Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CEH-001 Certified Ethical Hacker (CEH) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CEH-001 Practice Questions

Certified Ethical Hacker (CEH)

Last Update 3 days ago
Total Questions : 878

Dive into our fully updated and stable CEH-001 practice test platform, featuring all the latest Certified Ethical Hacker CEH exam questions added this week. Our preparation tool is more than just a GAQM study aid; it's a strategic advantage.

Our free Certified Ethical Hacker CEH practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CEH-001. Use this test to pinpoint which areas you need to focus your study on.

CEH-001 PDF

CEH-001 PDF (Printable)
$43.75
$124.99

CEH-001 Testing Engine

CEH-001 PDF (Printable)
$50.75
$144.99

CEH-001 PDF + Testing Engine

CEH-001 PDF (Printable)
$63.7
$181.99
Question # 41

Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches. If these switches' ARP cache is successfully flooded, what will be the result?

Options:

A.  

The switches will drop into hub mode if the ARP cache is successfully flooded.

B.  

If the ARP cache is flooded, the switches will drop into pix mode making it less susceptible to attacks.

C.  

Depending on the switch manufacturer, the device will either delete every entry in its ARP cache or reroute packets to the nearest switch.

D.  

The switches will route all traffic to the broadcast address created collisions.

Discussion 0
Question # 42

Bob has a good understanding of cryptography, having worked with it for many years. Cryptography is used to secure data from specific threats, but it does not secure the application from coding errors. It can provide data privacy; integrity and enable strong authentication but it cannot mitigate programming errors. What is a good example of a programming error that Bob can use to explain to the management how encryption will not address all their security concerns?

Options:

A.  

Bob can explain that using a weak key management technique is a form of programming error

B.  

Bob can explain that using passwords to derive cryptographic keys is a form of a programming error

C.  

Bob can explain that a buffer overflow is an example of programming error and it is a common mistake associated with poor programming technique

D.  

Bob can explain that a random number generator can be used to derive cryptographic keys but it uses a weak seed value and this is a form of a programming error

Discussion 0
Question # 43

A simple compiler technique used by programmers is to add a terminator 'canary word' containing four letters NULL (0x00), CR (0x0d), LF (0x0a) and EOF (0xff) so that most string operations are terminated. If the canary word has been altered when the function returns, and the program responds by emitting an intruder alert into syslog, and then halts what does it indicate?

Options:

A.  

A buffer overflow attack has been attempted

B.  

A buffer overflow attack has already occurred

C.  

A firewall has been breached and this is logged

D.  

An intrusion detection system has been triggered

E.  

The system has crashed

Discussion 0
Question # 44

What port number is used by LDAP protocol?

Options:

A.  

110

B.  

389

C.  

464

D.  

445

Discussion 0
Question # 45

Neil is closely monitoring his firewall rules and logs on a regular basis. Some of the users have complained to Neil that there are a few employees who are visiting offensive web site during work hours, without any consideration for others. Neil knows that he has an up-to-date content filtering system and such access should not be authorized. What type of technique might be used by these offenders to access the Internet without restriction?

Options:

A.  

They are using UDP that is always authorized at the firewall

B.  

They are using HTTP tunneling software that allows them to communicate with protocols in a way it was not intended

C.  

They have been able to compromise the firewall, modify the rules, and give themselves proper access

D.  

They are using an older version of Internet Explorer that allow them to bypass the proxy server

Discussion 0
Question # 46

Gerald, the Systems Administrator for Hyped Enterprises, has just discovered that his network has been breached by an outside attacker. After performing routine maintenance on his servers, he discovers numerous remote tools were installed that no one claims to have knowledge of in his department. Gerald logs onto the management console for his IDS and discovers an unknown IP address that scanned his network constantly for a week and was able to access his network through a high-level port that was not closed. Gerald traces the IP address he found in the IDS log to a proxy server in Brazil. Gerald calls the company that owns the proxy server and after searching through their logs, they trace the source to another proxy server in Switzerland. Gerald calls the company in Switzerland that owns the proxy server and after scanning through the logs again, they trace the source back to a proxy server in China. What proxy tool has Gerald's attacker used to cover their tracks?

Options:

A.  

ISA proxy

B.  

IAS proxy

C.  

TOR proxy

D.  

Cheops proxy

Discussion 0
Question # 47

An Attacker creates a zuckerjournals.com website by copying and mirroring HACKERJOURNALS.COM site to spread the news that Hollywood actor Jason Jenkins died in a car accident. The attacker then submits his fake site for indexing in major search engines. When users search for "Jason Jenkins", attacker's fake site shows up and dupes victims by the fake news.

Question # 47

This is another great example that some people do not know what URL's are. Real website:

Fake website: http://www.zuckerjournals.com

Question # 47

The website is clearly not WWW.HACKERJOURNALS.COM. It is obvious for many, but unfortunately some people still do not know what an URL is. It's the address that you enter into the address bar at the top your browser and this is clearly not legit site, its www.zuckerjournals.com

How would you verify if a website is authentic or not?

Options:

A.  

Visit the site using secure HTTPS protocol and check the SSL certificate for authenticity

B.  

Navigate to the site by visiting various blogs and forums for authentic links

C.  

Enable Cache on your browser and lookout for error message warning on the screen

D.  

Visit the site by clicking on a link from Google search engine

Discussion 0
Question # 48

Every company needs a formal written document which spells out to employees precisely what they are allowed to use the company's systems for, what is prohibited, and what will happen to them if they break the rules. Two printed copies of the policy should be given to every employee as soon as possible after they join the organization. The employee should be asked to sign one copy, which should be safely filed by the company. No one should be allowed to use the company's computer systems until they have signed the policy in acceptance of its terms. What is this document called?

Options:

A.  

Information Audit Policy (IAP)

B.  

Information Security Policy (ISP)

C.  

Penetration Testing Policy (PTP)

D.  

Company Compliance Policy (CCP)

Discussion 0
Question # 49

Yancey is a network security administrator for a large electric company. This company provides power for over 100, 000 people in Las Vegas. Yancey has worked for his company for over 15 years and has become very successful. One day, Yancey comes in to work and finds out that the company will be downsizing and he will be out of a job in two weeks. Yancey is very angry and decides to place logic bombs, viruses, Trojans, and backdoors all over the network to take down the company once he has left. Yancey does not care if his actions land him in jail for 30 or more years, he just wants the company to pay for what they are doing to him. What would Yancey be considered?

Options:

A.  

Yancey would be considered a Suicide Hacker

B.  

Since he does not care about going to jail, he would be considered a Black Hat

C.  

Because Yancey works for the company currently; he would be a White Hat

D.  

Yancey is a Hacktivist Hacker since he is standing up to a company that is downsizing

Discussion 0
Question # 50

A digital signature is simply a message that is encrypted with the public key instead of the private key.

Options:

A.  

true

B.  

false

Discussion 0
Get CEH-001 dumps and pass your exam in 24 hours!

Free Exams Sample Questions