Vcehome > GAQM > GAQM certification > CEH-001 > CEH-001 Online Practice Questions and Answers

CEH-001 Online Practice Questions and Answers

Questions 4

You run nmap port Scan on 10.0.0.5 and attempt to gain banner/server information from services running on ports 21, 110 and 123.

Here is the output of your scan results:

Which of the following nmap command did you run?

A. nmap -A -sV -p21, 110, 123 10.0.0.5

B. nmap -F -sV -p21, 110, 123 10.0.0.5

C. nmap -O -sV -p21, 110, 123 10.0.0.5

D. nmap -T -sV -p21, 110, 123 10.0.0.5

Browse 878 Q&As
Questions 5

Which of the following statement correctly defines ICMP Flood Attack? (Select 2 answers)

A. Bogus ECHO reply packets are flooded on the network spoofing the IP and MAC address

B. The ICMP packets signal the victim system to reply and the combination of traffic saturates the bandwidth of the victim's network

C. ECHO packets are flooded on the network saturating the bandwidth of the subnet causing denial of service

D. A DDoS ICMP flood attack occurs when the zombies send large volumes of ICMP_ECHO_REPLY packets to the victim system.

Browse 878 Q&As
Questions 6

Leesa is the senior security analyst for a publicly traded company. The IT department recently rolled out an intranet for company use only with information ranging from training, to holiday schedules, to human resources data. Leesa wants to make sure the site is not accessible from outside and she also wants to ensure the site is Sarbanes-Oxley (SOX) compliant. Leesa goes to a public library as she wants to do some Google searching to verify whether the company's intranet is accessible from outside and has been indexed by Google. Leesa wants to search for a website title of "intranet" with part of the URL containing the word "intranet" and the words "human resources" somewhere in the webpage.

What Google search will accomplish this?

A. related:intranet allinurl:intranet:"human resources"

B. cache:"human resources" inurl:intranet(SharePoint)

C. intitle:intranet inurl:intranet+intext:"human resources"

D. site:"human resources"+intext:intranet intitle:intranet

Browse 878 Q&As
Questions 7

Buffer X in an Accounting application module for Brownies Inc. can contain 200 characters. The programmer makes an assumption that 200 characters are more than enough. Because there were no proper boundary checks being conducted, Bob decided to insert 400 characters into the 200-character buffer. (Overflows the buffer). Below is the code snippet:

How can you protect/fix the problem of your application as shown above?

A. Because the counter starts with 0, we would stop when the counter is less than 200

B. Because the counter starts with 0, we would stop when the counter is more than 200

C. Add a separate statement to signify that if we have written less than 200 characters to the buffer, the stack should stop because it cannot hold any more data

D. Add a separate statement to signify that if we have written 200 characters to the buffer, the stack should stop because it cannot hold any more data

Browse 878 Q&As
Questions 8

Jake is a network administrator who needs to get reports from all the computer and network devices on his network. Jake wants to use SNMP but is afraid that won't be secure since passwords and messages are in clear text. How can Jake gather network information in a secure manner?

A. He can use SNMPv3

B. Jake can use SNMPrev5

C. He can use SecWMI

D. Jake can use SecSNMP

Browse 878 Q&As
Questions 9

A company has five different subnets: 192.168.1.0, 192.168.2.0, 192.168.3.0, 192.168.4.0 and 192.168.5.0. How can NMAP be used to scan these adjacent Class C networks?

A. NMAP -P 192.168.1-5.

B. NMAP -P 192.168.0.0/16

C. NMAP -P 192.168.1.0, 2.0, 3.0, 4.0, 5.0

D. NMAP -P 192.168.1/17

Browse 878 Q&As
Questions 10

Which system consists of a publicly available set of databases that contain domain name registration contact information?

A. WHOIS

B. IANA

C. CAPTCHA

D. IETF

Browse 878 Q&As
Questions 11

The network administrator for a company is setting up a website with e-commerce capabilities. Packet sniffing is a concern because credit card information will be sent electronically over the Internet. Customers visiting the site will need to encrypt the data with HTTPS. Which type of certificate is used to encrypt and decrypt the data?

A. Asymmetric

B. Confidential

C. Symmetric

D. Non-confidential

Browse 878 Q&As
Questions 12

What are the default passwords used by SNMP? (Choose two.)

A. Password

B. SA

C. Private

D. Administrator

E. Public

F. Blank

Browse 878 Q&As
Questions 13

Which of the following is not considered to be a part of active sniffing?

A. MAC Flooding

B. ARP Spoofing

C. SMAC Fueling

D. MAC Duplicating

Browse 878 Q&As
Exam Code: CEH-001
Exam Name: Certified Ethical Hacker (CEH)
Last Update: May 10, 2024
Questions: 878 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99