Pass the GAQM Certified Ethical Hacker CEH CEH-001 Questions and answers with CertsForce

Viewing page 6 out of 13 pages
Viewing questions 101-120 out of questions
Questions # 101:

What is the proper response for a FIN scan if the port is closed?

Options:

A.

SYN


B.

ACK


C.

FIN


D.

PSH


E.

RST


Expert Solution
Questions # 102:

Harold is the senior security analyst for a small state agency in New York. He has no other security professionals that work under him, so he has to do all the security-related tasks for the agency. Coming from a computer hardware background, Harold does not have a lot of experience with security methodologies and technologies, but he was the only one who applied for the position. Harold is currently trying to run a Sniffer on the agency's network to get an idea of what kind of traffic is being passed around, but the program he is using does not seem to be capturing anything. He pours through the Sniffer's manual, but cannot find anything that directly relates to his problem. Harold decides to ask the network administrator if he has any thoughts on the problem. Harold is told that the Sniffer was not working because the agency's network is a switched network, which cannot be sniffed by some programs without some tweaking. What technique could Harold use to sniff his agency's switched network?

Options:

A.

ARP spoof the default gateway


B.

Conduct MiTM against the switch


C.

Launch smurf attack against the switch


D.

Flood the switch with ICMP packets


Expert Solution
Questions # 103:

Which Type of scan sends a packets with no flags set? Select the Answer

Options:

A.

Open Scan


B.

Null Scan


C.

Xmas Scan


D.

Half-Open Scan


Expert Solution
Questions # 104:

You receive an email with the following message:

Hello Steve,

We are having technical difficulty in restoring user database record after the recent blackout. Your account data is corrupted. Please logon to the SuperEmailServices.com and change your password.

http://www.supermailservices.com@0xde.0xad.0xbe.0xef/support/logon.htm

If you do not reset your password within 7 days, your account will be permanently disabled locking you out from our e-mail services.

Sincerely,

Technical Support

SuperEmailServices

From this e-mail you suspect that this message was sent by some hacker since you have been using their e-mail services for the last 2 years and they have never sent out an e-mail such as this. You also observe the URL in the message and confirm your suspicion about 0xde.0xad.0xbde.0xef which looks like hexadecimal numbers. You immediately enter the following at Windows 2000 command prompt:

Ping 0xde.0xad.0xbe.0xef

You get a response with a valid IP address.

What is the obstructed IP address in the e-mail URL?

Options:

A.

222.173.190.239


B.

233.34.45.64


C.

54.23.56.55


D.

199.223.23.45


Expert Solution
Questions # 105:

Which of the following ICMP message types are used for destinations unreachables?

Options:

A.

0


B.

3


C.

11


D.

13


E.

17


Expert Solution
Questions # 106:

What is the essential difference between an ‘Ethical Hacker’ and a ‘Cracker’?

Options:

A.

The ethical hacker does not use the same techniques or skills as a cracker.


B.

The ethical hacker does it strictly for financial motives unlike a cracker.


C.

The ethical hacker has authorization from the owner of the target.


D.

The ethical hacker is just a cracker who is getting paid.


Expert Solution
Questions # 107:

Name two software tools used for OS guessing? (Choose two.

Options:

A.

Nmap


B.

Snadboy


C.

Queso


D.

UserInfo


E.

NetBus


Expert Solution
Questions # 108:

What are the two basic types of attacks? (Choose two.

Options:

A.

DoS


B.

Passive


C.

Sniffing


D.

Active


E.

Cracking


Expert Solution
Questions # 109:

Which of the following systems would not respond correctly to an nmap XMAS scan?

Options:

A.

Windows 2000 Server running IIS 5


B.

Any Solaris version running SAMBA Server


C.

Any version of IRIX


D.

RedHat Linux 8.0 running Apache Web Server


Expert Solution
Questions # 110:

What flags are set in a X-MAS scan?(Choose all that apply.

Options:

A.

SYN


B.

ACK


C.

FIN


D.

PSH


E.

RST


F.

URG


Expert Solution
Questions # 111:

You have initiated an active operating system fingerprinting attempt with nmap against a target system:

Question # 111

What operating system is the target host running based on the open ports shown above?

Options:

A.

Windows XP


B.

Windows 98 SE


C.

Windows NT4 Server


D.

Windows 2000 Server


Expert Solution
Questions # 112:

What is the proper response for a X-MAS scan if the port is closed?

Options:

A.

SYN


B.

ACK


C.

FIN


D.

PSH


E.

RST


F.

No response


Expert Solution
Questions # 113:

Which of the following is optimized for confidential communications, such as bidirectional voice and video?

Options:

A.

RC4


B.

RC5


C.

MD4


D.

MD5


Expert Solution
Questions # 114:

While performing a ping sweep of a subnet you receive an ICMP reply of Code 3/Type 13 for all the pings sent out.

What is the most likely cause behind this response?

Options:

A.

The firewall is dropping the packets.


B.

An in-line IDS is dropping the packets.


C.

A router is blocking ICMP.


D.

The host does not respond to ICMP packets.


Expert Solution
Questions # 115:

While performing ping scans into a target network you get a frantic call from the organization’s security team. They report that they are under a denial of service attack. When you stop your scan, the smurf attack event stops showing up on the organization’s IDS monitor. How can you modify your scan to prevent triggering this event in the IDS?

Options:

A.

Scan more slowly.


B.

Do not scan the broadcast IP.


C.

Spoof the source IP address.


D.

Only scan the Windows systems.


Expert Solution
Questions # 116:

Where should a security tester be looking for information that could be used by an attacker against an organization? (Select all that apply)

Options:

A.

CHAT rooms


B.

WHOIS database


C.

News groups


D.

Web sites


E.

Search engines


F.

Organization’s own web site


Expert Solution
Questions # 117:

SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long been used by hackers to gather great amount of information about remote hosts.

Which of the following features makes this possible? (Choose two)

Options:

A.

It used TCP as the underlying protocol.


B.

It uses community string that is transmitted in clear text.


C.

It is susceptible to sniffing.


D.

It is used by all network devices on the market.


Expert Solution
Questions # 118:

Which of the following commands runs snort in packet logger mode?

Options:

A.

./snort -dev -h ./log


B.

./snort -dev -l ./log


C.

./snort -dev -o ./log


D.

./snort -dev -p ./log


Expert Solution
Questions # 119:

Sandra is the security administrator of XYZ.com. One day she notices that the XYZ.com Oracle database server has been compromised and customer information along with financial data has been stolen. The financial loss will be estimated in millions of dollars if the database gets into the hands of competitors. Sandra wants to report this crime to the law enforcement agencies immediately.

Which organization coordinates computer crime investigations throughout the United States?

Options:

A.

NDCA


B.

NICP


C.

CIRP


D.

NPC


E.

CIA


Expert Solution
Questions # 120:

Which one of the following is defined as the process of distributing incorrect Internet Protocol (IP) addresses/names with the intent of diverting traffic?

Options:

A.

Network aliasing


B.

Domain Name Server (DNS) poisoning


C.

Reverse Address Resolution Protocol (ARP)


D.

Port scanning


Expert Solution
Viewing page 6 out of 13 pages
Viewing questions 101-120 out of questions