Exam
Code: CEH-001
Exam Name: Certified Ethical Hacker (CEH)
One year free update, No help, Full refund!
CEH-001 Examcollection Total Q&A: 878 Questions and Answers
Last Update: 12-11,2016
CEH-001 centresExam Name: Certified Ethical Hacker (CEH)
One year free update, No help, Full refund!
CEH-001 Examcollection Total Q&A: 878 Questions and Answers
Last Update: 12-11,2016
CEH-001 accurate answers Detail:
CEH-001 Examcollection
NO.1 Which type of antenna is used in wireless communication?
A. Uni-directional
B. Bi-directional
C. Omnidirectional
D. Parabolic
Answer: C
CEH-001 pass CEH-001 fresh
NO.2 Keystroke logging is the action of tracking (or logging) the keys struck on a keyboard, typicall in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. How will you defend against hardware keyloggers when using public computers and Internet Kiosks? (Select 4 answers)
A. Alternate between typing the login credentials and typing characters somewhere else in the focus window
B. The next key typed replaces selected text portion. g. if the password is "secret", one could type "s", then some dummy keys "asdfsd". Then these dummies could be selected with mouse, and next character from the password "e" is typed, which replaces the dummies "asdfsd"
C. The next key typed replaces selected text portion. E.g. if the password is "secret", one could type "s", then some dummy keys "asdfsd". Then these dummies could be selected with mouse, and next character from the password "e" is typed, which replaces the dummies "asdfsd"
D. Type a wrong password first, later type the correct password on the login page defeating the keylogger recording
E. Type a password beginning with the last letter and then using the mouse to move the cursor for each subsequent letter.
Answer: A,B,C,E
CEH-001 Testking
NO.3 Information gathered from social networking websites such as Facebook, Twitter and LinkedIn can be used to launch which of the following types of attacks? (Choose two.)
A. Fraggle attack
B. SQL injection attack
C. Social engineering attack
D. Distributed denial of service attack
E. Phishing attack
F. Smurf attack
Answer: C,E
CEH-001 centres
NO.4 Rebecca is a security analyst and knows of a local root exploit that has the ability to enable local users to use available exploits to gain root privileges. This vulnerability exploits a condition in the Linux kernel within the execve() system call. There is no known workaround that exists for this vulnerability. What is the correct action to be taken by Rebecca in this situation as a recommendation to management?
A. Rebecca should make a recommendation to upgrade the Linux kernel promptly
B. Rebecca should make a recommendation to hire more system administrators to monitor all child
processes to ensure that each child process can't elevate privilege
C. Rebecca should make a recommendation to disable the () system call
D. Rebecca should make a recommendation to set all child-process to sleep within the execve()
Answer: A
CEH-001 centres free download:http://www.itexamguide.com/CEH-001_braindumps.html
没有评论:
发表评论