C701, CEHv11-CEH 12 Study Guide Flashcards Quizlet
C701, CEHv11-CEH 12 Study Guide Flashcards Quizlet
C701, CEHv11-CEH 12 Study Guide Flashcards Quizlet
A Confidentiality
B Non-repudiation
C Availability
D Integrity
1 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Reconnaissance
B Weaponization
C Exploitation
D Installation
A Black hats
B White hats
C Suicide hackers
D Script kiddies
2 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Maintaining access
B Scanning
C Clearing tracks
D Gaining access
3 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Risk identification
B Risk treatment
C Risk tracking and review
D Risk assessment
4 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A HIPAA
B SOX
C DMCA
D PCI DSS
5 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Netcraft
B Tracert
C Shodan
D BuzzSumo
A [site:]
B [info:]
C [inurl:]
D [related:]
6 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Web spidering
B Website mirroring
C Monitoring of web
updates
D Website link extraction
7 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A inurl:8080 intitle:"login"
intext:"UserLogin" "English"
B inurl:/voice/advanced/
intitle:Linksys SPA
configuration
C inurl:/remote
/login?lang=en
D !Host=.
intext:enc_UserPassword=*
ext:pcf
8 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A DuckDuckGo
B Baidu
C Shodan
D Bing
9 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Blisqy
B OmniPeek
C Netcraft
D BTCrawler
10 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
Clark is a professional B
hacker. He targeted an
organization for financial
benefit and used various
footprinting techniques to
gather information about the
target network. In this
process, he employed a
protocol used for querying
databases that store the
registered users or assignees
of an Internet resource, such
as a domain name, an IP
address block, or an
autonomous system.
A SMB
B Whois
C SNMP
D FTP
A usufy.py
B phonefy.py
C entify.py
D searchfy.py
11 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Common names
B DNS search
C Web search
D Bing IP
12 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A FIN flag
B SYN flag
C PSH flag
D RST flag
A hping3 -8 50-60 -S
10.0.0.25 -V
B hping3 -F -P -U 10.0.0.25 -p
80
C hping3 -1 10.0.1.x --rand-
dest -I eth0
D hping3 -9 HTTP -I eth0
13 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Xmas scan
B TCP Maimon scan
C ACK flag probe scan
D IDLE/IPID header scan
14 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A List scanning
B SCTP COOKIE ECHO
scanning
C IPv6 scanning
D UDP scanning
15 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A IDLE/IPID header
scanning
B SCTP COOKIE ECHO
scanning
C SSDP scanning
D SCTP INIT scanning
16 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
An attacker performed OS D
banner grabbing on a target
host. They analyzed the
packets received from the
target system and identified
that the values of time to live
(TTL) and TCP window size
as 255 and 4128,
respectively.
17 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A IP address decoy
B Sending bad checksums
C Source port manipulation
D Anonymizers
A IP address decoy
B Source port manipulation
C Packet fragmentation
D IP address spoofing
18 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A TCP 25
B TCP 20/21
C TCP/UDP 5060, 5061
D TCP 179
A net view
\<computername> /ALL
B net view /domain:<domain
name>
C net view /domain
D net view
\<computername>
19 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A GetResponse
B GetNextRequest
C GetRequest
D SetRequest
A SNMP enumeration
B LDAP enumeration
C NTP enumeration
D NetBIOS enumeration
20 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A ntptrace
B ntpdc
C ntpdate
D ntpq
21 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A -m n
B -u user
C -M mode
D -p port
22 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
1) Monitor
2) Vulnerability scan
3) Identify assets and create
a baseline
4) Risk assessment
5) Verification
6) Remediation
A1→2→3→4→5→6
B2→1→5→3→6→4
C3→2→4→6→5→1
D3→1→4→5→6→2
23 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
Jaden, a security B
professional in an
organization, introduced
new tools and services into
the organization. Before
introducing the tools, he had
to evaluate whether the
tools are effective and
appropriate for the
organization. He used a
publicly available and free-
to-use list of standardized
identifiers for software
vulnerabilities and exposures
to evaluate the tools.
A LACNIC
B CVE
C Whois
D ARIN
24 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
Edward, a security C
professional in an
organization, was instructed
by higher officials to
calculate the severity of the
organization' s systems.In the
process, he used CVSS, a
published standard that
provides an open framework
for communicating the
characteristics and impacts
of IT vulnerabilities. He used
three metrics provided by
CVSS for measuring
vulnerabilities.
A Base metric
B Environmental metric
C Temporal metric
D Overall score
25 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Active assessment
B Passive assessment
C Credentialed assessment
D Distributed assessment
A Active assessment
B Passive assessment
C External assessment
D Internal assessment
26 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Manual assessment
B Credentialed assessment
C Distributed assessment
D Automated assessment
27 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Product-based solution
B Service-based solution
C Tree-based assessment
D Inference-based
assessment
28 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
Karen, a security B
professional in an
organization, performed a
vulnerability assessment on
the organization's network to
check for vulnerabilities. In
this process, she used a type
of location data examination
scanner that resides on a
single machine but can scan
several machines on the
same network.
