0% found this document useful (0 votes)
50 views6 pages

CEH Module6 System Hacking

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views6 pages

CEH Module6 System Hacking

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

ceh-v13 prep questions. Jorge - [Link].

com/@itbestpractice2741

CEH v13 Practice Questions – Module 6:


System Hacking
1. Which of the following is a primary objective of system hacking?

• A. Conducting passive reconnaissance


• B. Exploiting vulnerabilities to gain unauthorized access
• C. Sending phishing emails
• D. Performing DNS enumeration

Answer: B

2. Which of the following tools can be used to dump password hashes from a Windows
system?

• A. Nmap
• B. Metasploit
• C. John the Ripper
• D. Mimikatz

Answer: D

3. Which attack involves trying all possible password combinations until the correct one is
found?

• A. Dictionary attack
• B. Brute-force attack
• C. Social engineering
• D. Rainbow table attack

Answer: B

4. What is the purpose of privilege escalation in system hacking?

• A. Lower the user’s access rights


• B. Run system updates
• C. Gain higher-level access such as administrator or root
• D. Hide the attack from IDS

Answer: C
ceh-v13 prep questions. Jorge - [Link]/@itbestpractice2741

5. Which of the following best defines steganography?

• A. Scrambling data with symmetric encryption


• B. Hiding data inside other files such as images
• C. Encoding commands in TCP packets
• D. Writing viruses that self-replicate

Answer: B

6. Which command lists all users on a Windows system from the command prompt?

• A. whoami
• B. net user
• C. hostname
• D. ipconfig

Answer: B

7. What is the role of the SAM file in Windows systems?

• A. Stores system logs


• B. Contains system registry values
• C. Stores user password hashes
• D. Logs DNS queries

Answer: C

8. Which of the following is a method used for hiding running processes on a system?

• A. Rootkits
• B. Firewalls
• C. Hash tables
• D. Session hijacking

Answer: A

9. Which attack replaces the user’s login shell to maintain access?

• A. Trojan
• B. Rootkit injection
• C. Shell replacement attack
• D. Backdoor shell
ceh-v13 prep questions. Jorge - [Link]/@itbestpractice2741

Answer: C

10. Which of the following attacks captures keystrokes to steal credentials?

• A. Buffer overflow
• B. Session hijacking
• C. Keylogging
• D. Privilege escalation

Answer: C

11. Which of the following tools can crack Windows password hashes offline?

• A. Wireshark
• B. Hydra
• C. John the Ripper
• D. Maltego

Answer: C

12. Which Linux file contains user account information and hashed passwords?

• A. /etc/shadow
• B. /etc/passwd
• C. /etc/users
• D. /home/.user

Answer: A

13. Which method can be used to hide a file in Windows?

• A. Use of /dev/null
• B. Hiding in Alternate Data Streams (ADS)
• C. Running a cron job
• D. Renaming the file with .bak extension

Answer: B

14. What is the primary purpose of clearing event logs in system hacking?

• A. To free up disk space


• B. To prevent detection and forensic analysis
ceh-v13 prep questions. Jorge - [Link]/@itbestpractice2741

• C. To update system patches


• D. To reboot the target system

Answer: B

15. Which of the following is an example of a post-exploitation activity?

• A. Scanning open ports


• B. Delivering phishing emails
• C. Maintaining access through a backdoor
• D. Performing a DNS query

Answer: C

16. Which command in Linux is used to change file ownership?

• A. chmod
• B. chgrp
• C. chown
• D. usermod

Answer: C

17. What is the use of a bind shell in hacking?

• A. To bind malware to a host process


• B. To execute remote web applications
• C. To open a listening port for reverse connections
• D. To allow a remote attacker to connect to a shell

Answer: D

18. Which of the following can be used to maintain access on a compromised system?

• A. Trojan horse
• B. Firewall rules
• C. Secure boot
• D. Sandboxing

Answer: A

19. Which of the following commands in Linux displays the current user's effective ID?
ceh-v13 prep questions. Jorge - [Link]/@itbestpractice2741

• A. id
• B. whoami
• C. groups
• D. passwd

Answer: A

20. Which tool in Metasploit allows privilege escalation through known exploits?

• A. msfvenom
• B. exploit/windows/local
• C. nmap
• D. snmpwalk

Answer: B

21. What is a common use of the 'at' command in Windows post-exploitation?

• A. Run file explorer


• B. Start antivirus scan
• C. Schedule a malicious task
• D. Reboot the system

Answer: C

22. What type of attack involves modifying a system to allow repeated access?

• A. Reconnaissance attack
• B. Spoofing attack
• C. Persistent backdoor installation
• D. Sniffing attack

Answer: C

23. Which of the following best helps an attacker escalate privileges on a local system?

• A. Open FTP ports


• B. Misconfigured SUID binaries
• C. HTTPS traffic logs
• D. VPN tunnels

Answer: B
ceh-v13 prep questions. Jorge - [Link]/@itbestpractice2741

24. What is the purpose of a reverse shell?

• A. It tunnels traffic through SSH


• B. It creates encrypted backups
• C. It allows a target system to initiate connection to the attacker
• D. It encrypts outgoing packets

Answer: C

You might also like