Our pass rate is high to 98.9% and the similarity percentage between our CEH-001 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the GAQM CEH-001 exam in just one try? I am currently studying for the GAQM CEH-001 exam. Latest GAQM CEH-001 Test exam practice questions and answers, Try GAQM CEH-001 Brain Dumps First.

Q226.  - (Topic 8)

Kevin sends an email invite to Chris to visit a forum for security professionals. Chris clicks on the link in the email message and is taken to a web based bulletin board. Unknown to Chris, certain functions are executed on his local system under his privileges, which allow Kevin access to information used on the BBS. However, no executables are downloaded and run on the local system. What would you term this attack?

A. Phishing

B. Denial of Service

C. Cross Site Scripting

D. Backdoor installation

Answer: C

Explanation: This is a typical Type-1 Cross Site Scripting attack. This kind of cross-site scripting hole is also referred to as a non-persistent or reflected vulnerability, and is by far the most common type. These holes show up when data provided by a web client is used immediately by server-side scripts to generate a page of results for that user. If unvalidated user-supplied data is included in the resulting page without HTML encoding, this will allow client-side code to be injected into the dynamic page. A classic example of this is in site search engines: if one searches for a string which includes some HTML special characters, often the search string will be redisplayed on the result page to indicate what was searched for, or will at least include the search terms in the text box for easier editing. If all occurrences of the search terms are not HTML entity encoded, an XSS hole will result.


Q227.  - (Topic 6)

You are manually conducting Idle Scanning using Hping2. During your scanning you notice that almost every query increments the IPID regardless of the port being queried. One or two of the queries cause the IPID to increment by more than one value. Why do you think this occurs?

A. The zombie you are using is not truly idle.

B. A stateful inspection firewall is resetting your queries.

C. Hping2 cannot be used for idle scanning.

D. These ports are actually open on the target system.

Answer: A

Explanation: If the IPID is incremented by more than the normal increment for this type of system it means that the system is interacting with some other system beside yours and has sent packets to an unknown host between the packets destined for you.


Q228.  - (Topic 3)

What do you call a pre-computed hash?

A. Sun tables

B. Apple tables

C. Rainbow tables

D. Moon tables

Answer: C


Q229.  - (Topic 4)

In keeping with the best practices of layered security, where are the best places to place intrusion detection/intrusion prevention systems? (Choose two.)

A. HID/HIP (Host-based Intrusion Detection/Host-based Intrusion Prevention)

B. NID/NIP (Node-based Intrusion Detection/Node-based Intrusion Prevention)

C. NID/NIP (Network-based Intrusion Detection/Network-based Intrusion Prevention)

D. CID/CIP (Computer-based Intrusion Detection/Computer-based Intrusion Prevention)

Answer: A,C


Q230.  - (Topic 5)

While performing data validation of web content, a security technician is required to restrict malicious input. Which of the following processes is an efficient way of restricting malicious input?

A. Validate web content input for query strings.

B. Validate web content input with scanning tools.

C. Validate web content input for type, length, and range.

D. Validate web content input for extraneous queries.

Answer: C


Q231.  - (Topic 2)

What sequence of packets is sent during the initial TCP three-way handshake?

A. SYN, SYN-ACK, ACK

B. SYN, URG, ACK

C. SYN, ACK, SYN-ACK

D. FIN, FIN-ACK, ACK

Answer: A


Q232.  - (Topic 4)

A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?

A. Perform a vulnerability scan of the system.

B. Determine the impact of enabling the audit feature.

C. Perform a cost/benefit analysis of the audit feature.

D. Allocate funds for staffing of audit log review.

Answer: B


Q233.  - (Topic 1)

Attacking well-known system defaults is one of the most common hacker attacks. Most software is shipped with a default configuration that makes it easy to install and setup the application. You should change the default settings to secure the system.

Which of the following is NOT an example of default installation?

A. Many systems come with default user accounts with well-known passwords that administrators forget to change

B. Often, the default location of installation files can be exploited which allows a hacker to retrieve a file from the system

C. Many software packages come with "samples" that can be exploited, such as the sample programs on IIS web services

D. Enabling firewall and anti-virus software on the local system

Answer: D


Q234. - (Topic 1)

Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?

A. Configure Port Security on the switch

B. Configure Port Recon on the switch

C. Configure Switch Mapping

D. Configure Multiple Recognition on the switch

Answer: A


Q235.  - (Topic 4)

Which solution can be used to emulate computer services, such as mail and ftp, and to capture information related to logins or actions?

A. Firewall

B. Honeypot

C. Core server

D. Layer 4 switch

Answer: B


Q236.  - (Topic 1)

Attackers footprint target Websites using Google Hacking techniques. Google hacking is a term that refers to the art of creating complex search engine queries. It detects websites that are vulnerable to numerous exploits and vulnerabilities. Google operators are used to locate specific strings of text within the search results.

The configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database. WordPress uses config.php that stores the database Username and Password.

Which of the below Google search string brings up sites with "config.php" files?

A. Search:index config/php

B. Wordpress:index config.php

C. intitle:index.of config.php

D. Config.php:index list

Answer: C


Q237.  - (Topic 8)

Bob reads an article about how insecure wireless networks can be. He gets approval from his management to implement a policy of not allowing any wireless devices on the network. What other steps does Bob have to take in order to successfully implement this? (Select 2 answer.)

A. Train users in the new policy.

B. Disable all wireless protocols at the firewall.

C. Disable SNMP on the network so that wireless devices cannot be configured.

D. Continuously survey the area for wireless devices.

Answer: A,D

Explanation: If someone installs a access point and connect it to the network there is no way to find it unless you are constantly surveying the area for wireless devices. SNMP and firewalls can not prevent the installation of wireless devices on the corporate network.


Q238.  - (Topic 4)

What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the received response?

A. Passive

B. Reflective

C. Active

D. Distributive

Answer: C


Q239.  - (Topic 1)

What file system vulnerability does the following command take advantage of? type c:\anyfile.exe > c:\winnt\system32\calc.exe:anyfile.exe

A. HFS

B. Backdoor access

C. XFS

D. ADS

Answer: D


Q240.  - (Topic 5)

A security engineer has been asked to deploy a secure remote access solution that will allow employees to connect to the company’s internal network. Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?

A. SSL

B. Mutual authentication

C. IPSec

D. Static IP addresses

Answer: C