Exam Code: CEH-001 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Certified Ethical Hacker (CEH)
Certification Provider: GAQM
Free Today! Guaranteed Training- Pass CEH-001 Exam.

Q496.  - (Topic 1)

Vulnerability scanners are automated tools that are used to identify vulnerabilities and misconfigurations of hosts. They also provide information regarding mitigating discovered vulnerabilities.

Which of the following statements is incorrect?

A. Vulnerability scanners attempt to identify vulnerabilities in the hosts scanned.

B. Vulnerability scanners can help identify out-of-date software versions, missing patches, or system upgrades

C. They can validate compliance with or deviations from the organization's security policy

D. Vulnerability scanners can identify weakness and automatically fix and patch the vulnerabilities without user intervention

Answer: D


Q497.  - (Topic 6)

War dialing is a very old attack and depicted in movies that were made years ago. Why would a modem security tester consider using such an old technique?

A. It is cool, and if it works in the movies it must work in real life.

B. It allows circumvention of protection mechanisms by being on the internal network.

C. It allows circumvention of the company PBX.

D. A good security tester would not use such a derelict technique.

Answer: B

Explanation: If you are lucky and find a modem that answers and is connected to the target network, it usually is less protected (as only employees are supposed to know of its existence) and once connected you don’t need to take evasive actions towards any firewalls or IDS.


Q498.  - (Topic 7)

Under what conditions does a secondary name server request a zone transfer from a primary name server?

A. When a primary SOA is higher that a secondary SOA

B. When a secondary SOA is higher that a primary SOA

C. When a primary name server has had its service restarted

D. When a secondary name server has had its service restarted

E. When the TTL falls to zero

Answer: A

Explanation: Understanding DNS is critical to meeting the requirements of the CEH. When the serial number that is within the SOA record of the primary server is higher than the Serial number within the SOA record of the secondary DNS server, a zone transfer will take place.


Q499.  - (Topic 8)

How many bits encryption does SHA-1 use?

A. 64 bits

B. 128 bits

C. 160 bits

D. 256 bits

Answer: C

Explanation: SHA-1 (as well as SHA-0) produces a 160-bit digest from a message with a maximum length of 264 - 1 bits, and is based on principles similar to those used by Professor Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms.


Q500.  - (Topic 7)

A POP3 client contacts the POP3 server:

A. To send mail

B. To receive mail

C. to send and receive mail

D. to get the address to send mail to

E. initiate a UDP SMTP connection to read mail

Answer: B

Explanation: POP is used to receive e-mail. SMTP is used to send e-mail.


Q501.  - (Topic 4)

How can telnet be used to fingerprint a web server?

A. telnet webserverAddress 80 HEAD / HTTP/1.0

B. telnet webserverAddress 80 PUT / HTTP/1.0

C. telnet webserverAddress 80 HEAD / HTTP/2.0

D. telnet webserverAddress 80 PUT / HTTP/2.0

Answer: A


Q502.  - (Topic 2)

Johnny is a member of the hacking group Orpheus1. He is currently working on breaking into the Department of Defense's front end Exchange Server. He was able to get into the server, located in a DMZ, by using an unused service account that had a very weak password that he was able to guess. Johnny wants to crack the administrator password, but does not have a lot of time to crack it. He wants to use a tool that already has the LM hashes computed for all possible permutations of the administrator password.

What tool would be best used to accomplish this?

A. SMBCrack

B. SmurfCrack

C. PSCrack

D. RainbowTables

Answer: D


Q503.  - (Topic 5)

Firewalk has just completed the second phase (the scanning phase) and a technician receives the output shown below. What conclusions can be drawn based on these scan results? TCP port 21 – no response TCP port 22 – no response TCP port 23 – Time-to-live

exceeded

A. The firewall itself is blocking ports 21 through 23 and a service is listening on port 23 of the target host.

B. The lack of response from ports 21 and 22 indicate that those services are not running on the destination server.

C. The scan on port 23 passed through the filtering device. This indicates that port 23 was not blocked at the firewall.

D. The scan on port 23 was able to make a connection to the destination host prompting the firewall to respond with a TTL error.

Answer: C


Q504.  - (Topic 4)

How do employers protect assets with security policies pertaining to employee surveillance activities?

A. Employers promote monitoring activities of employees as long as the employees demonstrate trustworthiness.

B. Employers use informal verbal communication channels to explain employee monitoring activities to employees.

C. Employers use network surveillance to monitor employee email traffic, network access, and to record employee keystrokes.

D. Employers provide employees written statements that clearly discuss the boundaries of monitoring activities and consequences.

Answer: D


Q505.  - (Topic 2)

"Testing the network using the same methodologies and tools employed by attackers" Identify the correct terminology that defines the above statement.

A. Vulnerability Scanning

B. Penetration Testing

C. Security Policy Implementation

D. Designing Network Security

Answer: B


Q506. - (Topic 1)

Neil is a network administrator working in Istanbul. Neil wants to setup a protocol analyzer on his network that will receive a copy of every packet that passes through the main office switch. What type of port will Neil need to setup in order to accomplish this?

A. Neil will have to configure a Bridged port that will copy all packets to the protocol analyzer.

B. Neil will need to setup SPAN port that will copy all network traffic to the protocol analyzer.

C. He will have to setup an Ether channel port to get a copy of all network traffic to the analyzer.

D. He should setup a MODS port which will copy all network traffic.

Answer: B


Q507.  - (Topic 5)

Which of the following algorithms provides better protection against brute force attacks by using a 160-bit message digest?

A. MD5

B. SHA-1

C. RC4

D. MD4

Answer: B


Q508.  - (Topic 1)

Fake Anti-Virus, is one of the most frequently encountered and persistent threats on the web. This malware uses social engineering to lure users into infected websites with a technique called Search Engine Optimization.

Once the Fake AV is downloaded into the user's computer, the software will scare them into believing their system is infected with threats that do not really exist, and then push users to purchase services to clean up the non-existent threats.

The Fake AntiVirus will continue to send these annoying and intrusive alerts until a payment is made.

What is the risk of installing Fake AntiVirus?

A. Victim's Operating System versions, services running and applications installed will be published on Blogs and Forums

B. Victim's personally identifiable information such as billing address and credit card details, may be extracted and exploited by the attacker

C. Once infected, the computer will be unable to boot and the Trojan will attempt to format the hard disk

D. Denial of Service attack will be launched against the infected computer crashing other machines on the connected network

Answer: B


Q509.  - (Topic 8)

Scanning for services is an easy job for Bob as there are so many tools available from the Internet. In order for him to check the vulnerability of XYZ, he went through a few scanners that are currently available. Here are the scanners that he uses:

1. Axent’s NetRecon (http://www.axent.com)

2. SARA, by Advanced Research Organization (http://www-arc.com/sara)

3. VLAD the Scanner, by Razor (http://razor.bindview.com/tools/)

However, there are many other alternative ways to make sure that the services that have been scanned will be more accurate and detailed for Bob.

What would be the best method to accurately identify the services running on a victim host?

A. Using Cheops-ng to identify the devices of XYZ.

B. Using the manual method of telnet to each of the open ports of XYZ.

C. Using a vulnerability scanner to try to probe each port to verify or figure out which service is running for XYZ.

D. Using the default port and OS to make a best guess of what services are running on each port for XYZ.

Answer: B

Explanation: By running a telnet connection to the open ports you will receive banners that tells you what service is answering on that specific port.


Q510.  - (Topic 2)

What type of Virus is shown here?

A. Macro Virus

B. Cavity Virus

C. Boot Sector Virus

D. Metamorphic Virus

E. Sparse Infector Virus

Answer: B