Pass the GAQM Certified Ethical Hacker CEH CEH-001 Questions and answers with CertsForce

Viewing page 4 out of 13 pages
Viewing questions 61-80 out of questions
Questions # 61:

Which of the following describes the characteristics of a Boot Sector Virus?

Options:

A.

Moves the MBR to another location on the RAM and copies itself to the original location of the MBR


B.

Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR


C.

Modifies directory table entries so that directory entries point to the virus code instead of the actual program


D.

Overwrites the original MBR and only executes the new virus code


Expert Solution
Questions # 62:

Firewalk has just completed the second phase (the scanning phase) and a technician receives the output shown below. What conclusions can be drawn based on these scan results? TCP port 21 – no response TCP port 22 – no response TCP port 23 – Time-to-live exceeded

Options:

A.

The firewall itself is blocking ports 21 through 23 and a service is listening on port 23 of the target host.


B.

The lack of response from ports 21 and 22 indicate that those services are not running on the destination server.


C.

The scan on port 23 passed through the filtering device. This indicates that port 23 was not blocked at the firewall.


D.

The scan on port 23 was able to make a connection to the destination host prompting the firewall to respond with a TTL error.


Expert Solution
Questions # 63:

Which set of access control solutions implements two-factor authentication?

Options:

A.

USB token and PIN


B.

Fingerprint scanner and retina scanner


C.

Password and PIN


D.

Account and password


Expert Solution
Questions # 64:

An NMAP scan of a server shows port 25 is open. What risk could this pose?

Options:

A.

Open printer sharing


B.

Web portal data leak


C.

Clear text authentication


D.

Active mail relay


Expert Solution
Questions # 65:

What are common signs that a system has been compromised or hacked? (Choose three.)

Options:

A.

Increased amount of failed logon events


B.

Patterns in time gaps in system and/or event logs


C.

New user accounts created


D.

Consistency in usage baselines


E.

Partitions are encrypted


F.

Server hard drives become fragmented


Expert Solution
Questions # 66:

What type of Virus is shown here?

Question # 66

Options:

A.

Macro Virus


B.

Cavity Virus


C.

Boot Sector Virus


D.

Metamorphic Virus


E.

Sparse Infector Virus


Expert Solution
Questions # 67:

This method is used to determine the Operating system and version running on a remote target system. What is it called?

Options:

A.

Service Degradation


B.

OS Fingerprinting


C.

Manual Target System


D.

Identification Scanning


Expert Solution
Questions # 68:

Switches maintain a CAM Table that maps individual MAC addresses on the network to physical ports on the switch.

Question # 68

In MAC flooding attack, a switch is fed with many Ethernet frames, each containing different source MAC addresses, by the attacker. Switches have a limited memory for mapping various MAC addresses to physical ports. What happens when the CAM table becomes full?

Options:

A.

Switch then acts as hub by broadcasting packets to all machines on the network


B.

The CAM overflow table will cause the switch to crash causing Denial of Service


C.

The switch replaces outgoing frame switch factory default MAC address of FF:FF:FF:FF:FF:FF


D.

Every packet is dropped and the switch sends out SNMP alerts to the IDS port


Expert Solution
Questions # 69:

Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches. If these switches' ARP cache is successfully flooded, what will be the result?

Options:

A.

The switches will drop into hub mode if the ARP cache is successfully flooded.


B.

If the ARP cache is flooded, the switches will drop into pix mode making it less susceptible to attacks.


C.

Depending on the switch manufacturer, the device will either delete every entry in its ARP cache or reroute packets to the nearest switch.


D.

The switches will route all traffic to the broadcast address created collisions.


Expert Solution
Questions # 70:

Every company needs a formal written document which spells out to employees precisely what they are allowed to use the company's systems for, what is prohibited, and what will happen to them if they break the rules. Two printed copies of the policy should be given to every employee as soon as possible after they join the organization. The employee should be asked to sign one copy, which should be safely filed by the company. No one should be allowed to use the company's computer systems until they have signed the policy in acceptance of its terms. What is this document called?

Options:

A.

Information Audit Policy (IAP)


B.

Information Security Policy (ISP)


C.

Penetration Testing Policy (PTP)


D.

Company Compliance Policy (CCP)


Expert Solution
Questions # 71:

What framework architecture is shown in this exhibit?

Question # 71

Options:

A.

Core Impact


B.

Metasploit


C.

Immunity Canvas


D.

Nessus


Expert Solution
Questions # 72:

A Trojan horse is a destructive program that masquerades as a benign application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but in addition to the expected function steals information or harms the system.

Question # 72

The challenge for an attacker is to send a convincing file attachment to the victim, which gets easily executed on the victim machine without raising any suspicion. Today's end users are quite knowledgeable about malwares and viruses. Instead of sending games and fun executables, Hackers today are quite successful in spreading the Trojans using Rogue security software.

What is Rogue security software?

Options:

A.

A flash file extension to Firefox that gets automatically installed when a victim visits rogue software disabling websites


B.

A Fake AV program that claims to rid a computer of malware, but instead installs spyware or other malware onto the computer. This kind of software is known as rogue security software.


C.

Rogue security software is based on social engineering technique in which the attackers lures victim to visit spear phishing websites


D.

