CEH v11 EXAM | Questions And Answers Latest {2024- 2025} A+ Graded | 100% Verified
An attacker changes the profile information of a particular user (victim) on the target website. The
attacker uses this string to update the victim's profile to a text file and then submit the data to the
attacker's database.
< iframe src="http://www.vulnweb.com/updateif.php" style="display:none" > < /iframe >
What is this type of attack (that can use either HTTP GET or HTTP POST) called? - Cross-Site Request
Forgery (CSRF)
You have compromised a server and successfully gained a root access. You want to pivot and pass traffic
undetected over the network and evade any possible Intrusion Detection System. What is the best
approach? - Install cryptcat and encrypt traffic
While browsing his Facebook feed, Matt sees a picture one of his friends posted with the caption, Learn
more about your friends, as well as a number of personal questions. Matt is suspicious and texts his
friend, who confirms that he did indeed post it. With assurance that the post is legitimate, Matt
responds to the questions on the post. A few days later, Matt's bank account has been accessed, and the
password has been changed. What most likely happened? - Matt inadvertently provided the answers to
his security questions when responding to the post
By performing a penetration test, you gained access under a user account. During the test, you
established a connection with your own machine via the SMB service and occasionally entered your
login and password in plaintext.
Which file do you have to clean to clear the password? - .bash_history
What type of a vulnerability/attack is it when the malicious person forces the user's browser to send an
authenticated request to a server? - Cross-site request forgery (CSRF)
Which Metasploit Framework tool can help penetration tester for evading Antivirus Systems? -
msfencode
Chandler works as a pentester in an IT company in New York. As a part of detecting viruses in the
systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual
machine to simulate CPU and memory activities. Which type of virus detection method did Chandler use
in this context? - Code Emulation
,Jane, an ethical hacker, is testing a target organization's web server and website to identify security
loopholes. In this process, she copied the entire website and its content on a local drive to view the
complete profile of the site's directory structure, file structure, external links, images, web pages, and so
on. This information helps Jane map the website's directories and gain valuable information. What is the
attack technique employed by Jane in the above scenario? - Website mirroring
Richard, an attacker, aimed to hack IoT devices connected to a target network. In this process, Richard
recorded the frequency required to share information between connected devices. After obtaining the
frequency, he captured the original data when commands were initiated by the connected devices.
Once the original data were collected, he used free tools such as URH to segregate the command
sequence. Subsequently, he started injecting the segregated command sequence on the same frequency
into the IoT network, which repeats the captured signals of the devices.
What is the type of attack performed by Richard in the above scenario? - Replay attack
Harry, a professional hacker, targets the IT infrastructure of an organization. After preparing for the
attack, he attempts to enter the target network using techniques such as sending spear-phishing emails
and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully
deployed malware on the target system to establish an outbound connection. What is the APT lifecycle
phase that Harry is currently executing? - Initial intrusion
Scenario: Joe turns on his home computer to access personal online banking. When he enters the URL
www.bank.com, the website is displayed, but it prompts him to re-enter his credentials as if he has
never visited the site before. When he examines the website URL closer, he finds that the site is not
secure and the web address appears different.
What type of attack he is experiencing? - DNS hijacking
What are common files on a web server that can be misconfigured and provide useful information for a
hacker such as verbose error messages? - php.ini
At what stage of the cyber kill chain theory model does data exfiltration occur? - Actions on objective
Heather's company has decided to use a new customer relationship management tool. After performing
the appropriate research, they decided to purchase a subscription to a cloud-hosted solution. The only
administrative task that Heather will need to perform is the management of user accounts. The provider
, will take care of the hardware, operating system, and software administration including patching and
monitoring.
Which of the following is this type of solution? - SaaS
If you send a TCP ACK segment to a known closed port on a firewall but it does not respond with an RST,
what do you know about the firewall you are scanning? - It is a stateful firewall
Steven connected his iPhone to a public computer that had been infected by Clark, an attacker. After
establishing the connection with the public computer, Steven enabled iTunes Wi-Fi sync on the
computer so that the device could continue communication with that computer even after being
physically disconnected. Now, Clark gains access to Steven's iPhone through the infected computer and
is able to monitor and read all of Steven's activity on the iPhone, even after the device is out of the
communication zone. Which of the following attacks is performed by Clark in the above scenario? - iOS
trustjacking
Bob was recently hired by a medical company after it experienced a major cybersecurity breach. Many
patients are complaining that their personal medical records are fully exposed on the Internet and
someone can find them with a simple Google search. Bob's boss is very worried because of regulations
that protect those data.
Which of the following regulations is mostly violated? - HIPPA/PHI
In the Common Vulnerability Scoring System (CVSS) v3.1 severity ratings, what range does medium
vulnerability fall in? - 0.1 - 3.9 Low
4.0 - 6.9 Medium
7.0 - 8.9 High
9.0 - 10.0 Critical
What piece of hardware on a computer's motherboard generates encryption keys and only releases a
part of the key so that decrypting a disk on a new piece of hardware is not possible? - TPM (Trusted
Platform Module)
What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an
organization? - The attacker makes a request to the DNS resolver