Your success in GAQM CEH-001 is our sole target and we develop all our CEH-001 braindumps in a way that facilitates the attainment of this target. Not only is our CEH-001 study material the best you can find, it is also the most detailed and the most updated. CEH-001 Practice Exams for GAQM CEH-001 are written to the highest standards of technical accuracy.

Q241.  - (Topic 1)

Bob has set up three web servers on Windows Server 2008 IIS 7.0. Bob has followed all the recommendations for securing the operating system and IIS. These servers are going to run numerous e-commerce websites that are projected to bring in thousands of dollars a day. Bob is still concerned about the security of these servers because of the potential for financial loss. Bob has asked his company's firewall administrator to set the firewall to

inspect all incoming traffic on ports 80 and 443 to ensure that no malicious data is getting into the network.

Why will this not be possible?

A. Firewalls cannot inspect traffic coming through port 443

B. Firewalls can only inspect outbound traffic

C. Firewalls cannot inspect traffic at all, they can only block or allow certain ports

D. Firewalls cannot inspect traffic coming through port 80

Answer: C


Q242.  - (Topic 1)

In the context of Trojans, what is the definition of a Wrapper?

A. An encryption tool to protect the Trojan

B. A tool used to bind the Trojan with a legitimate file

C. A tool used to calculate bandwidth and CPU cycles wasted by the Trojan

D. A tool used to encapsulate packets within a new header and footer

Answer: B

Explanation:

Wrapper does not change header or footer of any packets but it mix between legitimate file and Trojan file.


Q243.  - (Topic 2)

What type of encryption does WPA2 use?

A. DES 64 bit

B. AES-CCMP 128 bit

C. MD5 48 bit

D. SHA 160 bit

Answer: B


Q244.  - (Topic 8)

John has a proxy server on his network which caches and filters web access. He shuts down all unnecessary ports and services. Additionally, he has installed a firewall (Cisco PIX) that will not allow users to connect to any outbound ports. Jack, a network user has successfully connected to a remote server on port 80 using netcat. He could in turn drop a shell from the remote machine. Assuming an attacker wants to penetrate John's network, which of the following options is he likely to choose?

A. Use ClosedVPN

B. Use Monkey shell

C. Use reverse shell using FTP protocol

D. Use HTTPTunnel or Stunnel on port 80 and 443

Answer: D

Explanation: As long as you allow http or https traffic attacks can be tunneled over those protocols with Stunnel or HTTPTunnel.


Q245.  - (Topic 8)

When a malicious hacker identifies a target and wants to eventually compromise this target, what would be among the first steps that he would perform? (Choose the best answer)

A. Cover his tracks by eradicating the log files and audit trails.

B. Gain access to the remote computer in order to conceal the venue of attacks.

C. Perform a reconnaissance of the remote target for identical of venue of attacks.

D. Always begin with a scan in order to quickly identify venue of attacks.

Answer: C

Explanation: A hacker always starts with a preparatory phase (Reconnaissance) where he

seeks to gather as much information as possible about the target of evaluation prior to launching an attack. The reconnaissance can be either passive or active (or both).


Q246.  - (Topic 8)

Which of the following best describes session key creation in SSL?

A. It is created by the server after verifying theuser's identity

B. It is created by the server upon connection by the client

C. It is created by the client from the server's public key

D. It is created by the client after verifying the server's identity

Answer: D

Explanation: An SSL session always begins with an exchange of messages called the SSL handshake. The handshake allows the server to authenticate itself to the client using public-key techniques, then allows the client and the server to cooperate in the creation of symmetric keys used for rapid encryption, decryption, and tamper detection during the session that follows. Optionally, the handshake also allows the client to authenticate itself to the server.


Q247.  - (Topic 7)

What is the algorithm used by LM for Windows2000 SAM?

