training

Full Access
Question # 133

Working as an Information Security Analyst, you are creating training material on session hijacking. Which scenario best describes a side jacking attack?

A.

An attacker uses social engineering to trick an employee into revealing their password.

B.

An attacker intercepts network traffic, captures unencrypted session cookies, and uses these to impersonate the user.

C.

An attacker exploits a firewall vulnerability to gain access to internal systems.

D.

An attacker convinces an employee to visit a malicious site that injects a script into their browser.

Full Access
Question # 134

On July 25, 2025, during a security assessment at Apex Technologies in Boston, Massachusetts, ethical hacker Sophia Patel conducts a penetration test to evaluate the company’s defenses against a simulated DDoS attack targeting their e-commerce platform. The simulated attack floods the platform with traffic from multiple sources, attempting to overwhelm server resources. The IT team activates a specific tool that successfully mitigates this attack by distributing traffic across multiple servers and filtering malicious requests. Sophia’s test aims to verify the effectiveness of this tool in maintaining service availability.

Which DoS DDoS protection tool is most likely being utilized by the IT team in this scenario?

A.

Web Application Firewall WAF

B.

Load Balancer

C.

Intrusion Prevention System IPS

D.

Firewall

Full Access
Question # 135

A cybersecurity consultant suspects attackers are attempting to evade an Intrusion Detection System (IDS). Which technique is most likely being used?

A.

Deploying self-replicating malware

B.

Fragmenting malicious packets into smaller segments

C.

Flooding the IDS with ICMP packets

D.

Sending phishing emails

Full Access
Question # 136

At Norwest Freight Services, Simon, a junior analyst, is tasked with running a vulnerability scan on several departmental servers. This time, he is provided with administrator-level credentials to input into the scanner. The scan takes significantly longer than usual but returns detailed results, including weak registry permissions, outdated patches, and insecure configuration files that would not have been visible to an outsider. SIEM logs confirm that successful logins occurred during the scanning process.

Which type of vulnerability scan best explains the behavior observed in Simon ' s assessment?

A.

External Scanning

B.

Credentialed Scanning

C.

Internal Scanning

D.

Non-Credentialed Scanning

Full Access
Question # 137

A Nessus scan reveals a critical SSH vulnerability (CVSS 9.0) allowing potential remote code execution on a Linux server. What action should be immediately prioritized?

A.

Redirect SSH traffic to another server

B.

Treat the finding as a possible false positive

C.

Immediately apply vendor patches and reboot during scheduled downtime

D.

Temporarily isolate the affected server, conduct a forensic audit, and then patch

Full Access
Question # 138

A future-focused security audit discusses risks where attackers collect encrypted data today, anticipating they will be able to decrypt it later using quantum computers. What is this threat commonly known as?

A.

Saving data today for future quantum decryption

B.

Breaking RSA using quantum algorithms

C.

Flipping qubit values to corrupt output

D.

Replaying intercepted quantum messages

Full Access
Question # 139

An attacker performs DNS cache snooping using dig +norecurse. The DNS server returns NOERROR but no answer. What does this indicate?

A.

The domain has expired

B.

The record was cached and returned

C.

The DNS server failed

D.

No recent client from that network accessed the domain

Full Access
Question # 140

A corporation uses both hardware-based and cloud-based solutions to distribute incoming traffic and absorb DDoS attacks, ensuring legitimate requests remain unaffected. Which DDoS mitigation strategy is being utilized?

A.

Black Hole Routing

B.

Load Balancing

C.

Sinkholing

D.

Rate Limiting

Full Access
Question # 141

A payload causes a significant delay in response without visible output when testing an Oracle-backed application. What SQL injection technique is being used?

A.

Time-based SQL injection using WAITFOR DELAY

B.

Heavy query-based SQL injection

C.

Union-based SQL injection

D.

Out-of-band SQL injection

Full Access
Question # 142

A penetration tester is assessing an IoT thermostat used in a smart home system. The device communicates with a cloud server for updates and commands. The tester discovers that communication between the device and the cloud server is not encrypted. What is the most effective way to exploit this vulnerability?

A.

Conduct a Cross-Site Scripting (XSS) attack on the thermostat’s web interface

B.

Perform a brute-force attack on the thermostat’s local admin login

C.

Execute a SQL injection attack on the cloud server ' s login page

D.