This software disables firewalls and establishes reverse connecting tunnel between the victim's machine and that of the attacker


Expert Solution
Questions # 73:

In TCP communications there are 8 flags; FIN, SYN, RST, PSH, ACK, URG, ECE, CWR. These flags have decimal numbers assigned to them:

FIN = 1

SYN = 2

RST = 4

PSH = 8

ACK = 16

URG = 32

ECE = 64

CWR =128

Example: To calculate SYN/ACK flag decimal value, add 2 (which is the decimal value of the SYN flag) to 16 (which is the decimal value of the ACK flag), so the result would be 18.

Based on the above calculation, what is the decimal value for XMAS scan?

Options:

A.

23


B.

24


C.

41


D.

64


Expert Solution
Questions # 74:

Attackers send an ACK probe packet with random sequence number, no response means port is filtered (Stateful firewall is present) and RST response means the port is not filtered. What type of Port Scanning is this?

Options:

A.

RST flag scanning


B.

FIN flag scanning


C.

SYN flag scanning


D.

ACK flag scanning


Expert Solution
Questions # 75:

Bob has a good understanding of cryptography, having worked with it for many years. Cryptography is used to secure data from specific threats, but it does not secure the application from coding errors. It can provide data privacy; integrity and enable strong authentication but it cannot mitigate programming errors. What is a good example of a programming error that Bob can use to explain to the management how encryption will not address all their security concerns?

Options:

A.

Bob can explain that using a weak key management technique is a form of programming error


B.

Bob can explain that using passwords to derive cryptographic keys is a form of a programming error


C.

Bob can explain that a buffer overflow is an example of programming error and it is a common mistake associated with poor programming technique


D.

Bob can explain that a random number generator can be used to derive cryptographic keys but it uses a weak seed value and this is a form of a programming error


Expert Solution
Questions # 76:

Johnny is a member of the hacking group Orpheus1. He is currently working on breaking into the Department of Defense's front end Exchange Server. He was able to get into the server, located in a DMZ, by using an unused service account that had a very weak password that he was able to guess. Johnny wants to crack the administrator password, but does not have a lot of time to crack it. He wants to use a tool that already has the LM hashes computed for all possible permutations of the administrator password.

What tool would be best used to accomplish this?

Options:

A.

SMBCrack


B.

SmurfCrack


C.

PSCrack


D.

RainbowTables


Expert Solution
Questions # 77:

Michael is a junior security analyst working for the National Security Agency (NSA) working primarily on breaking terrorist encrypted messages. The NSA has a number of methods they use to decipher encrypted messages including Government Access to Keys (GAK) and inside informants. The NSA holds secret backdoor keys to many of the encryption algorithms used on the Internet. The problem for the NSA, and Michael, is that terrorist organizations are starting to use custom-built algorithms or obscure algorithms purchased from corrupt governments. For this reason, Michael and other security analysts like him have been forced to find different methods of deciphering terrorist messages. One method that Michael thought of using was to hide malicious code inside seemingly harmless programs. Michael first monitors sites and bulletin boards used by known terrorists, and then he is able to glean email addresses to some of these suspected terrorists. Michael then inserts a stealth keylogger into a mapping program file readme.txt and then sends that as an attachment to the terrorist. This keylogger takes screenshots every 2 minutes and also logs all keyboard activity into a hidden file on the terrorist's computer. Then, the keylogger emails those files to Michael twice a day with a built in SMTP server. What technique has Michael used to disguise this keylogging software?

Options:

A.

Steganography


B.

Wrapping


C.

ADS


D.

Hidden Channels


Expert Solution
Questions # 78:

When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK. How would an attacker exploit this design by launching TCP SYN attack?

Options:

A.

Attacker generates TCP SYN packets with random destination addresses towards a victim host


B.

Attacker floods TCP SYN packets with random source addresses towards a victim host


C.

Attacker generates TCP ACK packets with random source addresses towards a victim host


D.

Attacker generates TCP RST packets with random source addresses towards a victim host


Expert Solution
Questions # 79:

You are trying to break into a highly classified top-secret mainframe computer with highest security system in place at Merclyn Barley Bank located in Los Angeles. You know that conventional hacking doesn't work in this case, because organizations such as banks are generally tight and secure when it comes to protecting their systems. In other words you are trying to penetrate an otherwise impenetrable system. How would you proceed?

Options:

A.

Look for "zero-day" exploits at various underground hacker websites in Russia and China and buy the necessary exploits from these hackers and target the bank's network


B.

Try to hang around the local pubs or restaurants near the bank, get talking to a poorly-paid or disgruntled employee, and offer them money if they'll abuse their access privileges by providing you with sensitive information


C.

Launch DDOS attacks against Merclyn Barley Bank's routers and firewall systems using 100, 000 or more "zombies" and "bots"


D.

Try to conduct Man-in-the-Middle (MiTM) attack and divert the network traffic going to the Merclyn Barley Bank's Webserver to that of your machine using DNS Cache Poisoning techniques


Expert Solution
Questions # 80:

How does a denial-of-service attack work?

Options:

A.

A hacker prevents a legitimate user (or group of users) from accessing a service


B.

A hacker uses every character, word, or letter he or she can think of to defeat authentication


C.

A hacker tries to decipher a password by using a system, which subsequently crashes the network


D.

A hacker attempts to imitate a legitimate user by confusing a computer or even another person


Expert Solution
Viewing page 4 out of 13 pages
Viewing questions 61-80 out of questions