What is the best way to pass the GAQM CEH-001 exam? Pass4itsure GAQM CEH-001 exam dumps practice test! Go https://www.pass4itsure.com/ceh-001.html can help you pass the exam! Here share the latest GAQM CEH-001 exam dumps pdf, GAQM CEH-001 exam questions, and answers!
GAQM CEH-001 pdf download [2021]
Free GAQM CEH-001 pdf download https://drive.google.com/file/d/16301khgDoA6DvqaKkOd2zLtZJSM7k_SS/view?usp=sharing you can learn them anytime and anywhere.
New GAQM CEH-001 practice test (questions answers) for free
QUESTION 1
Which one of the following is defined as the process of distributing incorrect Internet Protocol (IP) addresses/names with
the intent of diverting traffic?
A. Network aliasing
B. Domain Name Server (DNS) poisoning
C. Reverse Address Resolution Protocol (ARP)
D. Port scanning
Correct Answer: B
QUESTION 2
An organization hires a tester to do a wireless penetration test. Previous reports indicate that the last test did not contain
management or control packets in the submitted traces. Which of the following is the most likely reason for lack of
management or control packets?
A. The wireless card was not turned on.
B. The wrong network card drivers were in use by Wireshark.
C. On Linux and Mac OS X, only 802.11 headers are received in promiscuous mode.
D. Certain operating systems and adapters do not collect the management or control packets.
Correct Answer: D
QUESTION 3
The following exploit code is extracted from what kind of attack?
A. Remote password cracking attack
B. SQL Injection
C. Distributed Denial of Service
D. Cross Site Scripting
E. Buffer Overflow
Correct Answer: E
QUESTION 4
You are attempting to crack LM Manager hashed from Windows 2000 SAM file. You will be using LM Brute force
hacking tool for decryption.
What encryption algorithm will you be decrypting?
A. MD4
B. DES
C. SHA
D. SSL
Correct Answer: B
QUESTION 5
Which statement best describes a server type under an N-tier architecture?
A. A group of servers at a specific layer
B. A single server with a specific role
C. A group of servers with a unique role
D. A single server at a specific layer
Correct Answer: C
QUESTION 6
When Nmap performs a ping sweep, which of the following sets of requests does it send to the target device?
A. ICMP ECHO_REQUEST and TCP SYN
B. ICMP ECHO_REQUEST and TCP ACK
C. ICMP ECHO_REPLY and TFP RST
D. ICMP ECHO_REPLY and TCP FIN
Correct Answer: B
QUESTION 7
Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool “SIDExtractor”. Here is the
the output of the SIDs:
From the above list identify the user account with System Administrator privileges.
A. John
B. Rebecca
C. Sheela
D. Shawn
E. Somia
F. Chang
G. Micah
Correct Answer: F
QUESTION 8
The intrusion detection system at a software development company suddenly generates multiple alerts regarding
attacks against the company\\’s external webserver, VPN concentrator, and DNS servers. What should the security
team do to determine which alerts to check first?
A. Investigate based on the maintenance schedule of the affected systems.
B. Investigate based on the service level agreements of the systems.
C. Investigate based on the potential effect of the incident.
D. Investigate based on the order that the alerts arrived in.
Correct Answer: C
QUESTION 9
A tester is attempting to capture and analyze the traffic on a given network and realizes that the network has several
switches. What could be used to successfully sniff the traffic on this switched network? (Choose three.)
A. ARP spoofing
B. MAC duplication
C. MAC flooding
D. SYN flood
E. Reverse smurf attack
F. ARP broadcasting
Correct Answer: ABC
QUESTION 10
In an attempt to secure his 802.11b wireless network, Ulf decides to use a strategic antenna positioning. He places the
antenna for the access points near the center of the building. For those access points near the outer edge of the
building he uses semi- directional antennas that face towards the building\\’s center. There is a large parking lot and
outlying filed surrounding the building that extends out half a mile around the building. Ulf figures that with this and his
placement of antennas, his wireless network will be safe from attack.
Which of the following statements is true?
A. With the 300 feet limit of a wireless signal, Ulf\\’s network is safe.
B. Wireless signals can be detected from miles away, Ulf\\’s network is not safe.
C. Ulf\\’s network will be safe but only of he doesn\\’t switch to 802.11a.
D. Ulf\\’s network will not be safe until he also enables WEP.
Correct Answer: D
QUESTION 11
What is the main reason the use of a stored biometric is vulnerable to an attack?
A. The digital representation of the biometric might not be unique, even if the physical characteristic is unique.
B. Authentication using a stored biometric compares a copy to a copy instead of the original to a copy.
C. A stored biometric is no longer “something you are” and instead becomes “something you have”.
D. A stored biometric can be stolen and used by an attacker to impersonate the individual identified by the biometric.
Correct Answer: D
QUESTION 12
How does an operating system protect the passwords used for account logins?
A. The operating system performs a one-way hash of the passwords.
B. The operating system stores the passwords in a secret file that users cannot find.
C. The operating system encrypts the passwords, and decrypts them when needed.
D. The operating system stores all passwords in a protected segment of non-volatile memory.
Correct Answer: A
QUESTION 13
In which location, SAM hash passwords are stored in Windows 7?
A. c:\windows\system32\config\SAM
B. c:\winnt\system32\machine\SAM
C. c:\windows\etc\drivers\SAM
D. c:\windows\config\etc\SAM
Correct Answer: A
Conclusion:
Keep learning! Choose https://www.pass4itsure.com/ceh-001.html GAQM CEH-001 dumps to pass the exam successfully!
Free GAQM CEH-001 pdf: https://drive.google.com/file/d/16301khgDoA6DvqaKkOd2zLtZJSM7k_SS/view?usp=sharing