[go: up one dir, main page]

0% found this document useful (0 votes)
17 views6 pages

CEH Module6 System Hacking

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views6 pages

CEH Module6 System Hacking

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

ceh-v13 prep questions. Jorge - www.youtube.

com/@itbestpractice2741

CEH v13 Practice Questions – Module 6:


System Hacking
1. Which of the following is a primary objective of system hacking?

• A. Conducting passive reconnaissance


• B. Exploiting vulnerabilities to gain unauthorized access
• C. Sending phishing emails
• D. Performing DNS enumeration

Answer: B

2. Which of the following tools can be used to dump password hashes from a Windows
system?

• A. Nmap
• B. Metasploit
• C. John the Ripper
• D. Mimikatz

Answer: D

3. Which attack involves trying all possible password combinations until the correct one is
found?

• A. Dictionary attack
• B. Brute-force attack
• C. Social engineering
• D. Rainbow table attack

Answer: B

4. What is the purpose of privilege escalation in system hacking?

• A. Lower the user’s access rights


• B. Run system updates
• C. Gain higher-level access such as administrator or root
• D. Hide the attack from IDS

Answer: C
ceh-v13 prep questions. Jorge - www.youtube.com/@itbestpractice2741

5. Which of the following best defines steganography?

• A. Scrambling data with symmetric encryption


• B. Hiding data inside other files such as images
• C. Encoding commands in TCP packets
• D. Writing viruses that self-replicate

Answer: B

6. Which command lists all users on a Windows system from the command prompt?

• A. whoami
• B. net user
• C. hostname
• D. ipconfig

Answer: B

7. What is the role of the SAM file in Windows systems?

• A. Stores system logs


• B. Contains system registry values
• C. Stores user password hashes
• D. Logs DNS queries

Answer: C

8. Which of the following is a method used for hiding running processes on a system?

• A. Rootkits
• B. Firewalls
• C. Hash tables
• D. Session hijacking

Answer: A

9. Which attack replaces the user’s login shell to maintain access?

• A. Trojan
• B. Rootkit injection
• C. Shell replacement attack
• D. Backdoor shell
ceh-v13 prep questions. Jorge - www.youtube.com/@itbestpractice2741

Answer: C

10. Which of the following attacks captures keystrokes to steal credentials?

• A. Buffer overflow
• B. Session hijacking
• C. Keylogging
• D. Privilege escalation

Answer: C

11. Which of the following tools can crack Windows password hashes offline?

• A. Wireshark
• B. Hydra
• C. John the Ripper
• D. Maltego

Answer: C

12. Which Linux file contains user account information and hashed passwords?

• A. /etc/shadow
• B. /etc/passwd
• C. /etc/users
• D. /home/.user

Answer: A

13. Which method can be used to hide a file in Windows?

• A. Use of /dev/null
• B. Hiding in Alternate Data Streams (ADS)
• C. Running a cron job
• D. Renaming the file with .bak extension

Answer: B

14. What is the primary purpose of clearing event logs in system hacking?

• A. To free up disk space


• B. To prevent detection and forensic analysis
ceh-v13 prep questions. Jorge - www.youtube.com/@itbestpractice2741

• C. To update system patches


• D. To reboot the target system

Answer: B

15. Which of the following is an example of a post-exploitation activity?

• A. Scanning open ports


• B. Delivering phishing emails
• C. Maintaining access through a backdoor
• D. Performing a DNS query

Answer: C

16. Which command in Linux is used to change file ownership?

• A. chmod
• B. chgrp
• C. chown
• D. usermod

Answer: C

17. What is the use of a bind shell in hacking?

• A. To bind malware to a host process


• B. To execute remote web applications
• C. To open a listening port for reverse connections
• D. To allow a remote attacker to connect to a shell

Answer: D

18. Which of the following can be used to maintain access on a compromised system?

• A. Trojan horse
• B. Firewall rules
• C. Secure boot
• D. Sandboxing

Answer: A

19. Which of the following commands in Linux displays the current user's effective ID?
ceh-v13 prep questions. Jorge - www.youtube.com/@itbestpractice2741

• A. id
• B. whoami
• C. groups
• D. passwd

Answer: A

20. Which tool in Metasploit allows privilege escalation through known exploits?

• A. msfvenom
• B. exploit/windows/local
• C. nmap
• D. snmpwalk

Answer: B

21. What is a common use of the 'at' command in Windows post-exploitation?

• A. Run file explorer


• B. Start antivirus scan
• C. Schedule a malicious task
• D. Reboot the system

Answer: C

22. What type of attack involves modifying a system to allow repeated access?

• A. Reconnaissance attack
• B. Spoofing attack
• C. Persistent backdoor installation
• D. Sniffing attack

Answer: C

23. Which of the following best helps an attacker escalate privileges on a local system?

• A. Open FTP ports


• B. Misconfigured SUID binaries
• C. HTTPS traffic logs
• D. VPN tunnels

Answer: B
ceh-v13 prep questions. Jorge - www.youtube.com/@itbestpractice2741

24. What is the purpose of a reverse shell?

• A. It tunnels traffic through SSH


• B. It creates encrypted backups
• C. It allows a target system to initiate connection to the attacker
• D. It encrypts outgoing packets

Answer: C

You might also like