02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 11: Denial of Service 427<br />

8. A. Appearance can easily impact the opinion that an individual or a group has about someone.<br />

The other options here are types of countermeasures used to stock physical attacks.<br />

9. A. This type of attack is a clear example of phishing: An attacker crafts an attractive-looking<br />

e-mail with the intention of enticing the victim to perform an action.<br />

10. B. Training is the best and most effective method of blunting the impact of social engineering.<br />

Addressing the problem through education can lessen the need for some countermeasures.<br />

11. C. This is an example of phishing as it involves enticing the user to click on a link and presumably<br />

provide information.<br />

12. C. This attack is most likely the result of identity theft, while we don’t know exactly how it<br />

was stolen, candidates include Phishing, Social Engineering, Keyloggers, or Trojan horses.<br />

13. D. This attack is called tailgating and involves a person being closely followed by another<br />

individual through a door or entrance.<br />

14. D. A vulnerability scan is designed to pick up weaknesses in a system. Such scans are typically<br />

automated.<br />

15. C. A proxy is used to hide the party launching a scan.<br />

16. B. TOR is designed to hide the process of scanning as well as the origin of a scan. Additionally,<br />

it can provide encryption services to hide traffic.<br />

17. B. Habits are set patterns of behavior that individuals tend to follow or revert to frequently.<br />

18. B. Using keywords or buzzwords can make a victim believe the attacker is in the know<br />

about how a company works.<br />

19. C. Namedropping can be used by an attacker to make a victim believe the attacker has<br />

power or knows people who are in power.<br />

20. C. This attack is most likely a result of identity theft. The information to carry out this attack<br />

may have been obtained through the use of techniques such as Phishing or Social Engineering,<br />

however those techniques can be used for other attacks as well and not just identity theft.<br />

Chapter 11: Denial of Service<br />

1. B. 0x90 is the hexadecimal value of an NOP instruction for Intel-based systems. Remember<br />

to keep an eye out for this value; it indicates an NOP and possibly an NOP sled.<br />

2. C. A successful overflow attack can change the value of an Extended Instruction Pointer<br />

(EIP) saved on the stack.<br />

3. D. Hacktivists get their title from the paradigm of hacktivism. These hackers launch attacks<br />

against targets because they believe those targets violate the attackers’ morals, ethics, or<br />

principles.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!