Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CEH-001 Certified Ethical Hacker (CEH) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CEH-001 Practice Questions

Certified Ethical Hacker (CEH)

Last Update 3 days ago
Total Questions : 878

Dive into our fully updated and stable CEH-001 practice test platform, featuring all the latest Certified Ethical Hacker CEH exam questions added this week. Our preparation tool is more than just a GAQM study aid; it's a strategic advantage.

Our free Certified Ethical Hacker CEH practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CEH-001. Use this test to pinpoint which areas you need to focus your study on.

CEH-001 PDF

CEH-001 PDF (Printable)
$43.75
$124.99

CEH-001 Testing Engine

CEH-001 PDF (Printable)
$50.75
$144.99

CEH-001 PDF + Testing Engine

CEH-001 PDF (Printable)
$63.7
$181.99
Question # 81

Jake is a network administrator who needs to get reports from all the computer and network devices on his network. Jake wants to use SNMP but is afraid that won't be secure since passwords and messages are in clear text. How can Jake gather network information in a secure manner?

Options:

A.  

He can use SNMPv3

B.  

Jake can use SNMPrev5

C.  

He can use SecWMI

D.  

Jake can use SecSNMP

Discussion 0
Question # 82

You are writing security policy that hardens and prevents Footprinting attempt by Hackers. Which of the following countermeasures will NOT be effective against this attack?

Options:

A.  

Configure routers to restrict the responses to Footprinting requests

B.  

Configure Web Servers to avoid information leakage and disable unwanted protocols

C.  

Lock the ports with suitable Firewall configuration

D.  

Use an IDS that can be configured to refuse suspicious traffic and pick up Footprinting patterns

E.  

Evaluate the information before publishing it on the Website/Intranet

F.  

Monitor every employee computer with Spy cameras, keyloggers and spy on them

G.  

Perform Footprinting techniques and remove any sensitive information found on DMZ sites

Discussion 0
Question # 83

Passive reconnaissance involves collecting information through which of the following?

Options:

A.  

Social engineering

B.  

Network traffic sniffing

C.  

Man in the middle attacks

D.  

Publicly accessible sources

Discussion 0
Question # 84

Which of the following techniques can be used to mitigate the risk of an on-site attacker from connecting to an unused network port and gaining full access to the network? (Choose three.)

Options:

A.  

Port Security

B.  

IPSec Encryption

C.  

Network Admission Control (NAC)

D.  

802.1q Port Based Authentication

E.  

802.1x Port Based Authentication

F.  

Intrusion Detection System (IDS)

Discussion 0
Question # 85

June, a security analyst, understands that a polymorphic virus has the ability to mutate and can change its known viral signature and hide from signature-based antivirus programs. Can June use an antivirus program in this case and would it be effective against a polymorphic virus?

Options:

A.  

Yes. June can use an antivirus program since it compares the parity bit of executable files to the database of known check sum counts and it is effective on a polymorphic virus

B.  

Yes. June can use an antivirus program since it compares the signatures of executable files to the database of known viral signatures and it is very effective against a polymorphic virus

C.  

No. June can't use an antivirus program since it compares the signatures of executable files to the database of known viral signatures and in the case the polymorphic viruses cannot be detected by a signature-based anti-virus program

D.  

No. June can't use an antivirus program since it compares the size of executable files to the database of known viral signatures and it is effective on a polymorphic virus

Discussion 0
Question # 86

User which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?

Options:

A.  

18 U.S.C 1029 Possession of Access Devices

B.  

18 U.S.C 1030 Fraud and related activity in connection with computers

C.  

18 U.S.C 1343 Fraud by wire, radio or television

D.  

18 U.S.C 1361 Injury to Government Property

E.  

18 U.S.C 1362 Government communication systems

F.  

18 U.S.C 1831 Economic Espionage Act

G.  

18 U.S.C 1832 Trade Secrets Act

Discussion 0
Question # 87

The following excerpt is taken from a honeyput log. The log captures activities across three days. There are several intrusion attempts; however, a few are successful. Study the log given below and answer the following question:

(Note: The objective of this questions is to test whether the student has learnt about passive OS fingerprinting (which should tell them the OS from log captures): can they tell a SQL injection attack signature; can they infer if a user ID has been created by an attacker and whether they can read plain source – destination entries from log entries.)

Question # 87

What can you infer from the above log?

Options:

A.  

The system is a windows system which is being scanned unsuccessfully.

B.  

The system is a web application server compromised through SQL injection.

C.  

The system has been compromised and backdoored by the attacker.

D.  

The actual IP of the successful attacker is 24.9.255.53.

Discussion 0
Question # 88

What is the essential difference between an ‘Ethical Hacker’ and a ‘Cracker’?

Options:

A.  

The ethical hacker does not use the same techniques or skills as a cracker.

B.  

The ethical hacker does it strictly for financial motives unlike a cracker.

C.  

The ethical hacker has authorization from the owner of the target.

D.  

The ethical hacker is just a cracker who is getting paid.

Discussion 0
Question # 89

You are having problems while retrieving results after performing port scanning during internal testing. You verify that there are no security devices between you and the target system. When both stealth and connect scanning do not work, you decide to perform a NULL scan with NMAP. The first few systems scanned shows all ports open.

Which one of the following statements is probably true?

Options:

A.  

The systems have all ports open.

B.  

The systems are running a host based IDS.

C.  

The systems are web servers.

D.  

The systems are running Windows.

Discussion 0
Question # 90

War dialing is a very old attack and depicted in movies that were made years ago.

Why would a modem security tester consider using such an old technique?

Options:

A.  

It is cool, and if it works in the movies it must work in real life.

B.  

It allows circumvention of protection mechanisms by being on the internal network.

C.  

It allows circumvention of the company PBX.

D.  

A good security tester would not use such a derelict technique.

Discussion 0
Get CEH-001 dumps and pass your exam in 24 hours!

Free Exams Sample Questions