Pass the GAQM Certified Ethical Hacker CEH CEH-001 Questions and answers with CertsForce

Viewing page 8 out of 13 pages
Viewing questions 141-160 out of questions
Questions # 141:

How do you defend against ARP Poisoning attack? (Select 2 answers)

Question # 141

Options:

A.

Enable DHCP Snooping Binding Table


B.

Restrict ARP Duplicates


C.

Enable Dynamic ARP Inspection


D.

Enable MAC snooping Table


Expert Solution
Questions # 142:

SOAP services use which technology to format information?

Options:

A.

SATA


B.

PCI


C.

XML


D.

ISDN


Expert Solution
Questions # 143:

Which of the following statements are true regarding N-tier architecture? (Choose two.)

Options:

A.

Each layer must be able to exist on a physically independent system.


B.

The N-tier architecture must have at least one logical layer.


C.

Each layer should exchange information only with the layers above and below it.


D.

When a layer is changed or updated, the other layers must also be recompiled or modified.


Expert Solution
Questions # 144:

Which of the following Registry location does a Trojan add entries to make it persistent on Windows 7? (Select 2 answers)

Question # 144

Options:

A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run


B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\System32\CurrentVersion\ Run


C.

HKEY_CURRENT_USER\Software\Microsoft\Windows\System32\CurrentVersion\Run


D.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run


Expert Solution
Questions # 145:

Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?

Options:

A.

SHA-1


B.

MD5


C.

HAVAL


D.

MD4


Expert Solution
Questions # 146:

John runs a Web server, IDS and firewall on his network. Recently his Web server has been under constant hacking attacks. He looks up the IDS log files and sees no intrusion attempts but the Web server constantly locks up and needs rebooting due to various brute force and buffer overflow attacks but still the IDS alerts no intrusion whatsoever. John becomes suspicious and views the Firewall logs and he notices huge SSL connections constantly hitting his Web server. Hackers have been using the encrypted HTTPS protocol to send exploits to the Web server and that was the reason the IDS did not detect the intrusions. How would John protect his network from these types of attacks?

Options:

A.

Install a proxy server and terminate SSL at the proxy


B.

Enable the IDS to filter encrypted HTTPS traffic


C.

Install a hardware SSL "accelerator" and terminate SSL at this layer


D.

Enable the Firewall to filter encrypted HTTPS traffic


Expert Solution
Questions # 147:

When an alert rule is matched in a network-based IDS like snort, the IDS does which of the following?

Options:

A.

Drops the packet and moves on to the next one


B.

Continues to evaluate the packet until all rules are checked


C.

Stops checking rules, sends an alert, and lets the packet continue


D.

Blocks the connection with the source IP address in the packet


Expert Solution
Questions # 148:

What is the broadcast address for the subnet 190.86.168.0/22?

Options:

A.

190.86.168.255


B.

190.86.255.255


C.

190.86.171.255


D.

190.86.169.255


Expert Solution
Questions # 149:

What command would you type to OS fingerprint a server using the command line?

Question # 149

Question # 149

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 150:

Which of the following describes a component of Public Key Infrastructure (PKI) where a copy of a private key is stored to provide third-party access and to facilitate recovery operations?

Options:

A.

Key registry


B.

Recovery agent


C.

Directory


D.

Key escrow


Expert Solution
Questions # 151:

When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?

Options:

A.

Vulnerability scanning


B.

Social engineering


C.

Application security testing


D.

Network sniffing


Expert Solution
Questions # 152:

A company is using Windows Server 2003 for its Active Directory (AD). What is the most efficient way to crack the passwords for the AD users?

Options:

A.

Perform a dictionary attack.


B.

Perform a brute force attack.


C.

Perform an attack with a rainbow table.


D.

Perform a hybrid attack.


Expert Solution
Questions # 153:

Which type of scan measures a person's external features through a digital video camera?

Options:

A.

Iris scan


B.

Retinal scan


C.

Facial recognition scan


D.

Signature kinetics scan


Expert Solution
Questions # 154:

Which tool would be used to collect wireless packet data?

Options:

A.

NetStumbler


B.

John the Ripper


C.

Nessus


D.

Netcat


Expert Solution
Questions # 155:

Lori was performing an audit of her company's internal Sharepoint pages when she came across the following codE. What is the purpose of this code?

Question # 155

Options:

A.

This JavaScript code will use a Web Bug to send information back to another server.


B.

This code snippet will send a message to a server at 192.154.124.55 whenever the "escape" key is pressed.


C.

This code will log all keystrokes.


D.

This bit of JavaScript code will place a specific image on every page of the RSS feed.


Expert Solution
Questions # 156:

Which of the following type of scanning utilizes automated process of proactively identifying vulnerabilities of the computing systems present on a network?

Options:

A.

Port Scanning


B.

Single Scanning


C.

External Scanning


D.

Vulnerability Scanning


Expert Solution
Questions # 157:

If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of business, they just have to find a job opening, prepare someone to pass the interview, have that person hired, and they will be in the organization.

Question # 157

How would you prevent such type of attacks?

Options:

A.

It is impossible to block these attacks


B.

Hire the people through third-party job agencies who will vet them for you


C.

Conduct thorough background checks before you engage them


D.

Investigate their social networking profiles


Expert Solution
Questions # 158:

What type of Trojan is this?

Question # 158

Options:

A.

RAT Trojan


B.

E-Mail Trojan


C.

Defacement Trojan


D.

Destructing Trojan


E.

Denial of Service Trojan


Expert Solution
Questions # 159:

What port number is used by Kerberos protocol?

Options:

A.

88


B.

44


C.

487


D.

419


Expert Solution
Questions # 160:

Neil is a network administrator working in Istanbul. Neil wants to setup a protocol analyzer on his network that will receive a copy of every packet that passes through the main office switch. What type of port will Neil need to setup in order to accomplish this?

Options:

A.

Neil will have to configure a Bridged port that will copy all packets to the protocol analyzer.


B.

Neil will need to setup SPAN port that will copy all network traffic to the protocol analyzer.


C.

He will have to setup an Ether channel port to get a copy of all network traffic to the analyzer.


D.

He should setup a MODS port which will copy all network traffic.


Expert Solution
Viewing page 8 out of 13 pages
Viewing questions 141-160 out of questions