Use a man-in-the-middle (MitM) attack to intercept and manipulate unencrypted communication

Full Access
Question # 143

At a Miami-based cryptocurrency exchange, investigator Jake uncovers that attackers exploited exposed API keys to issue unauthorized cloud commands, leading to resource abuse and lateral movement inside the cloud environment. Which cloud hacking technique is most directly demonstrated in this incident?

A.

Cryptojacking

B.

Enumerating S3 buckets

C.

Wrapping attack

D.

Compromising secrets

Full Access
Question # 144

A security analyst is investigating a network compromise where malware communicates externally using common protocols such as HTTP and DNS. The malware operates stealthily, modifies system components, and avoids writing payloads to disk. What is the most effective action to detect and disrupt this type of malware communication?

A.

Blocking commonly known malware ports such as 6667 and 12345.

B.

Relying solely on frequent antivirus signature updates.

C.

Using behavioral analytics to monitor abnormal outbound traffic and application behavior.

D.

Blocking all unencrypted HTTP traffic at the proxy level.

Full Access
Question # 145

During a penetration test at a manufacturing company in Detroit, Amanda, a senior security consultant, scans several legacy Linux servers. On one host, she discovers an open port used for file transfer that allows anonymous login. Once connected, she is able to view the directory structure and check available files, which helps her identify potential sensitive information exposure. She also notices background traffic on a UDP service related to NetBIOS name lookups, but she continues probing the file transfer service to confirm user access weaknesses.

Which ports and services should Amanda prioritize for this enumeration activity?

A.

TCP 23 and UDP 137, 138

B.

TCP 21 and UDP 137

C.

TCP 25 and UDP 138

D.

TCP 139 and UDP 137, 138

Full Access
Question # 146

A web server was compromised through DNS hijacking. What would most effectively prevent this in the future?

A.

Changing IP addresses

B.

Regular patching

C.

Implementing DNSSEC

D.

Using LAMP architecture

Full Access
Question # 147

A penetration tester targets a company ' s executive assistants by referencing upcoming board meetings in an email requesting access to confidential agendas. What is the most effective social engineering technique to obtain the necessary credentials without raising suspicion?

A.

Create a personalized email referencing specific meetings and request access

B.

Call posing as a trusted IT support to verify credentials

C.

Send a mass phishing email with a fake meeting link

D.

Develop a fake LinkedIn profile to connect and request information

Full Access
Question # 148

A company’s online service is under a multi-vector DoS attack using SYN floods and HTTP GET floods. Firewalls and IDS cannot stop the outage. What advanced defense should the company implement?

A.

Configure the firewall to block all incoming SYN packets from external IPs

B.

Use DDoS mitigation services that offer multi-layer protection

C.

Deploy a Web Application Firewall (WAF) with anomaly detection

D.

Increase server bandwidth and apply basic rate limiting

Full Access
Question # 149

You are Olivia Chen, an ethical hacker at CyberGuardians Inc., hired to test the wireless network of Skyline Media, a broadcasting company in Chicago, Illinois. Your mission is to breach their WPA2-protected Wi-Fi during a late-night penetration test. Using a laptop in monitor mode, you execute a command to transmit packets that force client devices to disconnect and reconnect, enabling you to capture a four-way handshake for cracking. Based on the described action, which tool are you using?

A.

Aircrack-ng

B.

Airbase-ng

C.

Aireplay-ng

D.

Airodump-ng

Full Access
Question # 150

Which method best bypasses client-side controls without triggering server-side alarms?

A.

Disable JavaScript in the browser

B.

Intercept and modify requests using a proxy tool

C.

Inject malicious JavaScript into the login form

D.

Reverse-engineer the encryption algorithm

Full Access
Question # 151

During a covert red team engagement, a penetration tester is tasked with identifying live hosts in a target organization’s internal subnet (10.0.0.0/24) without triggering intrusion detection systems (IDS). To remain undetected, the tester opts to use the command nmap -sn -PE 10.0.0.0/24, which results in several " Host is up " responses, even though the organization’s IDS is tuned to detect high-volume scans. After the engagement, the client reviews the logs and is surprised that the scan was not flagged. What allowed the scan to complete without triggering alerts?

A.

It used TCP ACK packets that were allowed through.

B.

It used UDP packets that bypassed ICMP inspection.

C.

It scanned only the ports open in the firewall whitelist.

