Pass the GAQM Certified Ethical Hacker CEH CEH-001 Questions and answers with CertsForce

Viewing page 7 out of 13 pages
Viewing questions 121-140 out of questions
Questions # 121:

Use the traceroute results shown above to answer the following question:

Question # 121

The perimeter security at targetcorp.com does not permit ICMP TTL-expired packets out.

Options:

A.

True


B.

False


Expert Solution
Questions # 122:

Hayden is the network security administrator for her company, a large finance firm based in Miami. Hayden just returned from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. Hayden is worried about the current security state of her company's network so she decides to start scanning the network from an external IP address. To see how some of the hosts on her network react, she sends out SYN packets to an IP range. A number of IPs responds with a SYN/ACK response. Before the connection is established she sends RST packets to those hosts to stop the session. She does this to see how her intrusion detection system will log the traffic. What type of scan is Hayden attempting here?

Options:

A.

Hayden is attempting to find live hosts on her company's network by using an XMAS scan


B.

She is utilizing a SYN scan to find live hosts that are listening on her network


C.

The type of scan, she is using is called a NULL scan


D.

Hayden is using a half-open scan to find live hosts on her network


Expert Solution
Questions # 123:

You are performing a port scan with nmap. You are in hurry and conducting the scans at the fastest possible speed. However, you don't want to sacrifice reliability for speed. If stealth is not an issue, what type of scan should you run to get very reliable results?

Options:

A.

Stealth scan


B.

Connect scan


C.

Fragmented packet scan


D.

XMAS scan


Expert Solution
Questions # 124:

Which of the following techniques can be used to mitigate the risk of an on-site attacker from connecting to an unused network port and gaining full access to the network? (Choose three.)

Options:

A.

Port Security


B.

IPSec Encryption


C.

Network Admission Control (NAC)


D.

802.1q Port Based Authentication


E.

802.1x Port Based Authentication


F.

Intrusion Detection System (IDS)


Expert Solution
Questions # 125:

Here is the ASCII Sheet.

Question # 125

You want to guess the DBO username juggyboy (8 characters) using Blind SQL Injection technique.

What is the correct syntax?

Question # 125

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 126:

What type of port scan is shown below?

Question # 126

Options:

A.

Idle Scan


B.

Windows Scan


C.

XMAS Scan


D.

SYN Stealth Scan


Expert Solution
Questions # 127:

Low humidity in a data center can cause which of the following problems?

Options:

A.

Heat


B.

Corrosion


C.

Static electricity


D.

Airborne contamination


Expert Solution
Questions # 128:

Which type of antenna is used in wireless communication?

Options:

A.

Omnidirectional


B.

Parabolic


C.

Uni-directional


D.

Bi-directional


Expert Solution
Questions # 129:

Which of the following items of a computer system will an anti-virus program scan for viruses?

Options:

A.

Boot Sector


B.

Deleted Files


C.

Windows Process List


D.

Password Protected Files


Expert Solution
Questions # 130:

Which of the following represent weak password? (Select 2 answers)

Options:

A.

Passwords that contain letters, special characters, and numbers ExamplE. ap1$%##f@52


B.

Passwords that contain only numbers ExamplE. 23698217


C.

Passwords that contain only special characters ExamplE. &*#@!(%)


D.

Passwords that contain letters and numbers ExamplE. meerdfget123


E.

Passwords that contain only letters ExamplE. QWERTYKLRTY


F.

Passwords that contain only special characters and numbers ExamplE. 123@$45


G.

Passwords that contain only letters and special characters ExamplE. bob@&ba


Expert Solution
Questions # 131:

Wayne is the senior security analyst for his company. Wayne is examining some traffic logs on a server and came across some inconsistencies. Wayne finds some IP packets from a computer purporting to be on the internal network. The packets originate from 192.168.12.35 with a TTL of 15. The server replied to this computer and received a response from 192.168.12.35 with a TTL of 21. What can Wayne infer from this traffic log?

