Pass the GAQM Certified Ethical Hacker CEH CEH-001 Questions and answers with CertsForce

Viewing page 9 out of 13 pages
Viewing questions 161-180 out of questions
Questions # 161:

More sophisticated IDSs look for common shellcode signatures. But even these systems can be bypassed, by using polymorphic shellcode. This is a technique common among virus writers ?it basically hides the true nature of the shellcode in different disguises.

How does a polymorphic shellcode work?

Options:

A.

They encrypt the shellcode by XORing values over the shellcode, using loader code to decrypt the shellcode, and then executing the decrypted shellcode


B.

They convert the shellcode into Unicode, using loader to convert back to machine code then executing them


C.

They reverse the working instructions into opposite order by masking the IDS signatures


D.

They compress shellcode into normal instructions, uncompress the shellcode using loader code and then executing the shellcode


Expert Solution
Questions # 162:

In the context of Trojans, what is the definition of a Wrapper?

Options:

A.

An encryption tool to protect the Trojan


B.

A tool used to bind the Trojan with a legitimate file


C.

A tool used to calculate bandwidth and CPU cycles wasted by the Trojan


D.

A tool used to encapsulate packets within a new header and footer


Expert Solution
Questions # 163:

Peter extracts the SID list from Windows 2008 Server machine using the hacking tool "SIDExtracter". Here is the output of the SIDs:

Question # 163

From the above list identify the user account with System Administrator privileges?

Options:

A.

John


B.

Rebecca


C.

Sheela


D.

Shawn


E.

Somia


F.

Chang


G.

Micah


Expert Solution
Questions # 164:

You run nmap port Scan on 10.0.0.5 and attempt to gain banner/server information from services running on ports 21, 110 and 123.

Here is the output of your scan results:

Question # 164

Which of the following nmap command did you run?

Options:

A.

nmap -A -sV -p21, 110, 123 10.0.0.5


B.

nmap -F -sV -p21, 110, 123 10.0.0.5


C.

nmap -O -sV -p21, 110, 123 10.0.0.5


D.

nmap -T -sV -p21, 110, 123 10.0.0.5


Expert Solution
Questions # 165:

While performing a ping sweep of a local subnet you receive an ICMP reply of Code 3/Type 13 for all the pings you have sent out. What is the most likely cause of this?

Options:

A.

The firewall is dropping the packets


B.

An in-line IDS is dropping the packets


C.

A router is blocking ICMP


D.

The host does not respond to ICMP packets


Expert Solution
Questions # 166:

Fake Anti-Virus, is one of the most frequently encountered and persistent threats on the web. This malware uses social engineering to lure users into infected websites with a technique called Search Engine Optimization.

Once the Fake AV is downloaded into the user's computer, the software will scare them into believing their system is infected with threats that do not really exist, and then push users to purchase services to clean up the non-existent threats.

The Fake AntiVirus will continue to send these annoying and intrusive alerts until a payment is made.

Question # 166

What is the risk of installing Fake AntiVirus?

Options:

A.

Victim's Operating System versions, services running and applications installed will be published on Blogs and Forums


B.

Victim's personally identifiable information such as billing address and credit card details, may be extracted and exploited by the attacker


C.

Once infected, the computer will be unable to boot and the Trojan will attempt to format the hard disk


D.

Denial of Service attack will be launched against the infected computer crashing other machines on the connected network


Expert Solution
Questions # 167:

Ursula is a college student at a University in Amsterdam. Ursula originally went to college to study engineering but later changed to marine biology after spending a month at sea with her friends. These friends frequently go out to sea to follow and harass fishing fleets that illegally fish in foreign waters. Ursula eventually wants to put companies practicing illegal fishing out of business. Ursula decides to hack into the parent company's computers and destroy critical data knowing fully well that, if caught, she probably would be sent to jail for a very long time. What would Ursula be considered?

Options:

A.

Ursula would be considered a gray hat since she is performing an act against illegal activities.


B.

She would be considered a suicide hacker.


C.

She would be called a cracker.


D.

Ursula would be considered a black hat.


Expert Solution
Questions # 168:

The SYN flood attack sends TCP connections requests faster than a machine can process them.

    Attacker creates a random source address for each packet

    SYN flag set in each packet is a request to open a new connection to the server from the spoofed IP address

    Victim responds to spoofed IP address, then waits for confirmation that never arrives (timeout wait is about 3 minutes)

    Victim's connection table fills up waiting for replies and ignores new connections

    Legitimate users are ignored and will not be able to access the server

How do you protect your network against SYN Flood attacks?

Options:

A.

SYN cookies. Instead of allocating a record, send a SYN-ACK with a carefully constructed sequence number generated as a hash of the clients IP address, port number, and other information. When the client responds with a normal ACK, that special sequence number will be included, which the server then verifies. Thus, the server first allocates memory on the third packet of the handshake, not the first.


B.

RST cookies - The server sends a wrong SYN/ACK back to the client. The client should then generate a RST packet telling the server that something is wrong. At this point, the server knows the client is valid and will now accept incoming connections from that client normally


C.

Check the incoming packet's IP address with the SPAM database on the Internet and enable the filter using ACLs at the Firewall


D.

Stack Tweaking. TCP stacks can be tweaked in order to reduce the effect of SYN floods. Reduce the timeout before a stack frees up the memory allocated for a connection


E.

