we provide Highest Quality GAQM CEH-001 test which are the best for clearing CEH-001 test, and to get certified by GAQM Certified Ethical Hacker (CEH). The CEH-001 Questions & Answers covers all the knowledge points of the real CEH-001 exam. Crack your GAQM CEH-001 Exam with latest dumps, guaranteed!

Q196.  - (Topic 5)

An IT security engineer notices that the company’s web server is currently being hacked. What should the engineer do next?

A. Unplug the network connection on the company’s web server.

B. Determine the origin of the attack and launch a counterattack.

C. Record as much information as possible from the attack.

D. Perform a system restart on the company’s web server.

Answer: C

Q197.  - (Topic 1)

Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in order to find some information about the target they are attempting to penetrate. How would you call this type of activity?

A. Dumpster Diving

B. Scanning

C. CI Gathering

D. Garbage Scooping

Answer: A

Q198.  - (Topic 3)

What type of port scan is represented here.

A. Stealth Scan

B. Full Scan

C. XMAS Scan

D. FIN Scan

Answer: A

Q199.  - (Topic 5)

Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?

A. Restore a random file.

B. Perform a full restore.

C. Read the first 512 bytes of the tape.

D. Read the last 512 bytes of the tape.

Answer: B

Q200.  - (Topic 4)

Which type of security document is written with specific step-by-step details?

A. Process

B. Procedure

C. Policy

D. Paradigm

Answer: B

Q201.  - (Topic 8)

Bill is attempting a series of SQL queries in order to map out the tables within the database that he is trying to exploit.

Choose the attack type from the choices given below.

A. Database Fingerprinting

B. Database Enumeration

C. SQL Fingerprinting

D. SQL Enumeration

Answer: A

Explanation: He is trying to create a view of the characteristics of the target database, he is taking it’s fingerprints

Q202.  - (Topic 5)

A Certificate Authority (CA) generates a key pair that will be used for encryption and decryption of email. The integrity of the encrypted email is dependent on the security of which of the following?

A. Public key

B. Private key

C. Modulus length

D. Email server certificate

Answer: B

Q203.  - (Topic 5)

During a penetration test, a tester finds a target that is running MS SQL 2000 with default credentials. The tester assumes that the service is running with Local System account. How can this weakness be exploited to access the system?

A. Using the Metasploit psexec module setting the SA / Admin credential

B. Invoking the stored procedure xp_shell to spawn a Windows command shell

C. Invoking the stored procedure cmd_shell to spawn a Windows command shell

D. Invoking the stored procedure xp_cmdshell to spawn a Windows command shell

Answer: D

Q204.  - (Topic 1)

How would you describe an attack where an attacker attempts to deliver the payload over multiple packets over long periods of time with the purpose of defeating simple pattern matching in IDS systems without session reconstruction? A characteristic of this attack would be a continuous stream of small packets.

A. Session Hijacking

B. Session Stealing

C. Session Splicing

D. Session Fragmentation

Answer: C

Q205.  - (Topic 1)

Anonymizer sites access the Internet on your behalf, protecting your personal information from disclosure. An anonymizer protects all of your computer's identifying information while it surfs for you, enabling you to remain at least one step removed from the sites you visit.

You can visit Web sites without allowing anyone to gather information on sites visited by you. Services that provide anonymity disable pop-up windows and cookies, and conceal visitor's IP address.

These services typically use a proxy server to process each HTTP request. When the user requests a Web page by clicking a hyperlink or typing a URL into their browser, the service retrieves and displays the information using its own server. The remote server (where the requested Web page resides) receives information on the anonymous Web surfing service in place of your information.

In which situations would you want to use anonymizer? (Select 3 answers)

A. Increase your Web browsing bandwidth speed by using Anonymizer

B. To protect your privacy and Identity on the Internet

C. To bypass blocking applications that would prevent access to Web sites or parts of sites that you want to visit.

D. Post negative entries in blogs without revealing your IP identity

Answer: B,C,D

Q206.  - (Topic 6)

Sandra has been actively scanning the client network on which she is doing a vulnerability assessment test. While conducting a port scan she notices open ports in the range of 135 to 139. What protocol is most likely to be listening on those ports?

A. Finger


C. Samba


Answer: D

Explanation: The SMB (Server Message Block) protocol is used among other things for file sharing in Windows NT / 2000. In Windows NT it ran on top of NBT (NetBIOS over TCP/IP), which used the famous ports 137, 138 (UDP) and 139 (TCP). In Windows 2000, Microsoft added the possibility to run SMB directly over TCP/IP, without the extra layer of NBT. For this they use TCP port 445.

Q207.  - (Topic 6)

Ann would like to perform a reliable scan against a remote target. She is not concerned about being stealth at this point.

Which of the following type of scans would be the most accurate and reliable option?

A. A half-scan

B. A UDP scan

C. A TCP Connect scan

D. A FIN scan

Answer: C

Explanation: A TCP Connect scan, named after the Unix connect() system call is the most accurate scanning method. If a port is open the operating system completes the TCP three- way handshake, and the port scanner immediately closes the connection. Otherwise an error code is returned.

Example of a three-way handshake followed by a reset:


[][]TCP: D=80 S=49389 SYN SEQ=3362197786 LEN=0 WIN=5840

[] [] TCP: D=49389 S=80 SYN ACK=3362197787 SEQ=58695210 LEN=0 WIN=65535

[][]TCP: D=80 S=49389 ACK=58695211 WIN<<2=5840 [][]TCP: D=80 S=49389 RST ACK=58695211 WIN<<2=5840

Q208.  - (Topic 6)

Which of the following commands runs snort in packet logger mode?

A. ./snort -dev -h ./log

B. ./snort -dev -l ./log

C. ./snort -dev -o ./log

D. ./snort -dev -p ./log

Answer: B

Explanation: Note: If you want to store the packages in binary mode for later analysis use

./snort -l ./log -b

Q209.  - (Topic 7)

In Linux, the three most common commands that hackers usually attempt to Trojan are:

A. car, xterm, grep

B. netstat, ps, top

C. vmware, sed, less

D. xterm, ps, nc

Answer: B


The easiest programs to trojan and the smartest ones to trojan are ones commonly run by administrators and users, in this case netstat, ps, and top, for a complete list of commonly trojaned and rootkited software please reference this URL: http://www.usenix.org/publications/login/1999-9/features/rootkits.html

Q210.  - (Topic 8)

What is the best means of prevention against viruses?

A. Assign read only permission to all files on your system.

B. Remove any external devices such as floppy and USB connectors.

C. Install a rootkit detection tool.

D. Install and update anti-virus scanner.

Answer: D

Explanation: Although virus scanners only can find already known viruses this is still the best defense, together with users that are informed about risks with the internet.