Master the CEH-001 Certified Ethical Hacker (CEH) content and be ready for exam day success quickly with this Pass4sure CEH-001 vce. We guarantee it!We make it a reality and give you real CEH-001 questions in our GAQM CEH-001 braindumps.Latest 100% VALID GAQM CEH-001 Exam Questions Dumps at below page. You can use our GAQM CEH-001 braindumps and pass your exam.
Check CEH-001 free dumps before getting the full version:
NEW QUESTION 1
Which of the following are password cracking tools? (Choose three.)
Answer: BCE
NEW QUESTION 2
One of your junior administrator is concerned with Windows LM hashes and password cracking. In your discussion with them, which of the following are true statements that you would point out?
Select the best answers.
Answer: ACE
Explanation:
Explanations:
John the Ripper can be used to crack a variety of passwords, but one limitation is that the output doesn't show if the password is upper or lower case. John the Ripper is a very effective password cracker. It can crack passwords for many different types of operating systems. However, one limitation is that the output doesn't show if the password is upper or lower case. BY using NTLMV1, you have implemented an effective countermeasure to password cracking. NTLM Version 2 (NTLMV2) is a good countermeasure to LM password cracking (and therefore a correct answer). To do this, set Windows 9x and NT systems to "send NTLMv2 responses only". SYSKEY is an effective countermeasure. It uses 128 bit encryption on the local copy of the Windows SAM. If a Windows LM password is 7 characters or less, the has will be passed with the following characters: 0xAAD3B435B51404EE
Enforcing Windows complex passwords is an effective countermeasure to password cracking. Complex passwords are- greater than 6 characters and have any 3 of the following 4 items: upper case, lower case, special characters, and numbers.
NEW QUESTION 3
While performing data validation of web content, a security technician is required to restrict malicious input. Which of the following processes is an efficient way of restricting malicious input?
Answer: C
NEW QUESTION 4
Lauren is performing a network audit for her entire company. The entire network is comprised of around 500 computers. Lauren starts an ICMP ping sweep by sending one IP packet to the broadcast address of the network, but only receives responses from around five hosts. Why did this ping sweep only produce a few responses?
Answer: C
NEW QUESTION 5
Windows LAN Manager (LM) hashes are known to be weak. Which of the following are known weaknesses of LM? (Choose three)
Answer: ABD
Explanation:
The LM hash is computed as follows.
1. The user’s password as an OEM string is converted to uppercase.
2. This password is either null-padded or truncated to 14 bytes.
3. The “fixed-length” password is split into two 7-byte halves.
4. These values are used to create two DES keys, one from each 7-byte half.
5. Each of these keys is used to DES-encrypt the constant ASCII string “KGS!@#$%”, resulting in two 8-byte ciphertext values.
6. These two ciphertext values are concatenated to form a 16-byte value, which is the LM hash.
The hashes them self are sent in clear text over the network instead of sending the password in clear text.
NEW QUESTION 6
Which of the following parameters enables NMAP's operating system detection feature?
Answer: D
NEW QUESTION 7
Which of the following is a hashing algorithm?
Answer: A
NEW QUESTION 8
Exhibit
(Note: the student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.)
Snort has been used to capture packets on the network. On studying the packets, the penetration tester finds it to be abnormal. If you were the penetration tester, why would you find this abnormal?
What is odd about this attack? Choose the best answer.
Answer: B
Explanation:
Port 31337 is normally used by Back Orifice. Note that 31337 is hackers spelling of ‘elite’, meaning ‘elite hackers’.
NEW QUESTION 9
Bluetooth uses which digital modulation technique to exchange information between paired devices?
Answer: A
NEW QUESTION 10
In what stage of Virus life does a stealth virus gets activated with the user performing certain actions such as running an infected program?
Answer: E
NEW QUESTION 11
In which step Steganography fits in CEH System Hacking Cycle (SHC)
Answer: E
NEW QUESTION 12
What port number is used by LDAP protocol?
Answer: B
NEW QUESTION 13
Which of the following tools can be used to perform a zone transfer?
Answer: ACDE
Explanation:
There are a number of tools that can be used to perform a zone transfer. Some of these include: NSLookup, Host, Dig, and Sam Spade.
NEW QUESTION 14
Blane is a network security analyst for his company. From an outside IP, Blane performs an XMAS scan using Nmap. Almost every port scanned does not illicit a response. What can he infer from this kind of response?
Answer: A
NEW QUESTION 15
A security administrator notices that the log file of the company`s webserver contains suspicious entries:
Based on source code analysis, the analyst concludes that the login.php script is vulnerable to
Answer: B
NEW QUESTION 16
This kind of password cracking method uses word lists in combination with numbers and special characters:
Answer: A
Explanation:
A Hybrid (or Hybrid Dictionary) Attack uses a word list that it modifies slightly to find passwords that are almost from a dictionary (like St0pid)
NEW QUESTION 17
......
P.S. Easily pass CEH-001 Exam with 878 Q&As Downloadfreepdf.net Dumps & pdf Version, Welcome to Download the Newest Downloadfreepdf.net CEH-001 Dumps: https://www.downloadfreepdf.net/CEH-001-pdf-download.html (878 New Questions)