Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CEH-001 Certified Ethical Hacker (CEH) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CEH-001 Practice Questions

Certified Ethical Hacker (CEH)

Last Update 3 days ago
Total Questions : 878

Dive into our fully updated and stable CEH-001 practice test platform, featuring all the latest Certified Ethical Hacker CEH exam questions added this week. Our preparation tool is more than just a GAQM study aid; it's a strategic advantage.

Our free Certified Ethical Hacker CEH practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CEH-001. Use this test to pinpoint which areas you need to focus your study on.

CEH-001 PDF

CEH-001 PDF (Printable)
$43.75
$124.99

CEH-001 Testing Engine

CEH-001 PDF (Printable)
$50.75
$144.99

CEH-001 PDF + Testing Engine

CEH-001 PDF (Printable)
$63.7
$181.99
Question # 111

Your boss Tess King is attempting to modify the parameters of a Web-based application in order to alter the SQL statements that are parsed to retrieve data from the database. What would you call such an attack?

Options:

A.  

SQL Input attack

B.  

SQL Piggybacking attack

C.  

SQL Select attack

D.  

SQL Injection attack

Discussion 0
Question # 112

The programmers on your team are analyzing the free, open source software being used to run FTP services on a server. They notice that there is an excessive number of fgets() and gets() on the source code. These C++ functions do not check bounds.

What kind of attack is this program susceptible to?

Options:

A.  

Buffer of Overflow

B.  

Denial of Service

C.  

Shatter Attack

D.  

Password Attack

Discussion 0
Question # 113

Why do you need to capture five to ten million packets in order to crack WEP with AirSnort?

Options:

A.  

All IVs are vulnerable to attack

B.  

Air Snort uses a cache of packets

C.  

Air Snort implements the FMS attack and only encrypted packets are counted

D.  

A majority of weak IVs transmitted by access points and wireless cards are not filtered by contemporary wireless manufacturers

Discussion 0
Question # 114

Bryan notices the error on the web page and asks Liza to enter liza' or '1'='1 in the email field. They are greeted with a message "Your login information has been mailed to johndoe@gmail.com". What do you think has occurred?

Options:

A.  

The web application picked up a record at random

B.  

The web application returned the first record it found

C.  

The server error has caused the application to malfunction

D.  

The web application emailed the administrator about the error

Discussion 0
Question # 115

Which of the following wireless technologies can be detected by NetStumbler? (Select all that apply)

Options:

A.  

802.11b

B.  

802.11e

C.  

802.11a

D.  

802.11g

E.  

802.11

Discussion 0
Question # 116

You find the following entries in your web log. Each shows attempted access to either root.exe or cmd.exe.

What caused this?

Question # 116

Options:

A.  

The Morris worm

B.  

The PIF virus

C.  

Trinoo

D.  

Nimda

E.  

Code Red

F.  

Ping of Death

Discussion 0
Question # 117

Derek has stumbled upon a wireless network and wants to assess its security. However, he does not find enough traffic for a good capture. He intends to use AirSnort on the captured traffic to crack the WEP key and does not know the IP address range or the AP. How can he generate traffic on the network so that he can capture enough packets to crack the WEP key?

Options:

A.  

Use any ARP requests found in the capture

B.  

Derek can use a session replay on the packets captured

C.  

Derek can use KisMAC as it needs two USB devices to generate traffic

D.  

Use Ettercap to discover the gateway and ICMP ping flood tool to generate traffic

Discussion 0
Question # 118

What is a sheepdip?

Options:

A.  

It is another name for Honeynet

B.  

It is a machine used to coordinate honeynets

C.  

It is the process of checking physical media for virus before they are used in a computer

D.  

None of the above

Discussion 0
Question # 119

After studying the following log entries, how many user IDs can you identify that the attacker has tampered with?

1. mkdir -p /etc/X11/applnk/Internet/.etc

2. mkdir -p /etc/X11/applnk/Internet/.etcpasswd

3. touch -acmr /etc/passwd /etc/X11/applnk/Internet/.etcpasswd

4. touch -acmr /etc /etc/X11/applnk/Internet/.etc

5. passwd nobody -d

6. /usr/sbin/adduser dns -d/bin -u 0 -g 0 -s/bin/bash

7. passwd dns -d

8. touch -acmr /etc/X11/applnk/Internet/.etcpasswd /etc/passwd

9. touch -acmr /etc/X11/applnk/Internet/.etc /etc

Options:

A.  

IUSR_

B.  

acmr, dns

C.  

nobody, dns

D.  

nobody, IUSR_

Discussion 0
Question # 120

Which of the following cryptography attack methods is usually performed without the use of a computer?

Options:

A.  

Ciphertext-only attack

B.  

Chosen key attack

C.  

Rubber hose attack

D.  

Rainbow table attack

Discussion 0
Get CEH-001 dumps and pass your exam in 24 hours!

Free Exams Sample Questions