Pass the GAQM Certified Ethical Hacker CEH CEH-001 Questions and answers with CertsForce

Viewing page 12 out of 13 pages
Viewing questions 221-240 out of questions
Questions # 221:

You find the following entries in your web log. Each shows attempted access to either root.exe or cmd.exe.

What caused this?

Question # 221

Options:

A.

The Morris worm


B.

The PIF virus


C.

Trinoo


D.

Nimda


E.

Code Red


F.

Ping of Death


Expert Solution
Questions # 222:

What does black box testing mean?

Options:

A.

You have full knowledge of the environment


B.

You have no knowledge of the environment


C.

You have partial knowledge of the environment


Expert Solution
Questions # 223:

Derek has stumbled upon a wireless network and wants to assess its security. However, he does not find enough traffic for a good capture. He intends to use AirSnort on the captured traffic to crack the WEP key and does not know the IP address range or the AP. How can he generate traffic on the network so that he can capture enough packets to crack the WEP key?

Options:

A.

Use any ARP requests found in the capture


B.

Derek can use a session replay on the packets captured


C.

Derek can use KisMAC as it needs two USB devices to generate traffic


D.

Use Ettercap to discover the gateway and ICMP ping flood tool to generate traffic


Expert Solution
Questions # 224:

Bob, an Administrator at XYZ was furious when he discovered that his buddy Trent, has launched a session hijack attack against his network, and sniffed on his communication, including administrative tasks suck as configuring routers, firewalls, IDS, via Telnet.

Bob, being an unhappy administrator, seeks your help to assist him in ensuring that attackers such as Trent will not be able to launch a session hijack in XYZ.

Based on the above scenario, please choose which would be your corrective measurement actions. (Choose two)

Options:

A.

Use encrypted protocols, like those found in the OpenSSH suite.


B.

Implement FAT32 filesystem for faster indexing and improved performance.


C.

Configure the appropriate spoof rules on gateways (internal and external).


D.

Monitor for CRP caches, by using IDS products.


Expert Solution
Questions # 225:

Tess King is making use of Digest Authentication for her Web site. Why is this considered to be more secure than Basic authentication?

Options:

A.

Basic authentication is broken


B.

The password is never sent in clear text over the network


C.

The password sent in clear text over the network is never reused.


D.

It is based on Kerberos authentication protocol


Expert Solution
Questions # 226:

Which of the following is most effective against passwords?

Select the Answer:

Options:

A.

Dictionary Attack


B.

BruteForce attack


C.

Targeted Attack


D.

Manual password Attack


Expert Solution
Questions # 227:

There are two types of honeypots- high and low interaction. Which of these describes a low interaction honeypot? Select the best answers.

Options:

A.

Emulators of vulnerable programs


B.

More likely to be penetrated


C.

Easier to deploy and maintain


D.

Tend to be used for production


E.

More detectable


F.

Tend to be used for research


Expert Solution
Questions # 228:

What do you call a system where users need to remember only one username and password, and be authenticated for multiple services?

Options:

A.

Simple Sign-on


B.

Unique Sign-on


C.

Single Sign-on


D.

Digital Certificate


Expert Solution
Questions # 229:

In an attempt to secure his wireless network, Bob turns off broadcasting of the SSID. He concludes that since his access points require the client computer to have the proper SSID, it would prevent others from connecting to the wireless network. Unfortunately unauthorized users are still able to connect to the wireless network.

Why do you think this is possible?

Options:

A.

Bob forgot to turn off DHCP.


B.

All access points are shipped with a default SSID.


C.

The SSID is still sent inside both client and AP packets.


D.

Bob’s solution only works in ad-hoc mode.


Expert Solution
Questions # 230:

Why would an ethical hacker use the technique of firewalking?

Options:

A.

It is a technique used to discover wireless network on foot.


B.

It is a technique used to map routers on a network link.


C.

It is a technique used to discover the nature of rules configured on a gateway.


