Pass the GAQM Certified Ethical Hacker CEH CEH-001 Questions and answers with CertsForce

Viewing page 10 out of 13 pages
Viewing questions 181-200 out of questions
Questions # 181:

Jake works as a system administrator at Acme Corp. Jason, an accountant of the firm befriends him at the canteen and tags along with him on the pretext of appraising him about potential tax benefits. Jason waits for Jake to swipe his access card and follows him through the open door into the secure systems area. How would you describe Jason's behavior within a security context?

Options:

A.

Smooth Talking


B.

Swipe Gating


C.

Tailgating


D.

Trailing


Expert Solution
Questions # 182:

In Buffer Overflow exploit, which of the following registers gets overwritten with return address of the exploit code?

Options:

A.

EEP


B.

ESP


C.

EAP


D.

EIP


Expert Solution
Questions # 183:

Dan is conducting penetration testing and has found a vulnerability in a Web Application which gave him the sessionID token via a cross site scripting vulnerability. Dan wants to replay this token. However, the session ID manager (on the server) checks the originating IP address as well. Dan decides to spoof his IP address in order to replay the sessionID. Why do you think Dan might not be able to get an interactive session?

Options:

A.

Dan cannot spoof his IP address over TCP network


B.

The scenario is incorrect as Dan can spoof his IP and get responses


C.

The server will send replies back to the spoofed IP address


D.

Dan can establish an interactive session only if he uses a NAT


Expert Solution
Questions # 184:

Which of the following statement correctly defines ICMP Flood Attack? (Select 2 answers)

Question # 184

Options:

A.

Bogus ECHO reply packets are flooded on the network spoofing the IP and MAC address


B.

The ICMP packets signal the victim system to reply and the combination of traffic saturates the bandwidth of the victim's network


C.

ECHO packets are flooded on the network saturating the bandwidth of the subnet causing denial of service


D.

A DDoS ICMP flood attack occurs when the zombies send large volumes of ICMP_ECHO_REPLY packets to the victim system.


Expert Solution
Questions # 185:

What is the problem with this ASP script (login.asp)?

Question # 185

Options:

A.

The ASP script is vulnerable to Cross Site Scripting attack


B.

The ASP script is vulnerable to Session Splice attack


C.

The ASP script is vulnerable to XSS attack


D.

The ASP script is vulnerable to SQL Injection attack


Expert Solution
Questions # 186:

Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and uses the special card in order to access the restricted area of the target company. Just as the employee opens the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so that he can enter. What is the best way to undermine the social engineering activity of tailgating?

Options:

A.

Issue special cards to access secure doors at the company and provide a one-time only brief description of use of the special card


B.

Educate and enforce physical security policies of the company to all the employees on a regular basis


C.

Setup a mock video camera next to the special card reader adjacent to the secure door


D.

Post a sign that states, "no tailgating" next to the special card reader adjacent to the secure door


Expert Solution
Questions # 187:

You are the security administrator of Jaco Banking Systems located in Boston. You are setting up e-banking website (http://www.ejacobank.com) authentication system. Instead of issuing banking customer with a single password, you give them a printed list of 100 unique passwords. Each time the customer needs to log into the e-banking system website, the customer enters the next password on the list. If someone sees them type the password using shoulder surfing, MiTM or keyloggers, then no damage is done because the password will not be accepted a second time. Once the list of 100 passwords is almost finished, the system automatically sends out a new password list by encrypted e-mail to the customer.

You are confident that this security implementation will protect the customer from password abuse.

Two months later, a group of hackers called "HackJihad" found a way to access the one-time password list issued to customers of Jaco Banking Systems. The hackers set up a fake website (http://www.e-jacobank.com) and used phishing attacks to direct ignorant customers to it. The fake website asked users for their e-banking username and password, and the next unused entry from their one-time password sheet. The hackers collected 200 customer 's username/passwords this way. They transferred money from the customer's bank account to various offshore accounts.

Your decision of password policy implementation has cost the bank with USD 925, 000 to hackers. You immediately shut down the e-banking website while figuring out the next best security solution

What effective security solution will you recommend in this case?

Options:

A.

Implement Biometrics based password authentication system. Record the customers face image to the authentication database


B.

Configure your firewall to block logon attempts of more than three wrong tries


C.

