Exambible CEH-001 Questions are updated and all CEH-001 answers are verified by experts. Once you have completely prepared with our CEH-001 exam prep kits you will be ready for the real CEH-001 exam without a problem. We have Refresh GAQM CEH-001 dumps study guide. PASSED CEH-001 First attempt! Here What I Did.

Q511.  - (Topic 8)

If you come across a sheepdip machine at your client’s site, what should you do?

A. A sheepdip computer is used only for virus-checking.

B. A sheepdip computer is another name for a honeypot

C. A sheepdip coordinates several honeypots.

D. A sheepdip computers defers a denial of service attack.

Answer: A

Explanation: Also known as a footbath, a sheepdip is the process of checking physical media, such as floppy disks or CD-ROMs, for viruses before they are used in a computer. Typically, a computer that sheepdips is used only for that process and nothing else and is isolated from the other computers, meaning it is not connected to the network. Most sheepdips use at least two different antivirus programs in order to increase effectiveness.


Q512.  - (Topic 2)

E-mail tracking is a method to monitor and spy the delivered e-mails to the intended recipient.

Select a feature, which you will NOT be able to accomplish with this probe?

A. When the e-mail was received and read

B. Send destructive e-mails

C. GPS location and map of the recipient

D. Time spent on reading the e-mails

E. Whether or not the recipient visited any links sent to them

F. Track PDF and other types of attachments

G. Set messages to expire after specified time

H. Remote control the User's E-mail client application and hijack the traffic

Answer: H


Q513.  - (Topic 6)

Network Administrator Patricia is doing an audit of the network. Below are some of her findings concerning DNS. Which of these would be a cause for alarm?

Select the best answer.

A. There are two external DNS Servers for Internet domains. Both are AD integrated.

B. All external DNS is done by an ISP.

C. Internal AD Integrated DNS servers are using private DNS names that are

D. unregistered.

E. Private IP addresses are used on the internal network and are registered with the internal AD integrated DNS server.

Answer: A

Explanation: Explanations:

A. There are two external DNS Servers for Internet domains. Both are AD integrated. This is the correct answer. Having an AD integrated DNS external server is a serious cause for alarm. There is no need for this and it causes vulnerability on the network.

B. All external DNS is done by an ISP.

This is not the correct answer. This would not be a cause for alarm. This would actually reduce the company's network risk as it is offloaded onto the ISP.

C. Internal AD Integrated DNS servers are using private DNS names that are unregistered. This is not the correct answer. This would not be a cause for alarm. This would actually reduce the company's network risk.

D. Private IP addresses are used on the internal network and are registered with the internal AD integrated DNS server.

This is not the correct answer. This would not be a cause for alarm. This would actually reduce the company's network risk.


Q514.  - (Topic 8)

Windump is the windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform you must install a packet capture library.

What is the name of this library?

A. NTPCAP

B. LibPCAP

C. WinPCAP

D. PCAP

Answer: C

Explanation: WinPcap is the industry-standard tool for link-layer network access in Windows environments: it allows applications to capture and transmit network packets bypassing the protocol stack, and has additional useful features, including kernel-level packet filtering, a network statistics engine and support for remote packet capture.


Q515.  - (Topic 7)

A file integrity program such as Tripwire protects against Trojan horse attacks by:

A. Automatically deleting Trojan horse programs

B. Rejecting packets generated by Trojan horse programs

C. Using programming hooks to inform the kernel of Trojan horse behavior

D. Helping you catch unexpected changes to a system utility file that might indicate it had been replaced by a Trojan horse

Answer: D

Explanation: Tripwire generates a database of the most common files and directories on your system. Once it is generated, you can then check the current state of your system against the original database and get a report of all the files that have been modified, deleted or added. This comes in handy if you allow other people access to your machine and even if you don't, if someone else does get access, you'll know if they tried to modify

files such as /bin/login etc.


