Certified Ethical Hacker (CEH) CEH-001 Testing Bible

Want to know Passleader CEH-001 Exam practice test features? Want to lear more about GAQM Certified Ethical Hacker (CEH) certification experience? Study Certified GAQM CEH-001 answers to Most up-to-date CEH-001 questions at Passleader. Gat a success with an absolute guarantee to pass GAQM CEH-001 (Certified Ethical Hacker (CEH)) test on your first attempt.

Page: 1 / 73
Total 878 questions Full Exam Access
Question 1
- (Topic 7)
Under what conditions does a secondary name server request a zone transfer from a primary name server?
My answer: -
Reference answer: A
Reference analysis:

Understanding DNS is critical to meeting the requirements of the CEH. When the serial number that is within the SOA record of the primary server is higher than the Serial number within the SOA record of the secondary DNS server, a zone transfer will take place.

Question 2
- (Topic 8)
In an attempt to secure his 802.11b wireless network, Ulf decides to use a strategic antenna positioning. He places the antenna for the access points near the center of the building. For those access points near the outer edge of the building he uses semi- directional antennas that face towards the building’s center. There is a large parking lot and outlying filed surrounding the building that extends out half a mile around the building. Ulf figures that with this and his placement of antennas, his wireless network will be safe from attack.
Which of the following statements is true?
My answer: -
Reference answer: D
Reference analysis:

None

Question 3
- (Topic 3)
What type of port scan is represented here.
CEH-001 dumps exhibit
My answer: -
Reference answer: A
Reference analysis:

None

Question 4
- (Topic 7)
_____ is the process of converting something from one representation to the simplest form. It deals with the way in which systems convert data from one form to another.
My answer: -
Reference answer: A
Reference analysis:

Canonicalization (abbreviated c14n) is the process of converting data that has more than one possible representation into a "standard" canonical representation. This can be done to compare different representations for equivalence, to count the number of distinct data structures (e.g., in combinatorics), to improve the efficiency of various algorithms by eliminating repeated calculations, or to make it possible to impose a meaningful sorting order.

Question 5
- (Topic 3)
Which of the following describes a component of Public Key Infrastructure (PKI) where a copy of a private key is stored to provide third-party access and to facilitate recovery operations?
My answer: -
Reference answer: D
Reference analysis:

None

Question 6
- (Topic 3)
Which tool is used to automate SQL injections and exploit a database by forcing a given web application to connect to another database controlled by a hacker?
My answer: -
Reference answer: D
Reference analysis:

Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a Boolean query based technique. The Mole uses a command based interface, allowing the user to indicate the action he wants to perform easily

Question 7
- (Topic 7)
In Linux, the three most common commands that hackers usually attempt to Trojan are:
My answer: -
Reference answer: B
Reference analysis:

The easiest programs to trojan and the smartest ones to trojan are ones commonly run by administrators and users, in this case netstat, ps, and top, for a complete list of commonly trojaned and rootkited software please reference this URL: http://www.usenix.org/publications/login/1999-9/features/rootkits.html

Question 8
- (Topic 3)
If an attacker's computer sends an IPID of 31400 to a zombie (Idle Scanning) computer on an open port, what will be the response?
My answer: -
Reference answer: B
Reference analysis:

31402 is the correct answer.

Question 9
- (Topic 1)
What type of port scan is shown below?
CEH-001 dumps exhibit
My answer: -
Reference answer: B
Reference analysis:

None

Question 10
- (Topic 5)
Which of the following business challenges could be solved by using a vulnerability scanner?
My answer: -
Reference answer: D
Reference analysis:

None

Question 11
- (Topic 8)
You perform the above traceroute and notice that hops 19 and 20 both show the same IP address.
CEH-001 dumps exhibit
This probably indicates what?
My answer: -
Reference answer: C
Reference analysis:

None

Question 12
- (Topic 4)
Which of the following settings enables Nessus to detect when it is sending too many packets and the network pipe is approaching capacity?
My answer: -
Reference answer: D
Reference analysis:

None

Question 13
- (Topic 5)
The network administrator for a company is setting up a website with e-commerce capabilities. Packet sniffing is a concern because credit card information will be sent electronically over the Internet. Customers visiting the site will need to encrypt the data with HTTPS. Which type of certificate is used to encrypt and decrypt the data?
My answer: -
Reference answer: A
Reference analysis:

None

Question 14
- (Topic 4)
An attacker has captured a target file that is encrypted with public key cryptography. Which of the attacks below is likely to be used to crack the target file?
My answer: -
Reference answer: D
Reference analysis:

None

Question 15
- (Topic 5)
While performing data validation of web content, a security technician is required to restrict malicious input. Which of the following processes is an efficient way of restricting malicious input?
My answer: -
Reference answer: C
Reference analysis:

None

Question 16
- (Topic 7)
A denial of Service (DoS) attack works on the following principle:
My answer: -
Reference answer: D
Reference analysis:

Denial-of-service (often abbreviated as DoS) is a class of attacks in which an attacker attempts to prevent legitimate users from accessing an Internet service, such as a web site.This can be done by exercising a software bug that causes the software running the service to fail (such as the “Ping of Death” attack against Windows NT systems), sending enough data to consume all available network bandwidth (as in the May, 2001 attacks against Gibson Research), or sending data in such a way as to consume a particular resource needed by the service.

Question 17
- (Topic 1)
You want to hide a secret.txt document inside c:\windows\system32\tcpip.dll kernel library using ADS streams. How will you accomplish this?
My answer: -
Reference answer: B
Reference analysis:

None

Question 18
- (Topic 5)
A penetration tester is hired to do a risk assessment of a company's DMZ. The rules of engagement states that the penetration test be done from an external IP address with no prior knowledge of the internal IT systems. What kind of test is being performed?
My answer: -
Reference answer: D
Reference analysis:

None

Question 19
- (Topic 1)
This tool is widely used for ARP Poisoning attack. Name the tool.
CEH-001 dumps exhibit
My answer: -
Reference answer: A
Reference analysis:

None

Question 20
- (Topic 1)
Most cases of insider abuse can be traced to individuals who are introverted, incapable of dealing with stress or conflict, and frustrated with their job, office politics, and lack of respect or promotion. Disgruntled employees may pass company secrets and intellectual property to competitors for monitory benefits.
Here are some of the symptoms of a disgruntled employee:
My answer: -
Reference answer: BC
Reference analysis:

None

Question 21
- (Topic 5)
Which of the following is used to indicate a single-line comment in structured query language (SQL)?
My answer: -
Reference answer: A
Reference analysis:

None

Question 22
- (Topic 3)
The traditional traceroute sends out ICMP ECHO packets with a TTL of one, and increments the TTL until the destination has been reached. By printing the gateways that generate ICMP time exceeded messages along the way, it is able to determine the path packets take to reach the destination.
The problem is that with the widespread use of firewalls on the Internet today, many of the packets that traceroute sends out end up being filtered, making it impossible to completely trace the path to the destination.
CEH-001 dumps exhibit
How would you overcome the Firewall restriction on ICMP ECHO packets?
My answer: -
Reference answer: A
Reference analysis:

None

Question 23
- (Topic 1)
Steven the hacker realizes the network administrator of Acme Corporation is using syskey in Windows 2008 Server to protect his resources in the organization. Syskey independently encrypts the hashes so that physical access to the server, tapes, or ERDs is only first step to cracking the passwords. Steven must break through the encryption used by syskey before he can attempt to use brute force dictionary attacks on the hashes. Steven runs a program called "SysCracker" targeting the Windows 2008 Server machine in attempting to crack the hash used by Syskey. He needs to configure the encryption level before he can launch the attack. How many bits does Syskey use for encryption?
My answer: -
Reference answer: B
Reference analysis:

None

Question 24
- (Topic 8)
Clive is conducting a pen-test and has just port scanned a system on the network. He has identified the operating system as Linux and been able to elicit responses from ports 23, 25 and 53. He infers port 23 as running Telnet service, port 25 as running SMTP service and port 53 as running DNS service. The client confirms these findings and attests to the current availability of the services. When he tries to telnet to port 23 or 25, he gets a blank screen in response. On typing other commands, he sees only blank spaces or underscores symbols on the screen. What are you most likely to infer from this?
My answer: -
Reference answer: A
Reference analysis:

TCP Wrapper is a host-based network ACL system, used to filter network access to Internet protocol services run on (Unix-like) operating systems such as Linux or
BSD. It allows host or subnetwork IP addresses, names and/or ident query replies, to be used as tokens on which to filter for access control purposes.

Question 25
- (Topic 7)
Tess King, the evil hacker, is purposely sending fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65, 536 bytes. From the information given, what type of attack is Tess King attempting to perform?
My answer: -
Reference answer: C
Reference analysis:

Reference: http://insecure.org/sploits/ping-o-death.html

Question 26
- (Topic 1)
Web servers often contain directories that do not need to be indexed. You create a text file with search engine indexing restrictions and place it on the root directory of the Web Server.
User-agent: * Disallow: /images/ Disallow: /banners/ Disallow: /Forms/ Disallow: /Dictionary/ Disallow: /_borders/ Disallow: /_fpclass/ Disallow: /_overlay/ Disallow: /_private/ Disallow: /_themes/
What is the name of this file?
My answer: -
Reference answer: A
Reference analysis:

None

Page: 1 / 73
Total 878 questions Full Exam Access