Micro Blocks. Instead of allocating a complete connection, simply allocate a micro record of 16-bytes for the incoming SYN object


Expert Solution
Questions # 169:

Bob has set up three web servers on Windows Server 2008 IIS 7.0. Bob has followed all the recommendations for securing the operating system and IIS. These servers are going to run numerous e-commerce websites that are projected to bring in thousands of dollars a day. Bob is still concerned about the security of these servers because of the potential for financial loss. Bob has asked his company's firewall administrator to set the firewall to inspect all incoming traffic on ports 80 and 443 to ensure that no malicious data is getting into the network.

Why will this not be possible?

Options:

A.

Firewalls cannot inspect traffic coming through port 443


B.

Firewalls can only inspect outbound traffic


C.

Firewalls cannot inspect traffic at all, they can only block or allow certain ports


D.

Firewalls cannot inspect traffic coming through port 80


Expert Solution
Questions # 170:

What is the correct command to run Netcat on a server using port 56 that spawns command shell when connected?

Question # 170

Options:

A.

nc -port 56 -s cmd.exe


B.

nc -p 56 -p -e shell.exe


C.

nc -r 56 -c cmd.exe


D.

nc -L 56 -t -e cmd.exe


Expert Solution
Questions # 171:

How do you defend against DHCP Starvation attack?

Question # 171

Options:

A.

Enable ARP-Block on the switch


B.

Enable DHCP snooping on the switch


C.

Configure DHCP-BLOCK to 1 on the switch


D.

Install DHCP filters on the switch to block this attack


Expert Solution
Questions # 172:

Choose one of the following pseudo codes to describe this statement:

"If we have written 200 characters to the buffer variable, the stack should stop because it cannot hold any more data."

Options:

A.

If (I > 200) then exit (1)


B.

If (I < 200) then exit (1)


C.

If (I <= 200) then exit (1)


D.

If (I >= 200) then exit (1)


Expert Solution
Questions # 173:

You just purchased the latest DELL computer, which comes pre-installed with Windows 7, McAfee antivirus software and a host of other applications. You want to connect Ethernet wire to your cable modem and start using the computer immediately. Windows is dangerously insecure when unpacked from the box, and there are a few things that you must do before you use it.

Options:

A.

New installation of Windows should be patched by installing the latest service packs and hotfixes


B.

Key applications such as Adobe Acrobat, Macromedia Flash, Java, Winzip etc., must have the latest security patches installed


C.

Install a personal firewall and lock down unused ports from connecting to your computer


D.

Install the latest signatures for Antivirus software


E.

Configure "Windows Update" to automatic


F.

Create a non-admin user with a complex password and logon to this account


G.

You can start using your computer as vendors such as DELL, HP and IBM would have already installed the latest service packs.


Expert Solution
Questions # 174:

Your computer is infected by E-mail tracking and spying Trojan. This Trojan infects the computer with a single file - emos.sys

Which step would you perform to detect this type of Trojan?

Question # 174

Options:

A.

Scan for suspicious startup programs using msconfig


B.

Scan for suspicious network activities using Wireshark


C.

Scan for suspicious device drivers in c:\windows\system32\drivers


D.

Scan for suspicious open ports using netstat


Expert Solution
Questions # 175:

You want to capture Facebook website traffic in Wireshark. What display filter should you use that shows all TCP packets that contain the word 'facebook'?

Options:

A.

display==facebook


B.

traffic.content==facebook


C.

tcp contains facebook


D.

list.display.facebook


Expert Solution
Questions # 176:

Which of the following tool would be considered as Signature Integrity Verifier (SIV)?

Options:

A.

Nmap


B.

SNORT


C.

VirusSCAN


D.

Tripwire


Expert Solution
Questions # 177:

What are the limitations of Vulnerability scanners? (Select 2 answers)

Options:

A.

There are often better at detecting well-known vulnerabilities than more esoteric ones


B.

The scanning speed of their scanners are extremely high


C.

It is impossible for any, one scanning product to incorporate all known vulnerabilities in a timely manner


D.

The more vulnerabilities detected, the more tests required


E.

They are highly expensive and require per host scan license


Expert Solution
Questions # 178:

This tool is widely used for ARP Poisoning attack. Name the tool.

Question # 178

Options:

A.

Cain and Able


B.

Beat Infector


C.

Poison Ivy


D.

Webarp Infector


Expert Solution
Questions # 179:

TCP SYN Flood attack uses the three-way handshake mechanism.

1. An attacker at system A sends a SYN packet to victim at system B.

2. System B sends a SYN/ACK packet to victim A.

3. As a normal three-way handshake mechanism system A should send an ACK packet to system B, however, system A does not send an ACK packet to system B. In this case client B is waiting for an ACK packet from client A.

This status of client B is called _________________

Options:

A.

"half-closed"


B.

"half open"


C.

"full-open"


D.

"xmas-open"


Expert Solution
Questions # 180:

Jayden is a network administrator for her company. Jayden wants to prevent MAC spoofing on all the Cisco switches in the network. How can she accomplish this?

Options:

A.

Jayden can use the commanD. ip binding set.


B.

Jayden can use the commanD. no ip spoofing.


C.

She should use the commanD. no dhcp spoofing.


D.

She can use the commanD. ip dhcp snooping binding.


Expert Solution
Viewing page 9 out of 13 pages
Viewing questions 161-180 out of questions