Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CEH-001 Certified Ethical Hacker (CEH) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CEH-001 Practice Questions

Certified Ethical Hacker (CEH)

Last Update 3 days ago
Total Questions : 878

Dive into our fully updated and stable CEH-001 practice test platform, featuring all the latest Certified Ethical Hacker CEH exam questions added this week. Our preparation tool is more than just a GAQM study aid; it's a strategic advantage.

Our free Certified Ethical Hacker CEH practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CEH-001. Use this test to pinpoint which areas you need to focus your study on.

CEH-001 PDF

CEH-001 PDF (Printable)
$43.75
$124.99

CEH-001 Testing Engine

CEH-001 PDF (Printable)
$50.75
$144.99

CEH-001 PDF + Testing Engine

CEH-001 PDF (Printable)
$63.7
$181.99
Question # 51

Frederickson Security Consultants is currently conducting a security audit on the networks of Hawthorn Enterprises, a contractor for the Department of Defense. Since Hawthorn Enterprises conducts business daily with the federal government, they must abide by very stringent security policies. Frederickson is testing all of Hawthorn's physical and logical security measures including biometrics, passwords, and permissions. The federal government requires that all users must utilize random, non-dictionary passwords that must take at least 30 days to crack. Frederickson has confirmed that all Hawthorn employees use a random password generator for their network passwords. The Frederickson consultants have saved off numerous SAM files from Hawthorn's servers using Pwdump6 and are going to try and crack the network passwords. What method of attack is best suited to crack these passwords in the shortest amount of time?

Options:

A.  

Brute force attack

B.  

Birthday attack

C.  

Dictionary attack

D.  

Brute service attack

Discussion 0
Question # 52

What is the goal of a Denial of Service Attack?

Options:

A.  

Capture files from a remote computer.

B.  

Render a network or computer incapable of providing normal service.

C.  

Exploit a weakness in the TCP stack.

D.  

Execute service at PS 1009.

Discussion 0
Question # 53

In the context of password security, a simple dictionary attack involves loading a dictionary file (a text file full of dictionary words) into a cracking application such as L0phtCrack or John the Ripper, and running it against user accounts located by the application. The larger the word and word fragment selection, the more effective the dictionary attack is. The brute force method is the most inclusive, although slow. It usually tries every possible letter and number combination in its automated exploration.

If you would use both brute force and dictionary methods combined together to have variation of words, what would you call such an attack?

Options:

A.  

Full Blown

B.  

Thorough

C.  

Hybrid

D.  

BruteDics

Discussion 0
Question # 54

A POP3 client contacts the POP3 server:

Options:

A.  

To send mail

B.  

To receive mail

C.  

to send and receive mail

D.  

to get the address to send mail to

E.  

initiate a UDP SMTP connection to read mail

Discussion 0
Question # 55

What is the term 8 to describe an attack that falsifies a broadcast ICMP echo request and includes a primary and secondary victim?

Options:

A.  

Fraggle Attack

B.  

Man in the Middle Attack

C.  

Trojan Horse Attack

D.  

Smurf Attack

E.  

Back Orifice Attack

Discussion 0
Question # 56

You have retrieved the raw hash values from a Windows 2000 Domain Controller. Using social engineering, you come to know that they are enforcing strong passwords. You understand that all users are required to use passwords that are at least 8 characters in length. All passwords must also use 3 of the 4 following categories: lower case letters, capital letters, numbers and special characters.

With your existing knowledge of users, likely user account names and the possibility that they will choose the easiest passwords possible, what would be the fastest type of password cracking attack you can run against these hash values and still get results?

Options:

A.  

Online Attack

B.  

Dictionary Attack

C.  

Brute Force Attack

D.  

Hybrid Attack

Discussion 0
Question # 57

One of your junior administrator is concerned with Windows LM hashes and password cracking. In your discussion with them, which of the following are true statements that you would point out?

Select the best answers.

Options:

A.  

John the Ripper can be used to crack a variety of passwords, but one limitation is that the output doesn't show if the password is upper or lower case.

B.  

BY using NTLMV1, you have implemented an effective countermeasure to password cracking.

C.  

SYSKEY is an effective countermeasure.

D.  

If a Windows LM password is 7 characters or less, the hash will be passed with the following characters, in HEX- 00112233445566778899.

E.  

Enforcing Windows complex passwords is an effective countermeasure.

Discussion 0
Question # 58

In Linux, the three most common commands that hackers usually attempt to Trojan are:

Options:

A.  

car, xterm, grep

B.  

netstat, ps, top

C.  

vmware, sed, less

D.  

xterm, ps, nc

Discussion 0
Question # 59

This kind of password cracking method uses word lists in combination with numbers and special characters:

Options:

A.  

Hybrid

B.  

Linear

C.  

Symmetric

D.  

Brute Force

Discussion 0
Question # 60

What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?

Options:

A.  

All are hacking tools developed by the legion of doom

B.  

All are tools that can be used not only by hackers, but also security personnel

C.  

All are DDOS tools

D.  

All are tools that are only effective against Windows

E.  

All are tools that are only effective against Linux

Discussion 0
Get CEH-001 dumps and pass your exam in 24 hours!

Free Exams Sample Questions