We provide real CEH-001 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass GAQM CEH-001 Exam quickly & easily. The CEH-001 PDF type is available for reading and printing. You can print more and practice many times. With the help of our GAQM CEH-001 dumps pdf and vce product and material, you can easily pass the CEH-001 exam.
GAQM CEH-001 Free Dumps Questions Online, Read and Test Now.
NEW QUESTION 1
Your computer is infected by E-mail tracking and spying Trojan. This Trojan infects the computer with a single file - emos.sys
Which step would you perform to detect this type of Trojan?
Answer: C
NEW QUESTION 2
Exhibit:
You are conducting pen-test against a company’s website using SQL Injection techniques. You enter “anuthing or 1=1-“ in the username filed of an authentication form. This is the output returned from the server.
What is the next step you should do?
Answer: A
NEW QUESTION 3
Which of the following is a primary service of the U.S. Computer Security Incident Response Team (CSIRT)?
Answer: A
NEW QUESTION 4
WWW wanderers or spiders are programs that traverse many pages in the World Wide Web by recursively retrieving linked pages. Search engines like Google, frequently spider web pages for indexing. How will you stop web spiders from crawling certain directories on your website?
Answer: A
NEW QUESTION 5
A pentester is using Metasploit to exploit an FTP server and pivot to a LAN. How will the pentester pivot using Metasploit?
Answer: D
NEW QUESTION 6
Bob wants to prevent attackers from sniffing his passwords on the wired network. Which of the following lists the best options?
Answer: D
Explanation:
Kerberos, Smart cards and Stanford SRP are techniques where the password never leaves the computer.
NEW QUESTION 7
What is the primary drawback to using advanced encryption standard (AES) algorithm with a 256 bit key to share sensitive data?
Answer: D
NEW QUESTION 8
John is using a special tool on his Linux platform that has a signature database and is therefore able to detect hundred of vulnerabilities in UNIX, Windows, and commonly-used web CGI scripts. Additionally, the database detects DDoS zombies and Trojans. What would be the name of this multifunctional tool?
Answer: C
Explanation:
Nessus is the world's most popular vulnerability scanner, estimated to be used by over 75, 000 organizations world-wide. Nmap is mostly used for scanning, not for detecting vulnerabilities. Hping is a free packet generator and analyzer for the TCP/IP protocol and make is used to automatically build large applications on the *nix plattform.
NEW QUESTION 9
You are the security administrator for a large network. You want to prevent attackers from running any sort of traceroute into your DMZ and discovering the internal structure of publicly accessible areas of the network. How can you achieve this?
Answer: A
NEW QUESTION 10
Which of the following techniques can be used to mitigate the risk of an on-site attacker from connecting to an unused network port and gaining full access to the network? (Choose three.)
Answer: ACE
NEW QUESTION 11
While testing the company's web applications, a tester attempts to insert the following test script into the search area on the company's web sitE.
<script>alert(" Testing Testing Testing ")</script>
Afterwards, when the tester presses the search button, a pop-up box appears on the screen with the text: "Testing Testing Testing". Which vulnerability has been detected in the web application?
Answer: D
NEW QUESTION 12
Which of the following Exclusive OR transforms bits is NOT correct?
Answer: C
NEW QUESTION 13
On a Linux device, which of the following commands will start the Nessus client in the background so that the Nessus server can be configured?
Answer: C
NEW QUESTION 14
Which of the following is NOT part of CEH Scanning Methodology?
Answer: E
NEW QUESTION 15
Eve decides to get her hands dirty and tries out a Denial of Service attack that is relatively new to her. This time she envisages using a different kind of method to attack Brownies Inc. Eve tries to forge the packets and uses the broadcast address. She launches an attack similar to that of fraggle. What is the technique that Eve used in the case above?
Answer: A
Explanation:
A fraggle attack is a variation of the smurf attack for denial of service in which the attacker sends spoofed UDP packets instead of ICMP echo reply (ping) packets to the broadcast address of a large network.
NEW QUESTION 16
Anonymizer sites access the Internet on your behalf, protecting your personal information from disclosure. An anonymizer protects all of your computer's identifying information while it surfs for you, enabling you to remain at least one step removed from the sites you visit.
You can visit Web sites without allowing anyone to gather information on sites visited by you. Services that provide anonymity disable pop-up windows and cookies, and conceal visitor's IP address.
These services typically use a proxy server to process each HTTP request. When the user requests a Web page by clicking a hyperlink or typing a URL into their browser, the service retrieves and displays the information using its own server. The remote server (where the requested Web page resides) receives information on the anonymous Web surfing service in place of your information.
In which situations would you want to use anonymizer? (Select 3 answers)
Answer: BCD
NEW QUESTION 17
......
P.S. Easily pass CEH-001 Exam with 878 Q&As Dumpscollection.com Dumps & pdf Version, Welcome to Download the Newest Dumpscollection.com CEH-001 Dumps: https://www.dumpscollection.net/dumps/CEH-001/ (878 New Questions)