Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CEH-001 Certified Ethical Hacker (CEH) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CEH-001 Practice Questions

Certified Ethical Hacker (CEH)

Last Update 2 days ago
Total Questions : 878

Dive into our fully updated and stable CEH-001 practice test platform, featuring all the latest Certified Ethical Hacker CEH exam questions added this week. Our preparation tool is more than just a GAQM study aid; it's a strategic advantage.

Our free Certified Ethical Hacker CEH practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CEH-001. Use this test to pinpoint which areas you need to focus your study on.

CEH-001 PDF

CEH-001 PDF (Printable)
$43.75
$124.99

CEH-001 Testing Engine

CEH-001 PDF (Printable)
$50.75
$144.99

CEH-001 PDF + Testing Engine

CEH-001 PDF (Printable)
$63.7
$181.99
Question # 71

Here is the ASCII Sheet.

Question # 71

You want to guess the DBO username juggyboy (8 characters) using Blind SQL Injection technique.

What is the correct syntax?

Question # 71

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 72

What do you call a pre-computed hash?

Options:

A.  

Sun tables

B.  

Apple tables

C.  

Rainbow tables

D.  

Moon tables

Discussion 0
Question # 73

Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?

Options:

A.  

SHA-1

B.  

MD5

C.  

HAVAL

D.  

MD4

Discussion 0
Question # 74

You generate MD5 128-bit hash on all files and folders on your computer to keep a baseline check for security reasons?

Question # 74

What is the length of the MD5 hash?

Options:

A.  

32 character

B.  

64 byte

C.  

48 char

D.  

128 kb

Discussion 0
Question # 75

A company has made the decision to host their own email and basic web services. The administrator needs to set up the external firewall to limit what protocols should be allowed to get to the public part of the company's network. Which ports should the administrator open? (Choose three.)

Options:

A.  

Port 22

B.  

Port 23

C.  

Port 25

D.  

Port 53

E.  

Port 80

F.  

Port 139

G.  

Port 445

Discussion 0
Question # 76

During a wireless penetration test, a tester detects an access point using WPA2 encryption. Which of the following attacks should be used to obtain the key?

Options:

A.  

The tester must capture the WPA2 authentication handshake and then crack it.

B.  

The tester must use the tool inSSIDer to crack it using the ESSID of the network.

C.  

The tester cannot crack WPA2 because it is in full compliance with the IEEE 802.11i standard.

D.  

The tester must change the MAC address of the wireless network card and then use the AirTraf tool to obtain the key.

Discussion 0
Question # 77

Which tool is used to automate SQL injections and exploit a database by forcing a given web application to connect to another database controlled by a hacker?

Options:

A.  

DataThief

B.  

NetCat

C.  

Cain and Abel

D.  

SQLInjector

Discussion 0
Question # 78

Jacob is looking through a traffic log that was captured using Wireshark. Jacob has come across what appears to be SYN requests to an internal computer from a spoofed IP address. What is Jacob seeing here?

Options:

A.  

Jacob is seeing a Smurf attack.

B.  

Jacob is seeing a SYN flood.

C.  

He is seeing a SYN/ACK attack.

D.  

He has found evidence of an ACK flood.

Discussion 0
Question # 79

You are trying to hijack a telnet session from a victim machine with IP address 10.0.0.5 to Cisco router at 10.0.0.1. You sniff the traffic and attempt to predict the sequence and acknowledgement numbers to successfully hijack the telnet session.

Here is the captured data in tcpdump.

Question # 79

What are the next sequence and acknowledgement numbers that the router will send to the victim machine?

Options:

A.  

Sequence number: 82980070 Acknowledgement number: 17768885

A.  

B.  

Sequence number: 17768729 Acknowledgement number: 82980070

B.  

C.  

Sequence number: 87000070 Acknowledgement number: 85320085

C.  

D.  

Sequence number: 82980010 Acknowledgement number: 17768885

D.  

Discussion 0
Question # 80

In order to show improvement of security over time, what must be developed?

Options:

A.  

Reports

B.  

Testing tools

C.  

Metrics

D.  

Taxonomy of vulnerabilities

Discussion 0
Get CEH-001 dumps and pass your exam in 24 hours!

Free Exams Sample Questions