D.

It is a technique used to discover interfaces in promiscuous mode.


Expert Solution
Questions # 231:

Exhibit

Question # 231

Study the log given in the exhibit,

Precautionary measures to prevent this attack would include writing firewall rules. Of these firewall rules, which among the following would be appropriate?

Options:

A.

Disallow UDP 53 in from outside to DNS server


B.

Allow UDP 53 in from DNS server to outside


C.

Disallow TCP 53 in form secondaries or ISP server to DNS server


D.

Block all UDP traffic


Expert Solution
Questions # 232:

Windump is the windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform you must install a packet capture library.

What is the name of this library?

Options:

A.

NTPCAP


B.

LibPCAP


C.

WinPCAP


D.

PCAP


Expert Solution
Questions # 233:

What are the three phases involved in security testing?

Options:

A.

Reconnaissance, Conduct, Report


B.

Reconnaissance, Scanning, Conclusion


C.

Preparation, Conduct, Conclusion


D.

Preparation, Conduct, Billing


Expert Solution
Questions # 234:

While scanning a network you observe that all of the web servers in the DMZ are responding to ACK packets on port 80.

What can you infer from this observation?

Options:

A.

They are using Windows based web servers.


B.

They are using UNIX based web servers.


C.

They are not using an intrusion detection system.


D.

They are not using a stateful inspection firewall.


Expert Solution
Questions # 235:

There is some dispute between two network administrators at your company. Your boss asks you to come and meet with the administrators to set the record straight. Which of these are true about PKI and encryption?

Select the best answers.

Options:

A.

PKI provides data with encryption, compression, and restorability.


B.

Public-key encryption was invented in 1976 by Whitfield Diffie and Martin Hellman.


C.

When it comes to eCommerce, as long as you have authenticity, and authenticity, you do not need encryption.


D.

RSA is a type of encryption.


Expert Solution
Questions # 236:

On a default installation of Microsoft IIS web server, under which privilege does the web server software execute?

Options:

A.

Everyone


B.

Guest


C.

System


D.

Administrator


Expert Solution
Questions # 237:

In order to attack a wireless network, you put up an access point and override the signal of the real access point. As users send authentication data, you are able to capture it. What kind of attack is this?

Options:

A.

WEP attack


B.

Drive by hacking


C.

Rogue access point attack


D.

Unauthorized access point attack


Expert Solution
Questions # 238:

WEP is used on 802.11 networks, what was it designed for?

Options:

A.

WEP is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what it usually expected of a wired LAN.


B.

WEP is designed to provide strong encryption to a wireless local area network (WLAN) with a lever of integrity and privacy adequate for sensible but unclassified information.


C.

WEP is designed to provide a wireless local area network (WLAN) with a level of availability and privacy comparable to what is usually expected of a wired LAN.


D.

WEOP is designed to provide a wireless local area network (WLAN) with a level of privacy comparable to what it usually expected of a wired LAN.


Expert Solution
Questions # 239:

Virus Scrubbers and other malware detection program can only detect items that they are aware of. Which of the following tools would allow you to detect unauthorized changes or modifications of binary files on your system by unknown malware?

Options:

A.

System integrity verification tools


B.

Anti-Virus Software


C.

A properly configured gateway


D.

There is no way of finding out until a new updated signature file is released


Expert Solution
Questions # 240:

Jim is having no luck performing a penetration test in XYZ’s network. He is running the tests from home and has downloaded every security scanner that he could lay his hands on. Despite knowing the IP range of all the systems, and the exact network configuration, Jim is unable to get any useful results.

Why is Jim having these problems?

Options:

A.

Security scanners are not designed to do testing through a firewall.


B.

Security scanners cannot perform vulnerability linkage.


C.

Security scanners are only as smart as their database and cannot find unpublished vulnerabilities.


D.

All of the above.


Expert Solution
Viewing page 12 out of 13 pages
Viewing questions 221-240 out of questions