D.

It performed an ICMP Echo ping sweep without port probing.

Full Access
Question # 152

An attacker places a malicious VM on the same physical server as a target VM in a multi-tenant cloud environment. The attacker then extracts cryptographic keys using CPU timing analysis. What type of attack was conducted?

A.

Side-channel attack

B.

Cloud cryptojacking

C.

Cache poisoned denial of service (CPDoS)

D.

Metadata spoofing

Full Access
Question # 153

During a security assessment of an internal network, a penetration tester discovers that UDP port 123 is open, indicating that the NTP service is active. The tester wants to enumerate NTP peers, check synchronization status, offset, and stratum levels. Which command should the tester use?

A.

ntpdc

B.

ntpq

C.

ntptrace

D.

ntpdate

Full Access
Question # 154

After a breach, investigators discover attackers used modified legitimate system utilities and a Windows service to persist undetected and harvest credentials. What key step would best protect against similar future attacks?

A.

Disable unused ports and restrict outbound firewall traffic

B.

Perform weekly backups and store them off-site

C.

Ensure antivirus and firewall software are up to date

D.

Monitor file hashes of critical executables for unauthorized changes

Full Access
Question # 155

In sunny San Diego, California, security consultant Maya Ortiz is engaged by PacificGrid, a regional utilities provider, to analyze suspicious access patterns on their employee portal. While reviewing authentication logs, Maya notices many accounts each receive only a few login attempts before the attacker moves on to other targets; the attempts reuse a very small set of likely credentials across a large number of accounts and are spread out over several days and IP ranges to avoid triggering automated lockouts. Several low-privilege accounts were successfully accessed before the pattern was detected. Maya prepares a forensic timeline to help PacificGrid contain the incident.

Which attack technique is being used?

A.

Session Hijacking

B.

Password Spraying

C.

Cross-Site Request Forgery (CSRF)

D.

Brute Force Attack

Full Access
Question # 156

During a black-box internal penetration test, a security analyst identifies an SNMPv2-enabled Linux server using the default community string “public.” The analyst wants to enumerate running processes. Which Nmap command retrieves this information?

A.

nmap -sU -p 161 --script snmp-sysdescr

B.

nmap -sU -p 161 --script snmp-win32-services

C.

nmap -sU -p 161 --script snmp-processes

D.

nmap -sU -p 161 --script snmp-interfaces

Full Access
Question # 157

A penetration tester needs to map open ports on a target network without triggering the organization’s intrusion detection systems (IDS), which are configured to detect standard scanning patterns and abnormal traffic volumes. To achieve this, the tester decides to use a method that leverages a third-party host to obscure the origin of the scan. Which scanning technique should be employed to accomplish this stealthily?

A.

Conduct a TCP FIN scan with randomized port sequences

B.

Perform a TCP SYN scan using slow-timing options

C.

Execute a UDP scan with packet fragmentation

D.

Use an Idle scan by exploiting a " zombie " host

Full Access
Question # 158

At Apex Financial Services in Houston, Texas, ethical hacker Javier Ruiz evaluates mobile security practices under the company ' s BYOD policy. He demonstrates that employees often install applications that request access to contact lists, cameras, and messaging services, even though these functions are unrelated to the apps ' intended purpose. This behavior allows a malicious program to harvest sensitive corporate information.

Which security guideline would most directly prevent this issue?

A.

Use encryption mechanisms to store data

B.

Enforce automatic device locking or implement biometric authentication

C.

Review permissions requested by apps before installing them

D.

Set passwords for apps to restrict others from accessing them

Full Access
Question # 159

You are Riley, an incident responder at NovaEx Crypto in San Antonio, Texas, tasked with investigating a recent double-spend reported by a retail merchant that accepts the exchange ' s token. Your telemetry shows that a reseller node used by the merchant received blocks only from a small, fixed set of peers for several hours and accepted a conflicting history that later allowed the attacker to reverse a confirmed payment. The attacker appears to have controlled which peers that node communicated with and supplied it a private chain until they were ready to reveal it. Which blockchain attack does this behavior most closely describe?

A.

Finney Attack

B.

DeFi Sandwich Attack

C.

51% Attack

D.