Enable a complex password policy of 20 characters and ask the user to change the password immediately after they logon and do not store password histories


D.

Implement RSA SecureID based authentication system


Expert Solution
Questions # 188:

A security administrator notices that the log file of the company`s webserver contains suspicious entries:

Question # 188

Based on source code analysis, the analyst concludes that the login.php script is vulnerable to

Options:

A.

command injection.


B.

SQL injection.


C.

directory traversal.


D.

LDAP injection.


Expert Solution
Questions # 189:

Which of the following is a detective control?

Options:

A.

Smart card authentication


B.

Security policy


C.

Audit trail


D.

Continuity of operations plan


Expert Solution
Questions # 190:

The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses which of the following?

Options:

A.

Multiple keys for non-repudiation of bulk data


B.

Different keys on both ends of the transport medium


C.

Bulk encryption for data transmission over fiber


D.

The same key on each end of the transmission medium


Expert Solution
Questions # 191:

A network administrator received an administrative alert at 3:00 a.m. from the intrusion detection system. The alert was generated because a large number of packets were coming into the network over ports 20 and 21. During analysis, there were no signs of attack on the FTP servers. How should the administrator classify this situation?

Options:

A.

True negatives


B.

False negatives


C.

True positives


D.

False positives


Expert Solution
Questions # 192:

The intrusion detection system at a software development company suddenly generates multiple alerts regarding attacks against the company's external webserver, VPN concentrator, and DNS servers. What should the security team do to determine which alerts to check first?

Options:

A.

Investigate based on the maintenance schedule of the affected systems.


B.

Investigate based on the service level agreements of the systems.


C.

Investigate based on the potential effect of the incident.


D.

Investigate based on the order that the alerts arrived in.


Expert Solution
Questions # 193:

Which of the following settings enables Nessus to detect when it is sending too many packets and the network pipe is approaching capacity?

Options:

A.

Netstat WMI Scan


B.

Silent Dependencies


C.

Consider unscanned ports as closed


D.

Reduce parallel connections on congestion


Expert Solution
Questions # 194:

Which type of access control is used on a router or firewall to limit network activity?

Options:

A.

Mandatory


B.

Discretionary


C.

Rule-based


D.

Role-based


Expert Solution
Questions # 195:

How can telnet be used to fingerprint a web server?

Options:

A.

telnet webserverAddress 80

HEAD / HTTP/1.0


B.

telnet webserverAddress 80

PUT / HTTP/1.0


C.

telnet webserverAddress 80

HEAD / HTTP/2.0


D.

telnet webserverAddress 80

PUT / HTTP/2.0


Expert Solution
Questions # 196:

A network security administrator is worried about potential man-in-the-middle attacks when users access a corporate web site from their workstations. Which of the following is the best remediation against this type of attack?

Options:

A.

Implementing server-side PKI certificates for all connections


B.

Mandating only client-side PKI certificates for all connections


C.

Requiring client and server PKI certificates for all connections


D.

Requiring strong authentication for all DNS queries


Expert Solution
Questions # 197:

Windows file servers commonly hold sensitive files, databases, passwords and more. Which of the following choices would be a common vulnerability that usually exposes them?

Options:

A.

Cross-site scripting


B.

SQL injection


C.

Missing patches


D.

CRLF injection


Expert Solution
Questions # 198:

A hacker was able to sniff packets on a company's wireless network. The following information was discovereD.

The Key 10110010 01001011

The Cyphertext 01100101 01011010

Using the Exlcusive OR, what was the original message?

Options:

A.

00101000 11101110


B.

11010111 00010001


C.

00001101 10100100


D.

11110010 01011011


Expert Solution
Questions # 199:

A security policy will be more accepted by employees if it is consistent and has the support of

Options:

A.

coworkers.


B.

executive management.


C.

the security officer.


D.

a supervisor.


Expert Solution
Questions # 200:

Which of the statements concerning proxy firewalls is correct?

Options:

A.

Proxy firewalls increase the speed and functionality of a network.


B.

Firewall proxy servers decentralize all activity for an application.


C.

Proxy firewalls block network packets from passing to and from a protected network.


D.

Computers establish a connection with a proxy firewall which initiates a new network connection for the client.


Expert Solution
Viewing page 10 out of 13 pages
Viewing questions 181-200 out of questions