Free CEH-001 Exam Braindumps (page: 12)

Page 11 of 220

In Trojan terminology, what is required to create the executable file chess.exe as shown below?

  1. Mixer
  2. Converter
  3. Wrapper
  4. Zipper

Answer(s): C



Syslog is a standard for logging program messages. It allows separation of the software that generates messages from the system that stores them and the software that reports and analyzes them. It also provides devices, which would otherwise be unable to communicate a means to notify administrators of problems or performance.


What default port Syslog daemon listens on?

  1. 242
  2. 312
  3. 416
  4. 514

Answer(s): D



This attack uses social engineering techniques to trick users into accessing a fake Web site and divulging personal information. Attackers send a legitimate-looking e-mail asking users to update their information on the company's Web site, but the URLs in the e-mail actually point to a false Web site.

  1. Wiresharp attack
  2. Switch and bait attack
  3. Phishing attack
  4. Man-in-the-Middle attack

Answer(s): C



Which of the following statements would NOT be a proper definition for a Trojan Horse?

  1. An authorized program that has been designed to capture keyboard keystroke while the user is unaware of such activity being performed
  2. An unauthorized program contained within a legitimate program. This unauthorized program performs functions unknown (and probably unwanted) by the user
  3. A legitimate program that has been altered by the placement of unauthorized code within it; this code performs functions unknown (and probably unwanted) by the user
  4. Any program that appears to perform a desirable and necessary function but that (because of unauthorized code within it that is unknown to the user) performs functions unknown (and definitely unwanted) by the user

Answer(s): A






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts