Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CEH-001 Certified Ethical Hacker (CEH) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CEH-001 Practice Questions

Certified Ethical Hacker (CEH)

Last Update 3 days ago
Total Questions : 878

Dive into our fully updated and stable CEH-001 practice test platform, featuring all the latest Certified Ethical Hacker CEH exam questions added this week. Our preparation tool is more than just a GAQM study aid; it's a strategic advantage.

Our free Certified Ethical Hacker CEH practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CEH-001. Use this test to pinpoint which areas you need to focus your study on.

CEH-001 PDF

CEH-001 PDF (Printable)
$43.75
$124.99

CEH-001 Testing Engine

CEH-001 PDF (Printable)
$50.75
$144.99

CEH-001 PDF + Testing Engine

CEH-001 PDF (Printable)
$63.7
$181.99
Question # 91

What type of port scan is shown below?

Question # 91

Options:

A.  

Idle Scan

B.  

Windows Scan

C.  

XMAS Scan

D.  

SYN Stealth Scan

Discussion 0
Question # 92

Neil notices that a single address is generating traffic from its port 500 to port 500 of several other machines on the network. This scan is eating up most of the network bandwidth and Neil is concerned. As a security professional, what would you infer from this scan?

Options:

A.  

It is a network fault and the originating machine is in a network loop

B.  

It is a worm that is malfunctioning or hardcoded to scan on port 500

C.  

The attacker is trying to detect machines on the network which have SSL enabled

D.  

The attacker is trying to determine the type of VPN implementation and checking for IPSec

Discussion 0
Question # 93

Exhibit

Question # 93

(Note: the student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.)

Snort has been used to capture packets on the network. On studying the packets, the penetration tester finds it to be abnormal. If you were the penetration tester, why would you find this abnormal?

What is odd about this attack? Choose the best answer.

Options:

A.  

This is not a spoofed packet as the IP stack has increasing numbers for the three flags.

B.  

This is back orifice activity as the scan comes form port 31337.

C.  

The attacker wants to avoid creating a sub-carries connection that is not normally valid.

D.  

These packets were crafted by a tool, they were not created by a standard IP stack.

Discussion 0
Question # 94

What port scanning method is the most reliable but also the most detectable?

Options:

A.  

Null Scanning

B.  

Connect Scanning

C.  

ICMP Scanning

D.  

Idlescan Scanning

E.  

Half Scanning

F.  

Verbose Scanning

Discussion 0
Question # 95

Which of the following LM hashes represents a password of less than 8 characters?

Options:

A.  

0182BD0BD4444BF836077A718CCDF409

B.  

44EFCE164AB921CQAAD3B435B51404EE

C.  

BA810DBA98995F1817306D272A9441BB

D.  

CEC52EB9C8E3455DC2265B23734E0DAC

E.  

B757BF5C0D87772FAAD3B435B51404EE

F.  

E52CAC67419A9A224A3B108F3FA6CB6D

Discussion 0
Question # 96

Bob is acknowledged as a hacker of repute and is popular among visitors of “underground” sites. Bob is willing to share his knowledge with those who are willing to learn, and many have expressed their interest in learning from him. However, this knowledge has a risk associated with it, as it can be used for malevolent attacks as well.

In this context, what would be the most affective method to bridge the knowledge gap between the “black” hats or crackers and the “white” hats or computer security professionals? (Choose the test answer)

Options:

A.  

Educate everyone with books, articles and training on risk analysis, vulnerabilities and safeguards.

B.  

Hire more computer security monitoring personnel to monitor computer systems and networks.

C.  

Make obtaining either a computer security certification or accreditation easier to achieve so more individuals feel that they are a part of something larger than life.

D.  

Train more National Guard and reservist in the art of computer security to help out in times of emergency or crises.

Discussion 0
Question # 97

Doug is conducting a port scan of a target network. He knows that his client target network has a web server and that there is a mail server also which is up and running. Doug has been sweeping the network but has not been able to elicit any response from the remote target. Which of the following could be the most likely cause behind this lack of response? Select 4.

Options:

A.  

UDP is filtered by a gateway

B.  

The packet TTL value is too low and cannot reach the target

C.  

The host might be down

D.  

The destination network might be down

E.  

The TCP windows size does not match

F.  

ICMP is filtered by a gateway

Discussion 0
Question # 98

What does a type 3 code 13 represent?(Choose two.

Options:

A.  

Echo request

B.  

Destination unreachable

C.  

Network unreachable

D.  

Administratively prohibited

E.  

Port unreachable

F.  

Time exceeded

Discussion 0
Question # 99

Exhibit

Question # 99

Joe Hacker runs the hping2 hacking tool to predict the target host’s sequence numbers in one of the hacking session.

What does the first and second column mean? Select two.

Options:

A.  

The first column reports the sequence number

B.  

The second column reports the difference between the current and last sequence number

C.  

The second column reports the next sequence number

D.  

The first column reports the difference between current and last sequence number

Discussion 0
Question # 100

Why would an attacker want to perform a scan on port 137?

Options:

A.  

To discover proxy servers on a network

B.  

To disrupt the NetBIOS SMB service on the target host

C.  

To check for file and print sharing on Windows systems

D.  

To discover information about a target host using NBTSTAT

Discussion 0
Get CEH-001 dumps and pass your exam in 24 hours!

Free Exams Sample Questions