Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CEH-001 Certified Ethical Hacker (CEH) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CEH-001 Practice Questions

Certified Ethical Hacker (CEH)

Last Update 3 days ago
Total Questions : 878

Dive into our fully updated and stable CEH-001 practice test platform, featuring all the latest Certified Ethical Hacker CEH exam questions added this week. Our preparation tool is more than just a GAQM study aid; it's a strategic advantage.

Our free Certified Ethical Hacker CEH practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CEH-001. Use this test to pinpoint which areas you need to focus your study on.

CEH-001 PDF

CEH-001 PDF (Printable)
$43.75
$124.99

CEH-001 Testing Engine

CEH-001 PDF (Printable)
$50.75
$144.99

CEH-001 PDF + Testing Engine

CEH-001 PDF (Printable)
$63.7
$181.99
Question # 121

WPA2 uses AES for wireless data encryption at which of the following encryption levels?

Options:

A.  

64 bit and CCMP

B.  

128 bit and CRC

C.  

128 bit and CCMP

D.  

128 bit and TKIP

Discussion 0
Question # 122

A Network Administrator was recently promoted to Chief Security Officer at a local university. One of employee's new responsibilities is to manage the implementation of an RFID card access system to a new server room on campus. The server room will house student enrollment information that is securely backed up to an off-site location.

During a meeting with an outside consultant, the Chief Security Officer explains that he is concerned that the existing security controls have not been designed properly. Currently, the Network Administrator is responsible for approving and issuing RFID card access to the server room, as well as reviewing the electronic access logs on a weekly basis.

Which of the following is an issue with the situation?

Options:

A.  

Segregation of duties

B.  

Undue influence

C.  

Lack of experience

D.  

Inadequate disaster recovery plan

Discussion 0
Question # 123

An NMAP scan of a server shows port 69 is open. What risk could this pose?

Options:

A.  

Unauthenticated access

B.  

Weak SSL version

C.  

Cleartext login

D.  

Web portal data leak

Discussion 0
Question # 124

A tester has been hired to do a web application security test. The tester notices that the site is dynamic and must make use of a back end database.

In order for the tester to see if SQL injection is possible, what is the first character that the tester should use to attempt breaking a valid SQL request?

Options:

A.  

Semicolon

B.  

Single quote

C.  

Exclamation mark

D.  

Double quote

Discussion 0
Question # 125

The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?

Options:

A.  

An extensible security framework named COBIT

B.  

A list of flaws and how to fix them

C.  

Web application patches

D.  

A security certification for hardened web applications

Discussion 0
Question # 126

Which of the following open source tools would be the best choice to scan a network for potential targets?

Options:

A.  

NMAP

B.  

NIKTO

C.  

CAIN

D.  

John the Ripper

Discussion 0
Question # 127

What is the best defense against privilege escalation vulnerability?

Options:

A.  

Patch systems regularly and upgrade interactive login privileges at the system administrator level.

B.  

Run administrator and applications on least privileges and use a content registry for tracking.

C.  

Run services with least privileged accounts and implement multi-factor authentication and authorization.

D.  

Review user roles and administrator privileges for maximum utilization of automation services.

Discussion 0
Question # 128

A hacker is attempting to see which ports have been left open on a network. Which NMAP switch would the hacker use?

Options:

A.  

-sO

B.  

-sP

C.  

-sS

D.  

-sU

Discussion 0
Question # 129

What are the three types of compliance that the Open Source Security Testing Methodology Manual (OSSTMM) recognizes?

Options:

A.  

Legal, performance, audit

B.  

Audit, standards based, regulatory

C.  

Contractual, regulatory, industry

D.  

Legislative, contractual, standards based

Discussion 0
Question # 130

What are common signs that a system has been compromised or hacked? (Choose three.)

Options:

A.  

Increased amount of failed logon events

B.  

Patterns in time gaps in system and/or event logs

C.  

New user accounts created

D.  

Consistency in usage baselines

E.  

Partitions are encrypted

F.  

Server hard drives become fragmented

Discussion 0
Get CEH-001 dumps and pass your exam in 24 hours!

Free Exams Sample Questions