Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CEH-001 Certified Ethical Hacker (CEH) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CEH-001 Practice Questions

Certified Ethical Hacker (CEH)

Last Update 3 days ago
Total Questions : 878

Dive into our fully updated and stable CEH-001 practice test platform, featuring all the latest Certified Ethical Hacker CEH exam questions added this week. Our preparation tool is more than just a GAQM study aid; it's a strategic advantage.

Our free Certified Ethical Hacker CEH practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CEH-001. Use this test to pinpoint which areas you need to focus your study on.

CEH-001 PDF

CEH-001 PDF (Printable)
$43.75
$124.99

CEH-001 Testing Engine

CEH-001 PDF (Printable)
$50.75
$144.99

CEH-001 PDF + Testing Engine

CEH-001 PDF (Printable)
$63.7
$181.99
Question # 101

What is the disadvantage of an automated vulnerability assessment tool?

Options:

A.  

Ineffective

B.  

Slow

C.  

Prone to false positives

D.  

Prone to false negatives

E.  

Noisy

Discussion 0
Question # 102

What are two types of ICMP code used when using the ping command?

Options:

A.  

It uses types 0 and 8.

B.  

It uses types 13 and 14.

C.  

It uses types 15 and 17.

D.  

The ping command does not use ICMP but uses UDP.

Discussion 0
Question # 103

Which of the following attacks takes best advantage of an existing authenticated connection?

Options:

A.  

Spoofing

B.  

Session Hijacking

C.  

Password Sniffing

D.  

Password Guessing

Discussion 0
Question # 104

Sally is a network admin for a small company. She was asked to install wireless accesspoints in the building. In looking at the specifications for the access-points, she sees that all of them offer WEP. Which of these are true about WEP?

Select the best answer.

Options:

A.  

Stands for Wireless Encryption Protocol

B.  

It makes a WLAN as secure as a LAN

C.  

Stands for Wired Equivalent Privacy

D.  

It offers end to end security

Discussion 0
Question # 105

How many bits encryption does SHA-1 use?

Options:

A.  

64 bits

B.  

128 bits

C.  

160 bits

D.  

256 bits

Discussion 0
Question # 106

While examining a log report you find out that an intrusion has been attempted by a machine whose IP address is displayed as 0xde.0xad.0xbe.0xef. It looks to you like a hexadecimal number. You perform a ping 0xde.0xad.0xbe.0xef. Which of the following IP addresses will respond to the ping and hence will likely be responsible for the intrusion?

Options:

A.  

192.10.25.9

B.  

10.0.3.4

C.  

203.20.4.5

D.  

222.273.290.239

Discussion 0
Question # 107

Steven the hacker realizes that the network administrator of XYZ is using syskey to protect organization resources in the Windows 2000 Server. Syskey independently encrypts the hashes so that physical access to the server, tapes, or ERDs is only first step to cracking the passwords. Steven must break through the encryption used by syskey before he can attempt to brute force dictionary attacks on the hashes. Steven runs a program called “SysCracker” targeting the Windows 2000 Server machine in attempting to crack the hash used by Syskey. He needs to configure the encryption level before he can launch attach.

How many bits does Syskey use for encryption?

Options:

A.  

40 bit

B.  

64 bit

C.  

256 bit

D.  

128 bit

Discussion 0
Question # 108

Peter is a Linux network admin. As a knowledgeable security consultant, he turns to you to look for help on a firewall. He wants to use Linux as his firewall and use the latest freely available version that is offered. What do you recommend?

Select the best answer.

Options:

A.  

Ipchains

B.  

Iptables

C.  

Checkpoint FW for Linux

D.  

Ipfwadm

Discussion 0
Question # 109

What makes web application vulnerabilities so aggravating? (Choose two)

Options:

A.  

They can be launched through an authorized port.

B.  

A firewall will not stop them.

C.  

They exist only on the Linux platform.

D.  

They are detectable by most leading antivirus software.

Discussion 0
Question # 110

You have successfully run a buffer overflow attack against a default IIS installation running on a Windows 2000 Server. The server allows you to spawn a shell. In order to perform the actions you intend to do, you need elevated permission. You need to know what your current privileges are within the shell. Which of the following options would be your current privileges?

Options:

A.  

Administrator

B.  

IUSR_COMPUTERNAME

C.  

LOCAL_SYSTEM

D.  

Whatever account IIS was installed with

Discussion 0
Get CEH-001 dumps and pass your exam in 24 hours!

Free Exams Sample Questions