A. MD4

B. DES

C. SHA

D. SSL

Answer: B

Explanation: Okay, this is a tricky question. We say B, DES, but it could be A “MD4” depending on what their asking - Windows 2000/XP keeps users passwords not "apparently", but as hashes, i.e. actually as "check sum" of the passwords. Let's go into the passwords keeping at large. The most interesting structure of the complex SAM-file building is so called V-block. It's size is 32 bytes and it includes hashes of the password for the local entering: NT Hash of 16-byte length, and hash used during the authentication of access to the common resources of other computers LanMan Hash, or simply LM Hash, of the same 16-byte length. Algorithms of the formation of these hashes are following:

NT Hash formation:

1. User password is being generated to the Unicode-line.

2. Hash is being generated based on this line using MD4 algorithm.

3. Gained hash in being encoded by the DES algorithm, RID (i.e. user identifier) had been used as a key. It was necessary for gaining variant hashes for users who have equal passwords. You remember that all users have different RIDs (RID of the Administrator's built in account is 500, RID of the Guest's built in account is 501, all other users get RIDs equal 1000, 1001, 1002, etc.).

LM Hash formation:

1. User password is being shifted to capitals and added by nulls up to 14-byte length.

2. Gained line is divided on halves 7 bytes each, and each of them is being encoded separately using DES, output is 8-byte hash and total 16-byte hash.

3. Then LM Hash is being additionally encoded the same way as it had been done in the NT Hash formation algorithm step 3.


Q248.  - (Topic 1)

SNMP is a connectionless protocol that uses UDP instead of TCP packets (True or False)

A. true

B. false

Answer: A


Q249.  - (Topic 4)

While testing the company's web applications, a tester attempts to insert the following test script into the search area on the company's web sitE.

<script>alert(" Testing Testing Testing ")</script>

Afterwards, when the tester presses the search button, a pop-up box appears on the screen with the text: "Testing Testing Testing". Which vulnerability has been detected in the web application?

A. Buffer overflow

B. Cross-site request forgery

C. Distributed denial of service

D. Cross-site scripting

Answer: D


Q250.  - (Topic 3)

A security engineer is attempting to map a company’s internal network. The engineer enters in the following NMAP commanD.

NMAP –n –sS –P0 –p 80 ***.***.**.** What type of scan is this?

A. Quick scan

B. Intense scan

C. Stealth scan

D. Comprehensive scan

Answer: C


Q251.  - (Topic 5)

When analyzing the IDS logs, the system administrator notices connections from outside of the LAN have been sending packets where the Source IP address and Destination IP address are the same. There have been no alerts sent via email or logged in the IDS. Which type of an alert is this?

A. False positive

B. False negative

C. True positive

D. True negative

Answer: B


Q252.  - (Topic 5)

If an e-commerce site was put into a live environment and the programmers failed to remove the secret entry point that was used during the application development, what is this secret entry point known as?

A. SDLC process

B. Honey pot

C. SQL injection

D. Trap door

Answer: D

Topic 6, Volume F

501.  - (Topic 6)

A company is legally liable for the content of email that is sent from its systems, regardless of whether the message was sent for private or business-related purposes. This could lead to prosecution for the sender and for the company's directors if, for example, outgoing email was found to contain material that was pornographic, racist, or likely to incite someone to commit an act of terrorism. You can always defend yourself by "ignorance of the law" clause.

A. true

B. false

Answer: B


Q253.  - (Topic 2)

When writing shellcodes, you must avoid because these will end the string.

A. Root bytes

B. Null bytes

C. Char bytes

D. Unicode bytes

Answer: B


Q254.  - (Topic 4)

Which of the following items is unique to the N-tier architecture method of designing software applications?

A. Application layers can be separated, allowing each layer to be upgraded independently from other layers.

B. It is compatible with various databases including Access, Oracle, and SQL.

C. Data security is tied into each layer and must be updated for all layers when any upgrade is performed.

D. Application layers can be written in C, ASP.NET, or Delphi without any performance loss.

Answer: A


Q255.  - (Topic 1)

Your computer is infected by E-mail tracking and spying Trojan. This Trojan infects the computer with a single file - emos.sys

Which step would you perform to detect this type of Trojan?

A. Scan for suspicious startup programs using msconfig

B. Scan for suspicious network activities using Wireshark

C. Scan for suspicious device drivers in c:\windows\system32\drivers

D. Scan for suspicious open ports using netstat

Answer: C