A Network-based scanner
B Agent-based scanner
C Proxy scanner
D Cluster scanner
29 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Metagoofil
B Infoga
C Immunity Debugger
D Nessus
30 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A1→2→3→4→5→6→7
B3→6→7→4→2→1→5
C2→3→6→4→5→1→7
D4→2→3→1→6→7→5
31 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A RedirectEXE
B Schtasks
C launchd
D WinRM
A ShellPhish
B GFI LanGuard
C Netcraft
D BeRoot
32 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Null ciphers
B Grille ciphers
C Jargon codes
D Semagrams
A cat /dev/null>
~.bash_history && history -c
&& exit
B history -w
C export HISTSIZE=0
D history -c
33 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Exploit
B Downloader
C Obfuscator
D Payload
34 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
1) Initial intrusion
2) Persistence
3) Preparation
4) Cleanup
5) Expansion
6) Search and exfiltration
A1→2→3→4→5→6
B3→1→5→2→6→4
C5→3→2→6→4→1
D2→4→6→1→5→3
A TAN grabber
B Covert credential grabber
C HTML injection
D Form grabber
35 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Multipartite viruses
B Macro viruses
C Encryption viruses
D Sparse infector viruses
cmd.exe /c ((echo
command1)&&(echo
command2))
A Inserting characters
B Inserting parentheses
C Inserting double quotes
D Custom environment
variables
36 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
Victor, an employee in an C
organization, received an
executable file as an email
attachment. Out of suspicion,
he reached out to the
organization's IT team. The
team used a tool to
dismantle the executable file
into a binary program to find
harmful or malicious
processes.
A Splunk
B Spam Mimic
C IDA Pro
D CCleaner
37 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A IMAP
B HTTPS
C IPsec
D DTLS
38 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A ip.src==192.168.0.0/16 and
ip.dst==192.168.0.0/16
B ip.src!= xxx.xxx.xxx.xxx &&
ip.dst != xxx.xxx.xxx.xxx &&
sip
C ip.addr==192.168.1.100 &&
tcp.port=23
D ip.addr == 10.0.0.4 or
ip.addr == 10.0.0.5
39 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Baiting
B Quid pro quo
C Reverse social
engineering
D Dumpster diving
40 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Shoulder surfing
B Honey trap
C Diversion theft
D Tailgating
41 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Negligent insider
B Malicious insider
C Compromised insider
D Professional insider
42 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
43 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Slowloris attack
B Ping-of-death (PoD) attack
C Multi-vector attack
D Smurf attack
44 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Ingress filtering
B TCP intercept
C Rate limiting
D Egress filtering
45 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Man-in-the-middle attack
B Cross-site script attack
C Session replay attack
D Session hijacking using
proxy servers
46 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A RST hijacking
B Blind hijacking
C UDP hijacking
D Session fixation
A True positive
B False positive
C True negative
D False negative
47 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Evasion
B Session splicing
C Obfuscating
D Fragmentation
48 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Fake AP
B Snort_inline
C User-Mode Linux (UML)
D Bait and switch
49 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Server root
B Web proxy
C Virtual document tree
D Virtual hosting
A DoS/DDoS attack
B DNS server hijacking
C DNS amplification attack
D Directory traversal attack
50 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Directory traversal
B Buffer overflow attack
C Command injection attack
D Cross-site scripting (XSS)
attack
51 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Whois
B Session hijacking
C Web server footprinting
D Vulnerability scanning
A Information gathering
B Web server footprinting
C Website mirroring
D Vulnerability scanning
52 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Exploit module
B Auxiliary module
C Payload module
D NOPS module
a. Test
b. Assess
c. Detect
d. Acquire
e. Maintain
f. Deploy
Ac→b→a→d→f→e
Bb→c→d→a→f→e
Cc→b→d→a→f→e
Da→c→b→e→f→d
53 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A SOAP
B RESTful
C XML-RPC
D JSON-RPC
54 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Deserialization
B Serialization
C Insecure deserialization
D Directory traversal
A Clickjacking attack
B DNS rebinding attack
C MarioNet attack
D XML poisoning
A Cleartext communication
B Error message
C Application code
D Email interaction
55 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Broken object-level
authorization
B Mass assignment
C Improper assets
management
D Injection
56 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A URL encoding
B Unicode encoding
C Base64 encoding
D Hex encoding
A Heavy query
B Error-based SQL injection
C No error message
returned
D Boolean exploitation
57 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
http://www.certifiedhacker.com
/page.aspx?id=1 or 1=convert
(int,(select top 1 name from
sysobjects where
xtype=char(85)))-- ?
A URL encoding
B Sophisticated matches
C Null byte
D Case variation
58 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A /(\')|(\%27)|(\-\-)|
(#)|(\%23)/ix
B /exec(\s|\+)+(s|x)p\w+/ix
C /\w*((\%27)|(\'))((\%6F)|o|
(\%4F))((\%72)|r|(\%52))/ix
D /((\%3D)|(=))[^ ]*((\%27)|
(\')|(\-\-)|(\%3B)|(;))/ix
A WEP
B WPA3
C WPA2
D WPA
59 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A WPA3-Personal
B WPA2-Personal
C WPA3-Enterprise
D WPA2-Enterprise
A Rogue AP attack
B Key reinstallation attack
C Wardriving
D aLTEr attack
60 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Beacon flood
B Denial of service
C Access point theft
D EAP failure
61 of 62 5/21/23, 09:08
C701, CEHv11-CEH 12 Study Guide Flashcards | Quizlet https://quizlet.com/726316111/c701-cehv11-ceh-12-st...
A Bluesnarfing
B Bluesniff
C Bluejacking
D Bluesmacking
A Bluejacking
B Bluesmacking
C Bluebugging
D BluePrinting
62 of 62 5/21/23, 09:08