EC-Council CEH V9 Chapter 12 Putting It All Together

25 July 2022
4.7 (114 reviews)
23 test answers

Unlock all answers in this set

Unlock answers (19)
question
Incident response (IR) is an important part of organizational security. In what step of the incident-handling process would IR team members disable or delete user accounts and change firewall rules? A. Detection and Analysis B. Classification and Prioritization C. Containment D. Forensic Investigation
answer
C. Containment Steps to contain the incident occur here. This may include steps to revoke or suspend user accounts and blocking system or even subnet access via firewall or other methods
question
A software company puts an application through stringent testing and, on the date of release, is confident the software is free of known vulnerabilities. An organization named BigBiz purchases the software at a premium cost, with a guarantee of service, maintenance, and liability. Which risk management method is in use by the BigBiz organization? A. Accept B. Transfer C. Avoid D. Mitigate
answer
B. Transfer
question
Which of the following provide automated pen test-like results for an organization? (Choose all that apply.) A. Metasploit B. Nessus C. Core Impact D. CANVAS E. SAINT F. GFI Languard
answer
A. Metasploit C. Core Impact D. CANVAS Metasploit offers autopwn, and CANVAS has a similar "run everything" mode; however, all lack the ability to provide results that a true pen test would provide. Core Impact is probably the best-known, all-inclusive automated testing framework. Per its website (http://www.coresecurity.com/content/core-impact-overview) Per the Immunity Security website (http://www.immunitysec.com), CANVAS "makes available hundreds of exploits, an automated exploitation system, and a comprehensive, reliable exploit development framework to penetration testers and security professionals."
question
Which of the following best describes an assessment against a network segment that tests for existing vulnerabilities but does not attempt to exploit any of them? A. Penetration test B. Partial penetration test C. Vulnerability assessment D. Security audit
answer
C. Vulnerability assessment
question
You are a member of a pen test team conducting tests. Your team has all necessary scope, terms of engagement, and nondisclosure and service-level agreements in place. You gain access to an employee's system and during further testing discover child pornography on a hidden drive folder. Which of the following is the best course of action for the ethical hacker? A. Continue testing without notification to anyone, but ensure the information is included in the final outbrief report. B. Continue testing without interruption, but completely remove all hidden files and the folder containing the pornography. C. Stop testing and notify law enforcement authorities immediately. D. Stop testing and remove all evidence of intrusion into the machine.
answer
C. Stop testing and notify law enforcement authorities immediately.
question
In which phase of a pen test is scanning performed? A. Pre-attack B. Attack C. Post-attack D. Reconnaissance
answer
A. Pre-attack
question
Which of the following describes risk that remains after all security controls have been implemented to the best of one's ability? A. Residual B. Inherent C. Deferred D. Remaining
answer
A. Residual
question
Which of the following statements are true regarding OSSTMM? (Choose all that apply.) A. OSSTMM is a non-profit, international research initiative dedicated to defining standards in security testing and business integrity testing. B. OSSTMM recognizes ten types of controls, which are divided into two classes C. ISECOM maintains the OSSTMM. D. OSSTMM defines three types of compliance.
answer
B. OSSTMM recognizes ten types of controls, which are divided into two classes C. ISECOM maintains the OSSTMM. D. OSSTMM defines three types of compliance.
question
Which of the following is an open source project produced by OISSG (Open Information Systems Security Group) intended to provide security testing assistance? A. OSSTMM B. OWASP C. COBIT D. ISSAF
answer
D. ISSAF "The Information Systems Security Assessment Framework (ISSAF) is produced by the Open Information Systems Security Group, and is intended to comprehensively report on the implementation of existing controls to support IEC/ISO 27001:2005(BS7799), Sarbanes Oxley SOX404, CoBIT, SAS70 and COSO, thus adding value to the operational aspects of IT related business transformation programmes
question
NIST SP 800-30 defines steps for conducting a risk assessment. Which of the following statements is true regarding the process? A. Threats are identified before vulnerabilities. B. Determining the magnitude of impact is the first step. C. Likelihood is determined after the risk assessment is complete. D. Risk assessment is not a recurring process.
answer
