Halloween Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

Good News !!! CEH-001 Certified Ethical Hacker (CEH) is now Stable and With Pass Result

CEH-001 Practice Exam Questions and Answers

Certified Ethical Hacker (CEH)

Last Update 1 day ago
Total Questions : 878

Certified Ethical Hacker (CEH) is stable now with all latest exam questions are added 1 day ago. Incorporating CEH-001 practice exam questions into your study plan is more than just a preparation strategy.

CEH-001 exam questions often include scenarios and problem-solving exercises that mirror real-world challenges. Working through CEH-001 dumps allows you to practice pacing yourself, ensuring that you can complete all Certified Ethical Hacker (CEH) practice test within the allotted time frame.

CEH-001 PDF

CEH-001 PDF (Printable)
$42
$119.99

CEH-001 Testing Engine

CEH-001 PDF (Printable)
$49
$139.99

CEH-001 PDF + Testing Engine

CEH-001 PDF (Printable)
$61.95
$176.99
Question # 1

The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:

Time:Mar 13 17:30:15 Port:20 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:17 Port:21 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:19 Port:22 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:21 Port:23 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:22 Port:25 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:23 Port:80 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:30 Port:443 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

What type of activity has been logged?

Options:

A.  

Port scan targeting 192.168.1.103

B.  

Teardrop attack targeting 192.168.1.106

C.  

Denial of service attack targeting 192.168.1.103

D.  

Port scan targeting 192.168.1.106

Discussion 0
Question # 2

Which type of scan is used on the eye to measure the layer of blood vessels?

Options:

A.  

Facial recognition scan

B.  

Retinal scan

C.  

Iris scan

D.  

Signature kinetics scan

Discussion 0
Question # 3

While conducting a penetration test, the tester determines that there is a firewall between the tester's machine and the target machine. The firewall is only monitoring TCP handshaking of packets at the session layer of the OSI model. Which type of firewall is the tester trying to traverse?

Options:

A.  

Packet filtering firewall

B.  

Application-level firewall

C.  

Circuit-level gateway firewall

D.  

Stateful multilayer inspection firewall

Discussion 0
Question # 4

Bluetooth uses which digital modulation technique to exchange information between paired devices?

Options:

A.  

PSK (phase-shift keying)

B.  

FSK (frequency-shift keying)

C.  

ASK (amplitude-shift keying)

D.  

QAM (quadrature amplitude modulation)

Discussion 0
Question # 5

What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a hotel room?

Options:

A.  

Set a BIOS password.

B.  

Encrypt the data on the hard drive.

C.  

Use a strong logon password to the operating system.

D.  

Back up everything on the laptop and store the backup in a safe place.

Discussion 0
Question # 6

Which of the following is an example of IP spoofing?

Options:

A.  

SQL injections

B.  

Man-in-the-middle

C.  

Cross-site scripting

D.  

ARP poisoning

Discussion 0
Question # 7

What is a successful method for protecting a router from potential smurf attacks?

Options:

A.  

Placing the router in broadcast mode

B.  

Enabling port forwarding on the router

C.  

Installing the router outside of the network's firewall

D.  

Disabling the router from accepting broadcast ping messages

Discussion 0
Question # 8

What is the outcome of the comm”nc -l -p 2222 | nc 10.1.0.43 1234"?

Options:

A.  

Netcat will listen on the 10.1.0.43 interface for 1234 seconds on port 2222.

B.  

Netcat will listen on port 2222 and output anything received to a remote connection on 10.1.0.43 port 1234.

C.  

Netcat will listen for a connection from 10.1.0.43 on port 1234 and output anything received to port 2222.

D.  

Netcat will listen on port 2222 and then output anything received to local interface 10.1.0.43.

Discussion 0
Question # 9

Which of the following programs is usually targeted at Microsoft Office products?

Options:

A.  

Polymorphic virus

B.  

Multipart virus

C.  

Macro virus

D.  

Stealth virus

Discussion 0
Question # 10

A certified ethical hacker (CEH) completed a penetration test of the main headquarters of a company almost two months ago, but has yet to get paid. The customer is suffering from financial problems, and the CEH is worried that the company will go out of business and end up not paying. What actions should the CEH take?

Options:

A.  

Threaten to publish the penetration test results if not paid.

B.  

Follow proper legal procedures against the company to request payment.

C.  

Tell other customers of the financial problems with payments from this company.

D.  

Exploit some of the vulnerabilities found on the company webserver to deface it.

Discussion 0
Get CEH-001 dumps and pass your exam in 24 hours!

Free Exams Sample Questions