Pass the GAQM Certified Ethical Hacker CEH CEH-001 Questions and answers with CertsForce

Viewing page 1 out of 13 pages
Viewing questions 1-20 out of questions
Questions # 1:

LM authentication is not as strong as Windows NT authentication so you may want to disable its use, because an attacker eavesdropping on network traffic will attack the weaker protocol. A successful attack can compromise the user's password. How do you disable LM authentication in Windows XP?

Options:

A.

Stop the LM service in Windows XP


B.

Disable LSASS service in Windows XP


C.

Disable LM authentication in the registry


D.

Download and install LMSHUT.EXE tool from Microsoft website


Expert Solution
Questions # 2:

Let's imagine three companies (A, B and C), all competing in a challenging global environment. Company A and B are working together in developing a product that will generate a major competitive advantage for them. Company A has a secure DNS server while company B has a DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B, company C gains access to outgoing e-mails from company B. How do you prevent DNS spoofing? (Select the Best Answer.)

Options:

A.

Install DNS logger and track vulnerable packets


B.

Disable DNS timeouts


C.

Install DNS Anti-spoofing


D.

Disable DNS Zone Transfer


Expert Solution
Questions # 3:

What is the algorithm used by LM for Windows2000 SAM?

Options:

A.

MD4


B.

DES


C.

SHA


D.

SSL


Expert Solution
Questions # 4:

What is a Trojan Horse?

Options:

A.

A malicious program that captures your username and password


B.

Malicious code masquerading as or replacing legitimate code


C.

An unauthorized user who gains access to your user database and adds themselves as a user


D.

A server that is to be sacrificed to all hacking attempts in order to log and monitor the hacking activity


Expert Solution
Questions # 5:

Exhibit:

Question # 5

Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?

Options:

A.

har.txt


B.

SAM file


C.

wwwroot


D.

Repair file


Expert Solution
Questions # 6:

What is the goal of a Denial of Service Attack?

Options:

A.

Capture files from a remote computer.


B.

Render a network or computer incapable of providing normal service.


C.

Exploit a weakness in the TCP stack.


D.

Execute service at PS 1009.


Expert Solution
Questions # 7:

What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?

Options:

A.

Copy the system files from a known good system


B.

Perform a trap and trace


C.

Delete the files and try to determine the source


D.

Reload from a previous backup


E.

Reload from known good media


Expert Solution
Questions # 8:

A file integrity program such as Tripwire protects against Trojan horse attacks by:

Options:

A.

Automatically deleting Trojan horse programs


B.

Rejecting packets generated by Trojan horse programs


C.

Using programming hooks to inform the kernel of Trojan horse behavior


D.

Helping you catch unexpected changes to a system utility file that might indicate it had been replaced by a Trojan horse


Expert Solution
Questions # 9:

What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?(Choose all that apply.

Options:

A.

110


B.

135


C.

139


D.

161


E.

445


F.

1024


Expert Solution
Questions # 10:

Which of the following LM hashes represent a password of less than 8 characters? (Select 2)

Options:

A.

BA810DBA98995F1817306D272A9441BB


B.

44EFCE164AB921CQAAD3B435B51404EE


C.

0182BD0BD4444BF836077A718CCDF409


D.

CEC52EB9C8E3455DC2265B23734E0DAC


E.

B757BF5C0D87772FAAD3B435B51404EE


F.

E52CAC67419A9A224A3B108F3FA6CB6D


Expert Solution
Questions # 11:

Ethereal works best on ____________.

Options:

A.

Switched networks


B.

Linux platforms


C.

Networks using hubs


D.

Windows platforms


E.

LAN's


Expert Solution
Questions # 12:

_____ is the process of converting something from one representation to the simplest form. It deals with the way in which systems convert data from one form to another.

Options:

A.

Canonicalization


B.

Character Mapping


C.

Character Encoding


D.

UCS transformation formats


Expert Solution
Questions # 13:

In the following example, which of these is the "exploit"?

Today, Microsoft Corporation released a security notice. It detailed how a person could bring down the Windows 2003 Server operating system, by sending malformed packets to it. They detailed how this malicious process had been automated using basic scripting. Even worse, the new automated method for bringing down the server has already been used to perform denial of service attacks on many large commercial websites.

Select the best answer.

Options:

A.

Microsoft Corporation is the exploit.


B.

The security "hole" in the product is the exploit.


C.

Windows 2003 Server


D.

The exploit is the hacker that would use this vulnerability.


E.

The documented method of how to use the vulnerability to gain unprivileged access.


Expert Solution
Questions # 14:

Which of the following display filters will you enable in Ethereal to view the three-way handshake for a connection from host 192.168.0.1?

Options:

A.

ip == 192.168.0.1 and tcp.syn


B.

ip.addr = 192.168.0.1 and syn = 1


C.

ip.addr==192.168.0.1 and tcp.flags.syn


D.

ip.equals 192.168.0.1 and syn.equals on


Expert Solution
Questions # 15:

Susan has attached to her company’s network. She has managed to synchronize her boss’s sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory. What kind of attack is Susan carrying on?

Options:

A.

A sniffing attack


B.

A spoofing attack


C.

A man in the middle attack


D.

A denial of service attack


Expert Solution
Questions # 16:

Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?

Options:

A.

Covert keylogger


B.

Stealth keylogger


C.

Software keylogger


D.

Hardware keylogger


Expert Solution
Questions # 17:

In Linux, the three most common commands that hackers usually attempt to Trojan are:

Options:

A.

car, xterm, grep


B.

netstat, ps, top


C.

vmware, sed, less


D.

xterm, ps, nc


Expert Solution
Questions # 18:

You are a Administrator of Windows server. You want to find the port number for POP3. What file would you find the information in and where?

Select the best answer.

Options:

A.

%windir%\\etc\\services


B.

system32\\drivers\\etc\\services


C.

%windir%\\system32\\drivers\\etc\\services


D.

/etc/services


E.

%windir%/system32/drivers/etc/services


Expert Solution
Questions # 19:

What hacking attack is challenge/response authentication used to prevent?

Options:

A.

Replay attacks


B.

Scanning attacks


C.

Session hijacking attacks


D.

Password cracking attacks


Expert Solution
Questions # 20:

A POP3 client contacts the POP3 server:

Options:

A.

To send mail


B.

To receive mail


C.

to send and receive mail


D.

to get the address to send mail to


E.

initiate a UDP SMTP connection to read mail


Expert Solution
Viewing page 1 out of 13 pages
Viewing questions 1-20 out of questions