A. Threats are identified before vulnerabilities. NIST 800-30 Guide for Conducting Risk Assessments (http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf )
question
In which phase of a pen test will the team penetrate the perimeter and acquire targets? A. Pre-attack B. Attack C. Post-attack D. None of the above
answer
B. Attack
question
An organization participates in a real-world exercise designed to test all facets of their security systems. An independent group is hired to assist the organization's security groups, assisting in the defense of assets against the attacks from the attacking group. Which of the following statements is true? A. The group assisting in the defense of the systems is referred to as a blue team. B. The group assisting in the defense of the systems is referred to as a red team. C. The group assisting in the defense of the systems is known as a white-hat group. D. The team attacking the systems must provide all details of any planned attack with the defense group before launching to ensure security measures are tested appropriately.
answer
A. The group assisting in the defense of the systems is referred to as a blue team.
question
Which of the following best describes the difference between a professional pen test team member and a hacker? A. Ethical hackers are paid for their time. B. Ethical hackers never exploit vulnerabilities; they only point out their existence. C. Ethical hackers do not use the same tools and actions as hackers. D. Ethical hackers hold a predefined scope and agreement from the system owner.
answer
D. Ethical hackers hold a predefined scope and agreement from the system owner.
question
Sally is part of a penetration test team and is starting a test. The client has provided a network drop on one of their subnets for Sally to launch her attacks from. However, they did not provide any authentication information, network diagrams, or other notable data concerning the systems. Which type of test is Sally performing? A. External, white box B. External, black box C. Internal, white box D. Internal, black box
answer
D. Internal, black box
question
Your pen test team is discussing services with a potential client. The client indicates they do not see the value in penetration testing. Which of the following is the correct response from your team? A. Run a few tests and display the results to the client to prove the value of penetration testing. B. Provide detailed results from other customers you've tested, displaying the value of planned testing and security deficiency discovery. C. Provide information and statistics regarding pen testing and security vulnerabilities from reliable sources. D. Perform the penetration test anyway in case they change their mind.
answer
C. Provide information and statistics regarding pen testing and security vulnerabilities from reliable sources.
question
In which phase of a penetration test would you compile a list of vulnerabilities found? A. Pre-attack B. Attack C. Post-attack D. Reconciliation
answer
C. Post-attack
question
Which of the following has a database containing thousands of signatures used to detect vulnerabilities in multiple operating systems? A. Nessus B. Hping C. LOIC D. SNMPUtil
answer
A. Nessus
question
Cleaning registry entries and removing uploaded files and tools are part of which phase of a pen test? A. Covering tracks B. Pre-attack C. Attack D. Post-attack
answer
D. Post-attack
question
Which of the following are true statements regarding a pen test? (Choose all that apply.) A. Pen tests do not include social engineering. B. Pen tests may include unannounced attacks against the network. C. During a pen test, the security professionals can carry out any attack they choose. D. Pen tests always have a scope. E. A list of all personnel involved in the test is not included in the final report.
answer
B. Pen tests may include unannounced attacks against the network. D. Pen tests always have a scope.
question
Which of the following causes a potential security breach? A. Vulnerability B. Threat C. Exploit D. Zero day
answer
B. Threat
question
Which Metasploit payload type operates via DLL injection and is difficult for antivirus software to pick up? A. Inline B. Meterpreter C. Staged D. Remote
answer
B. Meterpreter
question
Metasploit is a framework allowing for the development and execution of exploit code against a remote host and is designed for use in pen testing. The framework consists of several libraries, each performing a specific task and set of functions. Which library is considered the most fundamental component of the Metasploit framework? A. MSF Core B. MSF Base C. MSF interfaces D. Rex
answer
D. Rex
question
Which of the following may be effective countermeasures against an inside attacker? (Choose all that apply.) A. Enforce elevated privilege control. B. Secure all dumpsters and shred collection boxes. C. Enforce good physical security practice and policy. D. Perform background checks on all employees.
answer
A, B, C, D