Proper study guides for Improve GAQM Certified Ethical Hacker (CEH) certified begins with GAQM CEH-001 preparation products which designed to deliver the Virtual CEH-001 questions by making you pass the CEH-001 test at your first time. Try the free CEH-001 demo right now.
Check CEH-001 free dumps before getting the full version:
NEW QUESTION 1
A hacker, who posed as a heating and air conditioning specialist, was able to install a
sniffer program in a switched environment network. Which attack could the hacker use to sniff all of the packets in the network?
Answer: B
NEW QUESTION 2
What port scanning method involves sending spoofed packets to a target system and then looking for adjustments to the IPID on a zombie system?
Answer: B
Explanation:
From NMAP:
-sI <zombie host[:probeport]> Idlescan: This advanced scan method allows for a truly blind
TCP port scan of the target (meaning no packets are sent to the tar- get from your real IP address). Instead, a unique side-channel attack exploits predictable "IP fragmentation ID" sequence generation on the zombie host to glean information about the open ports on the target.
NEW QUESTION 3
What does an ICMP (Code 13) message normally indicates?
Answer: C
Explanation:
CODE 13 and type 3 is destination unreachable due to communication administratively prohibited by filtering hence maybe they meant "code 13", therefore would be C).
Note:
A - Type 3 B - Type 4
C - Type 3 Code 13 D - Typ4 4
NEW QUESTION 4
Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and uses the special card in order to access the restricted area of the target company. Just as the employee opens the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so that he can enter. What is the best way to undermine the social engineering activity of tailgating?
Answer: B
NEW QUESTION 5
What is the name of the software tool used to crack a single account on Netware Servers using a dictionary attack?
Answer: B
Explanation:
NWPCrack is the software tool used to crack single accounts on Netware servers.
NEW QUESTION 6
Which of the following is true of the wireless Service Set ID (SSID)? (Select all that apply.)
Answer: AB
NEW QUESTION 7
Susan has attached to her company’s network. She has managed to synchronize her boss’s sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory. What kind of attack is Susan carrying on?
Answer: C
Explanation:
A man-in-the-middle attack (MITM) is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised.
NEW QUESTION 8
This kind of attack will let you assume a users identity at a dynamically generated web page or site:
Answer: B
Explanation:
Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. Examples of such code include HTML code and client-side scripts. An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls such as the same origin policy.
NEW QUESTION 9
An nmap command that includes the host specification of 202.176.56-57.* will scan
_____ number of hosts.
Answer: C
Explanation:
The hosts with IP address 202.176.56.0-255 & 202.176.56.0-255 will be scanned (256+256=512)
NEW QUESTION 10
Which of the following is a protocol that is prone to a man-in-the-middle (MITM) attack and maps a 32-bit address to a 48-bit address?
Answer: B
Explanation:
Address Resolution Protocol (ARP) a stateless protocol was designed to map Internet Protocol addresses (IP) to their associated Media Access Control (MAC) addresses.
This being said, by mapping a 32 bit IP address to an associated 48 bit MAC address via attached Ethernet devices, a communication between local nodes can be made. Source: (http://www.exploit-db.com/papers/13190/)
NEW QUESTION 11
If an attacker's computer sends an IPID of 24333 to a zombie (Idle Scanning) computer on
a closed port, what will be the response?
Answer: A
NEW QUESTION 12
Which of the following conditions must be given to allow a tester to exploit a Cross-Site Request Forgery (CSRF) vulnerable web application?
Answer: D
NEW QUESTION 13
Which security control role does encryption meet?
Answer: A
NEW QUESTION 14
This attack uses social engineering techniques to trick users into accessing a fake Web site and divulging personal information. Attackers send a legitimate-looking e-mail asking users to update their information on the company's Web site, but the URLs in the e-mail actually point to a false Web site.
Answer: C
NEW QUESTION 15
Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be monitoring the communication link and could inspect captured traffic. She would like to tunnel the information to the remote end but does not have VPN capabilities to do so. Which of the following tools can she use to protect the link?
Answer: D
NEW QUESTION 16
Which tool/utility can help you extract the application layer data from each TCP connection from a log file into separate files?
Answer: C
Explanation:
Tcpflow is a program that captures data transmitted as part of TCP connections (flows), and stores the data in a way that is convenient for protocol analysis or debugging. A program like 'tcpdump' shows a summary of packets seen on the wire, but usually doesn't store the data that's actually being transmitted. In contrast, tcpflow reconstructs the actual data streams and stores each flow in a separate file for later analysis.
NEW QUESTION 17
......
Recommend!! Get the Full CEH-001 dumps in VCE and PDF From Thedumpscentre.com, Welcome to Download: https://www.thedumpscentre.com/CEH-001-dumps/ (New 878 Q&As Version)