Exam Details

  • Exam Code
    :CEH-001
  • Exam Name
    :Certified Ethical Hacker (CEH)
  • Certification
    :GAQM Certifications
  • Vendor
    :GAQM
  • Total Questions
    :878 Q&As
  • Last Updated
    :

GAQM GAQM Certifications CEH-001 Questions & Answers

  • Question 711:

    Bob is going to perform an active session hijack against Brownies Inc. He has found a target that allows session oriented connections (Telnet) and performs the sequence prediction on the target operating system. He manages to find an active session due to the high level of traffic on the network. What is Bob supposed to do next?

    A. Take over the session

    B. Reverse sequence prediction

    C. Guess the sequence numbers

    D. Take one of the parties offline

  • Question 712:

    In this attack, a victim receives an e-mail claiming from PayPal stating that their account has been disabled and confirmation is required before activation. The attackers then scam to collect not one but two credit card numbers, ATM PIN number and other personal details.

    Ignorant users usually fall prey to this scam. Which of the following statement is incorrect related to this attack?

    A. Do not reply to email messages or popup ads asking for personal or financial information

    B. Do not trust telephone numbers in e-mails or popup ads

    C. Review credit card and bank account statements regularly

    D. Antivirus, anti-spyware, and firewall software can very easily detect these type of attacks

    E. Do not send credit card numbers, and personal or financial information via e-mail

  • Question 713:

    Neil is closely monitoring his firewall rules and logs on a regular basis. Some of the users have complained to Neil that there are a few employees who are visiting offensive web site during work hours, without any consideration for others. Neil knows that he has an up-to- date content filtering system and such access should not be authorized. What type of technique might be used by these offenders to access the Internet without restriction?

    A. They are using UDP that is always authorized at the firewall

    B. They are using HTTP tunneling software that allows them to communicate with protocols in a way it was not intended

    C. They have been able to compromise the firewall, modify the rules, and give themselves proper access

    D. They are using an older version of Internet Explorer that allow them to bypass the proxy server

  • Question 714:

    This is an example of whois record.

    Sometimes a company shares a little too much information on their organization through public domain records. Based on the above whois record, what can an attacker do? (Select 2 answers)

    A. Search engines like Google, Bing will expose information listed on the WHOIS record

    B. An attacker can attempt phishing and social engineering on targeted individuals using the information from WHOIS record

    C. Spammers can send unsolicited e-mails to addresses listed in the WHOIS record

    D. IRS Agents will use this information to track individuals using the WHOIS record information

  • Question 715:

    A simple compiler technique used by programmers is to add a terminator 'canary word' containing four letters NULL (0x00), CR (0x0d), LF (0x0a) and EOF (0xff) so that most string operations are terminated. If the canary word has been altered when the function returns, and the program responds by emitting an intruder alert into syslog, and then halts what does it indicate?

    A. A buffer overflow attack has been attempted

    B. A buffer overflow attack has already occurred

    C. A firewall has been breached and this is logged

    D. An intrusion detection system has been triggered

    E. The system has crashed

  • Question 716:

    In TCP communications there are 8 flags; FIN, SYN, RST, PSH, ACK, URG, ECE, CWR.

    These flags have decimal numbers assigned to them:

    FIN = 1

    SYN = 2

    RST = 4

    PSH = 8

    ACK = 16 URG = 32 ECE = 64 CWR =128 Example: To calculate SYN/ACK flag decimal value, add 2 (which is the decimal value of the SYN flag) to 16 (which is the decimal value of the ACK flag), so the result would be 18. Based on the above calculation, what is the decimal value for XMAS scan?

    A. 23

    B. 24

    C. 41

    D. 64

  • Question 717:

    Blane is a network security analyst for his company. From an outside IP, Blane performs an XMAS scan using Nmap. Almost every port scanned does not illicit a response. What can he infer from this kind of response?

    A. These ports are open because they do not illicit a response.

    B. He can tell that these ports are in stealth mode.

    C. If a port does not respond to an XMAS scan using NMAP, that port is closed.

    D. The scan was not performed correctly using NMAP since all ports, no matter what their state, will illicit some sort of response from an XMAS scan.

  • Question 718:

    A digital signature is simply a message that is encrypted with the public key instead of the private key.

    A. true

    B. false

  • Question 719:

    An Attacker creates a zuckerjournals.com website by copying and mirroring HACKERJOURNALS.COM site to spread the news that Hollywood actor Jason Jenkins died in a car accident. The attacker then submits his fake site for indexing in major search engines. When users search for "Jason Jenkins", attacker's fake site shows up and dupes victims by the fake news.

    This is another great example that some people do not know what URL's are. Real website: Fake website: http://www.zuckerjournals.com

    The website is clearly not WWW.HACKERJOURNALS.COM. It is obvious for many, but unfortunately some people still do not know what an URL is. It's the address that you enter into the address bar at the top your browser and this is clearly not legit site, its www.zuckerjournals.com

    How would you verify if a website is authentic or not?

    A. Visit the site using secure HTTPS protocol and check the SSL certificate for authenticity

    B. Navigate to the site by visiting various blogs and forums for authentic links

    C. Enable Cache on your browser and lookout for error message warning on the screen

    D. Visit the site by clicking on a link from Google search engine

  • Question 720:

    You want to know whether a packet filter is in front of 192.168.1.10. Pings to 192.168.1.10 don't get answered. A basic nmap scan of 192.168.1.10 seems to hang without returning any information. What should you do next?

    A. Run NULL TCP hping2 against 192.168.1.10

    B. Run nmap XMAS scan against 192.168.1.10

    C. The firewall is blocking all the scans to 192.168.1.10

    D. Use NetScan Tools Pro to conduct the scan

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CEH-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.