Proper study guides for Regenerate GAQM Certified Ethical Hacker (CEH) certified begins with GAQM CEH-001 preparation products which designed to deliver the Real CEH-001 questions by making you pass the CEH-001 test at your first time. Try the free CEH-001 demo right now.

Q166.  - (Topic 1)

One of the effective DoS/DDoS countermeasures is 'Throttling'. Which statement correctly defines this term?

A. Set up routers that access a server with logic to adjust incoming traffic to levels that will be safe for the server to process

B. Providers can increase the bandwidth on critical connections to prevent them from going down in the event of an attack

C. Replicating servers that can provide additional failsafe protection

D. Load balance each server in a multiple-server architecture

Answer: A

Q167.  - (Topic 8)

On wireless networks, SSID is used to identify the network. Why are SSID not considered to be a good security mechanism to protect a wireless networks?

A. The SSID is only 32 bits in length.

B. The SSID is transmitted in clear text.

C. The SSID is the same as the MAC address for all vendors.

D. The SSID is to identify a station, not a network.

Answer: B

Explanation: The SSID IS constructed to identify a network, it IS NOT the same as the MAC address and SSID’s consists of a maximum of 32 alphanumeric characters.

Q168.  - (Topic 8)

In an attempt to secure his wireless network, Bob implements a VPN to cover the wireless communications. Immediately after the implementation, users begin complaining about how slow the wireless network is. After benchmarking the network’s speed. Bob discovers that throughput has dropped by almost half even though the number of users has remained the same.

Why does this happen in the VPN over wireless implementation?

A. The stronger encryption used by the VPN slows down the network.

B. Using a VPN with wireless doubles the overhead on an access point for all direct client to access point communications.

C. VPNs use larger packets then wireless networks normally do.

D. Using a VPN on wireless automatically enables WEP, which causes additional overhead.

Answer: B

Explanation: By applying VPN the access point will have to recalculate all headers destined for client and from clients twice.

Q169.  - (Topic 1)

XSS attacks occur on Web pages that do not perform appropriate bounds checking on data entered by users. Characters like < > that mark the beginning/end of a tag should be converted into HTML entities.

What is the correct code when converted to html entities?

A. Option A

B. Option B

C. Option C

D. Option D

Answer: D

Q170.  - (Topic 8)

What do you conclude from the nmap results below? Staring nmap V. 3.10ALPHA0 (

(The 1592 ports scanned but not shown below are in state: closed)

Port State Service 21/tcp open ftp 25/tcp open smtp 80/tcp open http 443/tcp open https

Remote operating system guess: Too many signatures match the reliability guess the OS. Nmap run completed – 1 IP address (1 host up) scanned in 91.66 seconds

A. The system is a Windows Domain Controller.

B. The system is not firewalled.

C. The system is not running Linux or Solaris.

D. The system is not properly patched.

Answer: B

Explanation: There is no reports of any ports being filtered.

Q171.  - (Topic 4)

Data hiding analysis can be useful in

A. determining the level of encryption used to encrypt the data.

B. detecting and recovering data that may indicate knowledge, ownership or intent.

C. identifying the amount of central processing unit (cpu) usage over time to process the data.

D. preventing a denial of service attack on a set of enterprise servers to prevent users from accessing the data.

Answer: B

Q172.  - (Topic 5)

A Network Administrator was recently promoted to Chief Security Officer at a local university. One of employee's new responsibilities is to manage the implementation of an RFID card access system to a new server room on campus. The server room will house student enrollment information that is securely backed up to an off-site location.

During a meeting with an outside consultant, the Chief Security Officer explains that he is concerned that the existing security controls have not been designed properly. Currently, the Network Administrator is responsible for approving and issuing RFID card access to the server room, as well as reviewing the electronic access logs on a weekly basis.

Which of the following is an issue with the situation?

A. Segregation of duties

B. Undue influence

C. Lack of experience

D. Inadequate disaster recovery plan

Answer: A

Q173.  - (Topic 8)

You are doing IP spoofing while you scan your target. You find that the target has port 23 open. Anyway you are unable to connect. Why?

A. A firewall is blocking port 23

B. You cannot spoof + TCP

C. You need an automated telnet tool

D. The OS does not reply to telnet even if port 23 is open

Answer: A

Explanation: The question is not telling you what state the port is being reported by the scanning utility, if the program used to conduct this is nmap, nmap will show you one of three states – “open”, “closed”, or “filtered” a port can be in an “open” state yet filtered, usually by a stateful packet inspection filter (ie. Netfilter for linux, ipfilter for bsd). C and D to make any sense for this question, their bogus, and B, “You cannot spoof + TCP”, well you can spoof + TCP, so we strike that out.

Q174.  - (Topic 1)

What port number is used by Kerberos protocol?

A. 88

B. 44

C. 487

D. 419

Answer: A

Q175.  - (Topic 8)

Snort is an open source Intrusion Detection system. However, it can also be used for a few other purposes as well.

Which of the choices below indicate the other features offered by Snort?

A. IDS, Packet Logger, Sniffer

B. IDS, Firewall, Sniffer

C. IDS, Sniffer, Proxy

D. IDS, Sniffer, content inspector

Answer: A

Explanation: Snort is a free software network intrusion detection and prevention system capable of performing packet logging & real-time traffic analysis, on IP networks. Snort was written by Martin Roesch but is now owned and developed by Sourcefire

Q176.  - (Topic 4)

Which of the following problems can be solved by using Wireshark?

A. Tracking version changes of source code

B. Checking creation dates on all webpages on a server

C. Resetting the administrator password on multiple systems

D. Troubleshooting communication resets between two systems

Answer: D

Q177.  - (Topic 8)

What is Cygwin?

A. Cygwin is a free C++ compiler that runs on Windows

B. Cygwin is a free Unix subsystem that runs on top of Windows

C. Cygwin is a free Windows subsystem that runs on top of Linux

D. Cygwin is a X Windows GUI subsytem that runs on top of Linux GNOME environment

Answer: B

Explanation: Cygwin is a Linux-like environment for Windows. It consists of two parts:

A DLL (cygwin1.dll) which acts as a Linux API emulation layer providing substantial Linux

API functionality

A collection of tools which provide Linux look and feel

The Cygwin DLL works with all non-beta, non "release candidate", ix86 32 bit versions of Windows since Windows 95, with the exception of Windows CE.

Q178.  - (Topic 7)

Which of the following are well know password-cracking programs?(Choose all that apply.

A. L0phtcrack

B. NetCat

C. Jack the Ripper

D. Netbus

E. John the Ripper

Answer: A,E

Explanation: L0phtcrack and John the Ripper are two well know password-cracking programs. Netcat is considered the Swiss-army knife of hacking tools, but is not used for password cracking

Q179.  - (Topic 3)

Oregon Corp is fighting a litigation suit with Scamster Inc. Oregon has assigned a private investigative agency to go through garbage, recycled paper, and other rubbish at Scamster's office site in order to find relevant information. What would you call this kind of activity?

A. CI Gathering

B. Scanning

C. Dumpster Diving

D. Garbage Scooping

Answer: C

Q180.  - (Topic 8)

Vulnerability mapping occurs after which phase of a penetration test?

A. Host scanning

B. Passive information gathering

C. Analysis of host scanning

D. Network level discovery

Answer: C


The order should be Passive information gathering, Network level discovery, Host scanning and Analysis of host scanning.