Eclipse Attack

Full Access
Question # 160

During a red team assessment, an ethical hacker must map a large multinational enterprise’s external attack surface. Due to strict rules of engagement, no active scans may be used. The goal is to identify publicly visible subdomains to uncover forgotten or misconfigured services. Which method should the ethical hacker use to passively enumerate the organization’s subdomains?

A.

Leverage tools like Netcraft or DNSdumpster to gather subdomain information

B.

Attempt to guess admin credentials and access the company’s DNS portal

C.

Conduct a brute-force DNS subdomain enumeration

D.

Request internal DNS records using spoofed credentials

Full Access
Question # 161

In Miami, Florida, Sarah Thompson, a security analyst at Apex Cyber Defense, is tasked with monitoring the wireless infrastructure at Coastal Healthcare, a busy urban hospital. One morning, nurse Emily Carter reports that her tablet used for accessing patient records is unexpectedly connecting to an access point broadcasting a name and signal similar to the hospital’s secure Wi-Fi. Upon investigation, Sarah’s log analysis reveals an unauthorized device on the network capturing sensitive traffic from connected systems. Suspecting a breach, she identifies that the attacker has deployed an access point to mimic the hospital’s legitimate network.

Based on this behavior, which wireless threat is the attacker executing?

A.

Misconfigured AP

B.

Rogue AP

C.

Evil Twin AP

D.

Honeypot AP

Full Access
Question # 162

A Certified Ethical Hacker (CEH) is auditing a company’s web server that employs virtual hosting. The server hosts multiple domains and uses a web proxy to maintain anonymity and prevent IP blocking. The CEH discovers that the server’s document directory (containing critical HTML files) is named “certrcx” and stored in /admin/web. The server root (containing configuration, error, executable, and log files) is also identified. The CEH also notes that the server uses a virtual document tree for additional storage. Which action would most likely increase the security of the web server?

A.

Moving the document root directory to a different disk

B.

Regularly updating and patching the server software

C.

Changing the server’s IP address regularly

D.

Implementing an open-source web server architecture such as LAMP

Full Access
Question # 163

A penetration tester discovers that a system is infected with malware that encrypts all files and demands payment for decryption. What type of malware is this?

A.

Worm

B.

Spyware

C.

Keylogger

D.

Ransomware

Full Access
Question # 164

In a bustling tech firm in Seattle, Michael, an ethical hacker, is conducting a security assessment to identify potential risks. During his evaluation, he notices that sensitive employee details and system configurations have been exposed through public forums, likely due to careless online behavior. His manager suspects this could lead to unauthorized access or data theft. As part of his testing, what type of threat should Michael focus on to simulate the adversary ' s method of gathering this exposed information?

A.

Corporate Espionage

B.

Social Engineering

C.

System and Network Attacks

D.

Information Leakage

Full Access
Question # 165

A penetration tester suspects that a web application ' s user profile page is vulnerable to SQL injection, as it uses the userID parameter in SQL queries without proper sanitization. Which technique should the tester use to confirm the vulnerability?

A.

Use the userID parameter to perform a brute-force attack on the admin login page

B.

Modify the userID parameter in the URL to ' OR ' 1 ' = ' 1 and check if it returns multiple profiles

C.

Inject HTML code into the userID parameter to test for Cross-Site Scripting (XSS)

D.

Attempt a directory traversal attack using the userID parameter

Full Access
Question # 166

An ethical hacker needs to gather sensitive information about a company ' s internal network without engaging directly with the organization ' s systems to avoid detection. Which method should be employed to obtain this information discreetly?

A.

Analyze the organization ' s job postings for technical details

B.

Exploit a public vulnerability in the company ' s web server

C.

Perform a WHOIS lookup on the company ' s domain registrar

D.

Use port scanning tools to probe the company ' s firewall

Full Access
Question # 167

Which encryption method supports secure key distribution?

A.

Disk encryption

B.

Symmetric encryption

C.

Hash functions

D.

Asymmetric encryption

Full Access
Question # 168

A government agency trains a group of cybersecurity experts to carry out covert cyber missions against foreign threats and gather intelligence without being detected. These experts work exclusively for national interests. What classification best describes them?

A.

Organized hackers

B.

State-sponsored hackers

C.

Hacktivists

D.

Gray hat hackers

Full Access
Question # 169

Which WPA2 vulnerability allows packet interception and replay?

A.

Hole196 vulnerability

B.

KRACK vulnerability

C.

WPS PIN recovery

D.

Weak RNG

Full Access