Pass the GAQM Certified Ethical Hacker CEH CEH-001 Questions and answers with CertsForce

Viewing page 5 out of 13 pages
Viewing questions 81-100 out of questions
Questions # 81:

Charlie is the network administrator for his company. Charlie just received a new Cisco router and wants to test its capabilities out and to see if it might be susceptible to a DoS attack resulting in its locking up. The IP address of the Cisco switch is 172.16.0.45. What command can Charlie use to attempt this task?

Options:

A.

Charlie can use the commanD. ping -l 56550 172.16.0.45 -t.


B.

Charlie can try using the commanD. ping 56550 172.16.0.45.


C.

By using the command ping 172.16.0.45 Charlie would be able to lockup the router


D.

He could use the commanD. ping -4 56550 172.16.0.45.


Expert Solution
Questions # 82:

Gerald, the Systems Administrator for Hyped Enterprises, has just discovered that his network has been breached by an outside attacker. After performing routine maintenance on his servers, he discovers numerous remote tools were installed that no one claims to have knowledge of in his department. Gerald logs onto the management console for his IDS and discovers an unknown IP address that scanned his network constantly for a week and was able to access his network through a high-level port that was not closed. Gerald traces the IP address he found in the IDS log to a proxy server in Brazil. Gerald calls the company that owns the proxy server and after searching through their logs, they trace the source to another proxy server in Switzerland. Gerald calls the company in Switzerland that owns the proxy server and after scanning through the logs again, they trace the source back to a proxy server in China. What proxy tool has Gerald's attacker used to cover their tracks?

Options:

A.

ISA proxy


B.

IAS proxy


C.

TOR proxy


D.

Cheops proxy


Expert Solution
Questions # 83:

You work for Acme Corporation as Sales Manager. The company has tight network security restrictions. You are trying to steal data from the company's Sales database (Sales.xls) and transfer them to your home computer. Your company filters and monitors traffic that leaves from the internal network to the Internet. How will you achieve this without raising suspicion?

Options:

A.

Encrypt the Sales.xls using PGP and e-mail it to your personal gmail account


B.

Package the Sales.xls using Trojan wrappers and telnet them back your home computer


C.

You can conceal the Sales.xls database in another file like photo.jpg or other files and send it out in an innocent looking email or file transfer using Steganography techniques


D.

Change the extension of Sales.xls to sales.txt and upload them as attachment to your hotmail account


Expert Solution
Questions # 84:

Your company has blocked all the ports via external firewall and only allows port 80/443 to connect to the Internet. You want to use FTP to connect to some remote server on the Internet. How would you accomplish this?

Options:

A.

Use HTTP Tunneling


B.

Use Proxy Chaining


C.

Use TOR Network


D.

Use Reverse Chaining


Expert Solution
Questions # 85:

What type of session hijacking attack is shown in the exhibit?

Question # 85

Options:

A.

Session Sniffing Attack


B.

Cross-site scripting Attack


C.

SQL Injection Attack


D.

Token sniffing Attack


Expert Solution
Questions # 86:

A digital signature is simply a message that is encrypted with the public key instead of the private key.

Options:

A.

true


B.

false


Expert Solution
Questions # 87:

John is using a special tool on his Linux platform that has a database containing signatures to be able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI/ASPX scripts. Moreover, the database detects DDoS zombies and Trojans as well. What would be the name of this tool?

Options:

A.

hping2


B.

nessus


C.

nmap


D.

make


Expert Solution
Questions # 88:

Take a look at the following attack on a Web Server using obstructed URL:

Question # 88

How would you protect from these attacks?

Options:

A.

Configure the Web Server to deny requests involving "hex encoded" characters


B.

Create rules in IDS to alert on strange Unicode requests


C.

Use SSL authentication on Web Servers


D.

Enable Active Scripts Detection at the firewall and routers


Expert Solution
Questions # 89:

At a Windows Server command prompt, which command could be used to list the running services?

Options:

A.

Sc query type= running


B.

Sc query \\servername


C.

Sc query


D.

Sc config


Expert Solution
Questions # 90:

Destination unreachable administratively prohibited messages can inform the hacker to what?

Options:

A.

That a circuit level proxy has been installed and is filtering traffic


B.

That his/her scans are being blocked by a honeypot or jail


C.

That the packets are being malformed by the scanning software


D.

That a router or other packet-filtering device is blocking traffic


E.

That the network is functioning normally


Expert Solution
Questions # 91:

Which Windows system tool checks integrity of critical files that has been digitally signed by Microsoft?

