Pass the GAQM Certified Ethical Hacker CEH CEH-001 Questions and answers with CertsForce

Viewing page 13 out of 13 pages
Viewing questions 241-260 out of questions
Questions # 241:

When working with Windows systems, what is the RID of the true administrator account?

Options:

A.

500


B.

501


C.

1000


D.

1001


E.

1024


F.

512


Expert Solution
Questions # 242:

When a malicious hacker identifies a target and wants to eventually compromise this target, what would be among the first steps that he would perform? (Choose the best answer)

Options:

A.

Cover his tracks by eradicating the log files and audit trails.


B.

Gain access to the remote computer in order to conceal the venue of attacks.


C.

Perform a reconnaissance of the remote target for identical of venue of attacks.


D.

Always begin with a scan in order to quickly identify venue of attacks.


Expert Solution
Questions # 243:

Ron has configured his network to provide strong perimeter security. As part of his network architecture, he has included a host that is fully exposed to attack. The system is on the public side of the demilitarized zone, unprotected by a firewall or filtering router. What would you call such a host?

Options:

A.

Honeypot


B.

DMZ host


C.

DWZ host


D.

Bastion Host


Expert Solution
Questions # 244:

If you receive a RST packet while doing an ACK scan, it indicates that the port is open.(True/False).

Options:

A.

True


B.

False


Expert Solution
Questions # 245:

Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been able to spawn an interactive shell and plans to deface the main web page. He first attempts to use the “Echo” command to simply overwrite index.html and remains unsuccessful. He then attempts to delete the page and achieves no progress. Finally, he tries to overwrite it with another page again in vain.

What is the probable cause of Bill’s problem?

Options:

A.

The system is a honeypot.


B.

There is a problem with the shell and he needs to run the attack again.


C.

You cannot use a buffer overflow to deface a web page.


D.

The HTML file has permissions of ready only.


Expert Solution
Questions # 246:

On wireless networks, SSID is used to identify the network. Why are SSID not considered to be a good security mechanism to protect a wireless networks?

Options:

A.

The SSID is only 32 bits in length.


B.

The SSID is transmitted in clear text.


C.

The SSID is the same as the MAC address for all vendors.


D.

The SSID is to identify a station, not a network.


Expert Solution
Questions # 247:

You want to carry out session hijacking on a remote server. The server and the client are communicating via TCP after a successful TCP three way handshake. The server has just received packet #120 from the client. The client has a receive window of 200 and the server has a receive window of 250.

Within what range of sequence numbers should a packet, sent by the client fall in order to be accepted by the server?

Options:

A.

200-250


B.

121-371


C.

120-321


D.

121-231


E.

120-370


Expert Solution
Questions # 248:

Peter is a Linux network admin. As a knowledgeable security consultant, he turns to you to look for help on a firewall. He wants to use Linux as his firewall and use the latest freely available version that is offered. What do you recommend?

Select the best answer.

Options:

A.

Ipchains


B.

Iptables


C.

Checkpoint FW for Linux


D.

Ipfwadm


Expert Solution
Questions # 249:

What makes web application vulnerabilities so aggravating? (Choose two)

Options:

A.

They can be launched through an authorized port.


B.

A firewall will not stop them.


C.

They exist only on the Linux platform.


D.

They are detectable by most leading antivirus software.


Expert Solution
Questions # 250:

Kevin has been asked to write a short program to gather user input for a web application. He likes to keep his code neat and simple. He chooses to use printf(str) where he should have ideally used printf(?s? str). What attack will his program expose the web application to?

Options:

A.

Cross Site Scripting


B.

SQL injection Attack


C.

Format String Attack


D.

Unicode Traversal Attack


Expert Solution
Questions # 251:

After studying the following log entries, how many user IDs can you identify that the attacker has tampered with?

1. mkdir -p /etc/X11/applnk/Internet/.etc

2. mkdir -p /etc/X11/applnk/Internet/.etcpasswd

3. touch -acmr /etc/passwd /etc/X11/applnk/Internet/.etcpasswd

4. touch -acmr /etc /etc/X11/applnk/Internet/.etc

5. passwd nobody -d

6. /usr/sbin/adduser dns -d/bin -u 0 -g 0 -s/bin/bash

7. passwd dns -d

8. touch -acmr /etc/X11/applnk/Internet/.etcpasswd /etc/passwd

9. touch -acmr /etc/X11/applnk/Internet/.etc /etc

Options:

A.

IUSR_


B.

acmr, dns


C.

nobody, dns


D.

nobody, IUSR_


Expert Solution
Questions # 252:

Several of your co-workers are having a discussion over the etc/passwd file. They are at odds over what types of encryption are used to secure Linux passwords.(Choose all that apply.

Options:

A.

Linux passwords can be encrypted with MD5


B.

Linux passwords can be encrypted with SHA


C.

Linux passwords can be encrypted with DES


D.

Linux passwords can be encrypted with Blowfish


E.

Linux passwords are encrypted with asymmetric algrothims


Expert Solution
Viewing page 13 out of 13 pages
Viewing questions 241-260 out of questions