New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Achieve Success in the GAQM CEH-001 Exam: A Detailed Certified Ethical Hacker (CEH) Guide

Questions 221

While performing a ping sweep of a subnet you receive an ICMP reply of Code 3/Type 13 for all the pings sent out.

What is the most likely cause behind this response?

Options:
A.

The firewall is dropping the packets.

B.

An in-line IDS is dropping the packets.

C.

A router is blocking ICMP.

D.

The host does not respond to ICMP packets.

GAQM CEH-001 Premium Access
Questions 222

Which type of Nmap scan is the most reliable, but also the most visible, and likely to be picked up by and IDS?

Options:
A.

SYN scan

B.

ACK scan

C.

RST scan

D.

Connect scan

E.

FIN scan

Questions 223

An Nmap scan shows the following open ports, and nmap also reports that the OS guessing results to match too many signatures hence it cannot reliably be identified:

21 ftp

23 telnet

80 http

443 https

What does this suggest?

Options:
A.

This is a Windows Domain Controller

B.

The host is not firewalled

C.

The host is not a Linux or Solaris system

D.

The host is not properly patched

Questions 224

Which of the following Nmap commands would be used to perform a stack fingerprinting?

Options:
A.

Nmap -O -p80 <host(s.>

B.

Nmap -hU -Q<host(s.>

C.

Nmap -sT -p <host(s.>

D.

Nmap -u -o -w2 <host>

E.

Nmap -sS -0p target

Questions 225

What is the disadvantage of an automated vulnerability assessment tool?

Options:
A.

Ineffective

B.

Slow

C.

Prone to false positives

D.

Prone to false negatives

E.

Noisy

Questions 226

Name two software tools used for OS guessing? (Choose two.

Options:
A.

Nmap

B.

Snadboy

C.

Queso

D.

UserInfo

E.

NetBus

Questions 227

Which of the following tools are used for footprinting? (Choose four)

Options:
A.

Sam Spade

B.

NSLookup

C.

Traceroute

D.

Neotrace

E.

Cheops

Questions 228

Which of the following ICMP message types are used for destinations unreachables?

Options:
A.

0

B.

3

C.

11

D.

13

E.

17

Questions 229

Destination unreachable administratively prohibited messages can inform the hacker to what?

Options:
A.

That a circuit level proxy has been installed and is filtering traffic

B.

That his/her scans are being blocked by a honeypot or jail

C.

That the packets are being malformed by the scanning software

D.

That a router or other packet-filtering device is blocking traffic

E.

That the network is functioning normally

Questions 230

Paul has just finished setting up his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Paul notices that when he uses his wireless connection, the speed is sometimes 54 Mbps and sometimes it is only 24Mbps or less. Paul connects to his wireless router's management utility and notices that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that the unfamiliar machine has the same MAC address as his laptop. What is Paul seeing here?

Options:
A.

MAC spoofing

B.

Macof

C.

ARP spoofing

D.

DNS spoofing

Questions 231

Ann would like to perform a reliable scan against a remote target. She is not concerned about being stealth at this point.

Which of the following type of scans would be the most accurate and reliable option?

Options:
A.

A half-scan

B.

A UDP scan

C.

A TCP Connect scan

D.

A FIN scan

Questions 232

While performing ping scans into a target network you get a frantic call from the organization’s security team. They report that they are under a denial of service attack. When you stop your scan, the smurf attack event stops showing up on the organization’s IDS monitor. How can you modify your scan to prevent triggering this event in the IDS?

Options:
A.

Scan more slowly.

B.

Do not scan the broadcast IP.

C.

Spoof the source IP address.

D.

Only scan the Windows systems.

Questions 233

Which Windows system tool checks integrity of critical files that has been digitally signed by Microsoft?

Options:
A.

signverif.exe

B.

sigverif.exe

C.

msverif.exe

D.

verifier.exe

Questions 234

What does a type 3 code 13 represent?(Choose two.

Options:
A.

Echo request

B.

Destination unreachable

C.

Network unreachable

D.

Administratively prohibited

E.

Port unreachable

F.

Time exceeded

Questions 235

At a Windows Server command prompt, which command could be used to list the running services?

Options:
A.

Sc query type= running

B.

Sc query \\servername

C.

Sc query

D.

Sc config

Questions 236

The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?

Options:
A.

An extensible security framework named COBIT

B.

A list of flaws and how to fix them

C.

Web application patches

D.

A security certification for hardened web applications

Questions 237

A pentester is using Metasploit to exploit an FTP server and pivot to a LAN. How will the pentester pivot using Metasploit?

Options:
A.

Issue the pivot exploit and set the meterpreter.

B.

Reconfigure the network settings in the meterpreter.

C.

Set the payload to propagate through the meterpreter.

D.

Create a route statement in the meterpreter.

Questions 238

Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?

Options:
A.

Restore a random file.

B.

Perform a full restore.

C.

Read the first 512 bytes of the tape.

D.

Read the last 512 bytes of the tape.

Questions 239

Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?

Options:
A.

Port scanning

B.

Banner grabbing

C.

Injecting arbitrary data

D.

Analyzing service response

Questions 240

Which set of access control solutions implements two-factor authentication?

Options:
A.

USB token and PIN

B.

Fingerprint scanner and retina scanner

C.

Password and PIN

D.

Account and password