Options:

A.

The initial traffic from 192.168.12.35 was being spoofed.


B.

The traffic from 192.168.12.25 is from a Linux computer.


C.

The TTL of 21 means that the client computer is on wireless.


D.

The client computer at 192.168.12.35 is a zombie computer.


Expert Solution
Questions # 132:

Lauren is performing a network audit for her entire company. The entire network is comprised of around 500 computers. Lauren starts an ICMP ping sweep by sending one IP packet to the broadcast address of the network, but only receives responses from around five hosts. Why did this ping sweep only produce a few responses?

Options:

A.

Only Windows systems will reply to this scan.


B.

A switched network will not respond to packets sent to the broadcast address.


C.

Only Linux and Unix-like (Non-Windows) systems will reply to this scan.


D.

Only servers will reply to this scan.


Expert Solution
Questions # 133:

Web servers are often the most targeted and attacked hosts on organizations' networks. Attackers may exploit software bugs in the Web server, underlying operating system, or active content to gain unauthorized access.

Question # 133

Identify the correct statement related to the above Web Server installation?

Options:

A.

Lack of proper security policy, procedures and maintenance


B.

Bugs in server software, OS and web applications


C.

Installing the server with default settings


D.

Unpatched security flaws in the server software, OS and applications


Expert Solution
Questions # 134:

Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be monitoring the communication link and could inspect captured traffic. She would like to tunnel the information to the remote end but does not have VPN capabilities to do so. Which of the following tools can she use to protect the link?

Options:

A.

MD5


B.

PGP


C.

RSA


D.

SSH


Expert Solution
Questions # 135:

Blane is a security analyst for a law firm. One of the lawyers needs to send out an email to a client but he wants to know if the email is forwarded on to any other recipients. The client is explicitly asked not to re-send the email since that would be a violation of the lawyer's and client's agreement for this particular case. What can Blane use to accomplish this?

Options:

A.

He can use a split-DNS service to ensure the email is not forwarded on.


B.

A service such as HTTrack would accomplish this.


C.

Blane could use MetaGoofil tracking tool.


D.

Blane can use a service such as ReadNotify tracking tool.


Expert Solution
Questions # 136:

You want to perform advanced SQL Injection attack against a vulnerable website. You are unable to perform command shell hacks on this server. What must be enabled in SQL Server to launch these attacks?

Options:

A.

System services


B.

EXEC master access


C.

xp_cmdshell


D.

RDC


Expert Solution
Questions # 137:

Oregon Corp is fighting a litigation suit with Scamster Inc. Oregon has assigned a private investigative agency to go through garbage, recycled paper, and other rubbish at Scamster's office site in order to find relevant information. What would you call this kind of activity?

Options:

A.

CI Gathering


B.

Scanning


C.

Dumpster Diving


D.

Garbage Scooping


Expert Solution
Questions # 138:

What do you call a pre-computed hash?

Options:

A.

Sun tables


B.

Apple tables


C.

Rainbow tables


D.

Moon tables


Expert Solution
Questions # 139:

A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed. Which security policy must the security analyst check to see if dial-out modems are allowed?

Options:

A.

Firewall-management policy


B.

Acceptable-use policy


C.

Remote-access policy


D.

Permissive policy


Expert Solution
Questions # 140:

The SNMP Read-Only Community String is like a password. The string is sent along with each SNMP Get-Request and allows (or denies) access to a device. Most network vendors ship their equipment with a default password of "public". This is the so-called "default public community string". How would you keep intruders from getting sensitive information regarding the network devices using SNMP? (Select 2 answers)

Options:

A.

Enable SNMPv3 which encrypts username/password authentication


B.

Use your company name as the public community string replacing the default 'public'


C.

Enable IP filtering to limit access to SNMP device


D.

The default configuration provided by device vendors is highly secure and you don't need to change anything


Expert Solution
Viewing page 7 out of 13 pages
Viewing questions 121-140 out of questions