Free GAQM CEH-001 Exam Actual Questions

The questions for CEH-001 were last updated On Nov 3, 2024

Question No. 1

Perimeter testing means determining exactly what your firewall blocks and what it allows. To conduct a good test, you can spoof source IP addresses and source ports. Which of the following command results in packets that will appear to originate from the system at 10.8.8.8? Such a packet is useful for determining whether the firewall is allowing random packets in or out of your network.

Show Answer Hide Answer
Correct Answer: D

Question No. 2

What is the proper response for a NULL scan if the port is closed?

Show Answer Hide Answer
Correct Answer: E

Closed ports respond to a NULL scan with a reset.


Question No. 3

You find the following entries in your web log. Each shows attempted access to either root.exe or cmd.exe. What caused this?

Show Answer Hide Answer
Correct Answer: D

The Nimda worm modifies all web content files it finds. As a result, any user browsing web content on the system, whether via the file system or via a web server, may download a copy of the worm. Some browsers may automatically execute the downloaded copy, thereby, infecting the browsing system. The high scanning rate of the Nimda worm may also cause bandwidth denial-of-service conditions on networks with infected machines and allow intruders the ability to execute arbitrary commands within the Local System security context on machines running the unpatched versions of IIS.


Question No. 4

Least privilege is a security concept that requires that a user is

Show Answer Hide Answer
Correct Answer: A

Question No. 5

When setting up a wireless network, an administratorentersa pre-shared key for security. Which of the following is true?

Show Answer Hide Answer
Correct Answer: A