Options:

A.

signverif.exe


B.

sigverif.exe


C.

msverif.exe


D.

verifier.exe


Expert Solution
Questions # 92:

Ann would like to perform a reliable scan against a remote target. She is not concerned about being stealth at this point.

Which of the following type of scans would be the most accurate and reliable option?

Options:

A.

A half-scan


B.

A UDP scan


C.

A TCP Connect scan


D.

A FIN scan


Expert Solution
Questions # 93:

A person approaches a network administrator and wants advice on how to send encrypted email from home. The end user does not want to have to pay for any license fees or manage server services. Which of the following is the most secure encryption protocol that the network administrator should recommend?

Options:

A.

IP Security (IPSEC)


B.

Multipurpose Internet Mail Extensions (MIME)


C.

Pretty Good Privacy (PGP)


D.

Hyper Text Transfer Protocol with Secure Socket Layer (HTTPS)


Expert Solution
Questions # 94:

Sandra has been actively scanning the client network on which she is doing a vulnerability assessment test. While conducting a port scan she notices open ports in the range of 135 to 139. What protocol is most likely to be listening on those ports?

Options:

A.

Finger


B.

FTP


C.

Samba


D.

SMB


Expert Solution
Questions # 95:

Snort has been used to capture packets on the network. On studying the packets, the penetration tester finds it to be abnormal. If you were the penetration tester, why would you find this abnormal?

05/20-17:0645.061034 192.160.13.4:31337 --> 172.16.1.101:1

TCP TTL:44 TOS:0x10 ID:242

***FRP** Seq:0xA1D95  Ack:0x53  Win: 0x400

What is odd about this attack? (Choose the most appropriate statement)

Options:

A.

This is not a spoofed packet as the IP stack has increasing numbers for the three flags.


B.

This is back orifice activity as the scan comes from port 31337.


C.

The attacker wants to avoid creating a sub-carrier connection that is not normally valid.


D.

There packets were created by a tool; they were not created by a standard IP stack.


Expert Solution
Questions # 96:

Botnets are networks of compromised computers that are controlled remotely and surreptitiously by one or more cyber criminals. How do cyber criminals infect a victim's computer with bots? (Select 4 answers)

Options:

A.

Attackers physically visit every victim's computer to infect them with malicious software


B.

Home computers that have security vulnerabilities are prime targets for botnets


C.

Spammers scan the Internet looking for computers that are unprotected and use these "open-doors" to install malicious software


D.

Attackers use phishing or spam emails that contain links or attachments


E.

Attackers use websites to host the bots utilizing Web Browser vulnerabilities


Expert Solution
Questions # 97:

You are conducting a port scan on a subnet that has ICMP blocked. You have discovered 23 live systems and after scanning each of them you notice that they all show port 21 in closed state.

What should be the next logical step that should be performed?

Options:

A.

Connect to open ports to discover applications.


B.

Perform a ping sweep to identify any additional systems that might be up.


C.

Perform a SYN scan on port 21 to identify any additional systems that might be up.


D.

Rescan every computer to verify the results.


Expert Solution
Questions # 98:

To what does “message repudiation” refer to what concept in the realm of email security?

Options:

A.

Message repudiation means a user can validate which mail server or servers a message was passed through.


B.

Message repudiation means a user can claim damages for a mail message that damaged their reputation.


C.

Message repudiation means a recipient can be sure that a message was sent from a particular person.


D.

Message repudiation means a recipient can be sure that a message was sent from a certain host.


E.

Message repudiation means a sender can claim they did not actually send a particular message.


Expert Solution
Questions # 99:

The following excerpt is taken from a honeyput log. The log captures activities across three days. There are several intrusion attempts; however, a few are successful. Study the log given below and answer the following question:

(Note: The objective of this questions is to test whether the student has learnt about passive OS fingerprinting (which should tell them the OS from log captures): can they tell a SQL injection attack signature; can they infer if a user ID has been created by an attacker and whether they can read plain source – destination entries from log entries.)

Question # 99

What can you infer from the above log?

Options:

A.

The system is a windows system which is being scanned unsuccessfully.


B.

The system is a web application server compromised through SQL injection.


C.

The system has been compromised and backdoored by the attacker.


D.

The actual IP of the successful attacker is 24.9.255.53.


Expert Solution
Questions # 100:

Which of the following tools can be used to perform a zone transfer?

Options:

A.

NSLookup


B.

Finger


C.

Dig


D.

Sam Spade


E.

Host


F.

Netcat


G.

Neotrace


Expert Solution
Viewing page 5 out of 13 pages
Viewing questions 81-100 out of questions