Q516.  - (Topic 8)

Which of the following are potential attacks on cryptography? (Select 3)

A. One-Time-Pad Attack

B. Chosen-Ciphertext Attack

C. Man-in-the-Middle Attack

D. Known-Ciphertext Attack

E. Replay Attack

Answer: B,C,E

Explanation: A chosen-ciphertext attack (CCA) is an attack model for cryptanalysis in which the cryptanalyst chooses a ciphertext and causes it to be decrypted with an unknown key. Specific forms of this attack are sometimes termed "lunchtime" or "midnight" attacks, referring to a scenario in which an attacker gains access to an unattended decryption machine. In cryptography, a man-in-the-middle attack (MITM) is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept messages going between the two victims. A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it, possibly as part of a masquerade attack by IP packet substitution (such as stream cipher attack).


Q517.  - (Topic 3)

Wayne is the senior security analyst for his company. Wayne is examining some traffic logs on a server and came across some inconsistencies. Wayne finds some IP packets from a computer purporting to be on the internal network. The packets originate from 192.168.12.35 with a TTL of 15. The server replied to this computer and received a response from 192.168.12.35 with a TTL of 21. What can Wayne infer from this traffic log?

A. The initial traffic from 192.168.12.35 was being spoofed.

B. The traffic from 192.168.12.25 is from a Linux computer.

C. The TTL of 21 means that the client computer is on wireless.

D. The client computer at 192.168.12.35 is a zombie computer.

Answer: A


Q518.  - (Topic 8)

The Slammer Worm exploits a stack-based overflow that occurs in a DLL implementing the Resolution Service.

Which of the following Database Server was targeted by the slammer worm?

A. Oracle

B. MSSQL

C. MySQL

D. Sybase

E. DB2

Answer: B

Explanation:

W32.Slammer is a memory resident worm that propagates via UDP Port 1434 and exploits a vulnerability in SQL Server 2000 systems and systems with MSDE 2000 that have not applied the patch released by Microsoft Security Bulletin MS02-039.


Q519.  - (Topic 4)

A consultant has been hired by the V.P. of a large financial organization to assess the company's security posture. During the security testing, the consultant comes across child pornography on the V.P.'s computer. What is the consultant's obligation to the financial organization?

A. Say nothing and continue with the security testing.

B. Stop work immediately and contact the authorities.

C. Delete the pornography, say nothing, and continue security testing.

D. Bring the discovery to the financial organization's human resource department.

Answer: B


Q520.  - (Topic 5)

A pentester is using Metasploit to exploit an FTP server and pivot to a LAN. How will the pentester pivot using Metasploit?

A. Issue the pivot exploit and set the meterpreter.

B. Reconfigure the network settings in the meterpreter.

C. Set the payload to propagate through the meterpreter.

D. Create a route statement in the meterpreter.

Answer: D


Q521.  - (Topic 5)

Which of the following levels of algorithms does Public Key Infrastructure (PKI) use?

A. RSA 1024 bit strength

B. AES 1024 bit strength

C. RSA 512 bit strength

D. AES 512 bit strength

Answer: A


Q522.  - (Topic 7)

Samantha was hired to perform an internal security test of XYZ. She quickly realized that all networks are making use of switches instead of traditional hubs. This greatly limits her ability to gather information through network sniffing.

Which of the following techniques can she use to gather information from the switched network or to disable some of the traffic isolation features of the switch? (Choose two)

A. Ethernet Zapping

B. MAC Flooding

C. Sniffing in promiscuous mode

D. ARP Spoofing

Answer: B,D

Explanation: In a typical MAC flooding attack, a switch is flooded with packets, each containing different source MAC addresses. The intention is to consume the limited memory set aside in the switch to store the MAC address-to-physical port translation table.The result of this attack causes the switch to enter a state called failopen mode, in which all incoming packets are broadcast out on all ports (as with a hub), instead of just down the correct port as per normal operation. The principle of ARP spoofing is to send

fake, or 'spoofed', ARP messages to an Ethernet LAN. These frames contain false MAC addresses, confusing network devices, such as network switches. As a result frames intended for one machine can be mistakenly sent to another (allowing the packets to be sniffed) or an unreachable host (a denial of service attack).


Q523.  - (Topic 8)

Which is the Novell Netware Packet signature level used to sign all packets ?

A. 0

B. 1

C. 2

D. 3

Answer: D

Explanation:

Level 0 is no signature, Level 3 is communication using signature only.