Exam Code: CEH-001 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Certified Ethical Hacker (CEH)
Certification Provider: GAQM
Free Today! Guaranteed Training- Pass CEH-001 Exam.

Q316.  - (Topic 8)

Which of the following is NOT a valid NetWare access level?

A. Not Logged in

B. Logged in

C. Console Access

D. Administrator

Answer: D

Explanation:

Administrator is an account not a access level.


Q317.  - (Topic 4)

A corporation hired an ethical hacker to test if it is possible to obtain users' login credentials using methods other than social engineering. Access to offices and to a network node is granted. Results from server scanning indicate all are adequately patched and physical access is denied, thus, administrators have access only through Remote Desktop. Which technique could be used to obtain login credentials?

A. Capture every users' traffic with Ettercap.

B. Capture LANMAN Hashes and crack them with LC6.

C. Guess passwords using Medusa or Hydra against a network service.

D. Capture administrators RDP traffic and decode it with Cain and Abel.

Answer: D


Q318.  - (Topic 5)

What are the three types of compliance that the Open Source Security Testing Methodology Manual (OSSTMM) recognizes?

A. Legal, performance, audit

B. Audit, standards based, regulatory

C. Contractual, regulatory, industry

D. Legislative, contractual, standards based

Answer: D


Q319.  - (Topic 6)

An nmap command that includes the host specification of 202.176.56-57.* will scan

_____ number of hosts.

A. 2

B. 256

C. 512

D. Over 10, 000

Answer: C

Explanation: The hosts with IP address 202.176.56.0-255 & 202.176.56.0-255 will be scanned (256+256=512)


Q320.  - (Topic 3)

Which of the following processes evaluates the adherence of an organization to its stated security policy?

A. Vulnerability assessment

B. Penetration testing

C. Risk assessment

D. Security auditing

Answer: D


Q321.  - (Topic 1)

In TCP communications there are 8 flags; FIN, SYN, RST, PSH, ACK, URG, ECE, CWR. These flags have decimal numbers assigned to them:

FIN = 1

SYN = 2

RST = 4

PSH = 8

ACK = 16

URG = 32

ECE = 64

CWR = 128

Jason is the security administrator of ASPEN Communications. He analyzes some traffic using Wireshark and has enabled the following filters.

What is Jason trying to accomplish here?

A. SYN, FIN, URG and PSH

B. SYN, SYN/ACK, ACK

C. RST, PSH/URG, FIN

D. ACK, ACK, SYN, URG

Answer: B


Q322.  - (Topic 8)

You visit a website to retrieve the listing of a company's staff members. But you can not find it on the website. You know the listing was certainly present one year before. How can you retrieve information from the outdated website?

A. Through Google searching cached files

B. Through Archive.org

C. Download the website and crawl it

D. Visit customers' and prtners' websites

Answer: B

Explanation: Archive.org mirrors websites and categorizes them by date and month depending on the crawl time. Archive.org dates back to 1996, Google is incorrect because the cache is only as recent as the latest crawl, the cache is over-written on each subsequent crawl. Download the website is incorrect becausethat's the same as what you see online. Visiting customer partners websites is just bogus. The answer is then Firmly, C, archive.org


Q323.  - (Topic 2)

An Attacker creates a zuckerjournals.com website by copying and mirroring HACKERJOURNALS.COM site to spread the news that Hollywood actor Jason Jenkins died in a car accident. The attacker then submits his fake site for indexing in major search engines. When users search for "Jason Jenkins", attacker's fake site shows up and dupes victims by the fake news.

This is another great example that some people do not know what URL's are. Real website:

Fake website: http://www.zuckerjournals.com

The website is clearly not WWW.HACKERJOURNALS.COM. It is obvious for many, but unfortunately some people still do not know what an URL is. It's the address that you enter into the address bar at the top your browser and this is clearly not legit site, its www.zuckerjournals.com

How would you verify if a website is authentic or not?

A. Visit the site using secure HTTPS protocol and check the SSL certificate for authenticity

B. Navigate to the site by visiting various blogs and forums for authentic links

C. Enable Cache on your browser and lookout for error message warning on the screen

D. Visit the site by clicking on a link from Google search engine

Answer: D


Q324.  - (Topic 8)

StackGuard (as used by Immunix), ssp/ProPolice (as used by OpenBSD), and Microsoft's

/GS option use defense against buffer overflow attacks.

A. Canary

B. Hex editing

C. Format checking

D. Non-executing stack

Answer: A

Explanation: Canaries or canary words are known values that are placed between a buffer and control data on the stack to monitor buffer overflows. When the buffer overflows, it will clobber the canary, making the overflow evident. This is a reference to the historic practice of using canaries in coal mines, since they would be affected by toxic gases earlier than the miners, thus providing a biological warning system.


Q325.  - (Topic 6)

While performing a ping sweep of a subnet you receive an ICMP reply of Code 3/Type 13 for all the pings sent out.

What is the most likely cause behind this response?

A. The firewall is dropping the packets.

B. An in-line IDS is dropping the packets.

C. A router is blocking ICMP.

D. The host does not respond to ICMP packets.

Answer: C

Explanation: Type 3 message = Destination Unreachable [RFC792], Code 13 (cause) = Communication Administratively Prohibited [RFC1812]


Q326.  - (Topic 8)

Melissa is a virus that attacks Microsoft Windows platforms. To which category does this virus belong?

A. Polymorphic

B. Boot Sector infector

C. System

D. Macro

Answer: D

Explanation: The Melissa macro virus propagates in the form of an email message containing an infected Word document as an attachment.


Q327.  - (Topic 6)

Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool “SIDExtractor”. Here is the output of the SIDs:

From the above list identify the user account with System Administrator privileges.

A. John

B. Rebecca

C. Sheela

D. Shawn

E. Somia

F. Chang

G. Micah

Answer: F

Explanation: The SID of the built-in administrator will always follow this example: S-1-5- domain-500


Q328.  - (Topic 6)

At a Windows Server command prompt, which command could be used to list the running services?

A. Sc query type= running

B. Sc query \\servername

C. Sc query

D. Sc config

Answer: C


Q329.  - (Topic 5)

Which system consists of a publicly available set of databases that contain domain name registration contact information?

A. WHOIS

B. IANA

C. CAPTCHA

D. IETF

Answer: A


Q330.  - (Topic 7)

What is the proper response for a NULL scan if the port is open?

A. SYN

B. ACK

C. FIN

D. PSH

E. RST

F. No response

Answer: F

Explanation: A NULL scan will have no response if the port is open.