Free CEH-001 Exam Braindumps (page: 14)

Page 13 of 220

You want to hide a secret.txt document inside c:\windows\system32\tcpip.dll kernel library using ADS streams. How will you accomplish this?

  1. copy secret.txt c:\windows\system32\tcpip.dll kernel>secret.txt
  2. copy secret.txt c:\windows\system32\tcpip.dll:secret.txt
  3. copy secret.txt c:\windows\system32\tcpip.dll |secret.txt
  4. copy secret.txt >< c:\windows\system32\tcpip.dll kernel secret.txt

Answer(s): B



You just purchased the latest DELL computer, which comes pre-installed with Windows 7, McAfee antivirus software and a host of other applications. You want to connect Ethernet wire to your cable modem and start using the computer immediately. Windows is dangerously insecure when unpacked from the box, and there are a few things that you must do before you use it.

  1. New installation of Windows should be patched by installing the latest service packs and hotfixes
  2. Key applications such as Adobe Acrobat, Macromedia Flash, Java, Winzip etc., must have the latest security patches installed
  3. Install a personal firewall and lock down unused ports from connecting to your computer
  4. Install the latest signatures for Antivirus software
  5. Configure "Windows Update" to automatic
  6. Create a non-admin user with a complex password and logon to this account
  7. You can start using your computer as vendors such as DELL, HP and IBM would have already installed the latest service packs.

Answer(s): A,C,D,E,F



In the context of Trojans, what is the definition of a Wrapper?

  1. An encryption tool to protect the Trojan
  2. A tool used to bind the Trojan with a legitimate file
  3. A tool used to calculate bandwidth and CPU cycles wasted by the Trojan
  4. A tool used to encapsulate packets within a new header and footer

Answer(s): B

Explanation:

Wrapper does not change header or footer of any packets but it mix between legitimate file and Trojan file.



Your computer is infected by E-mail tracking and spying Trojan. This Trojan infects the computer with a single file - emos.sys
Which step would you perform to detect this type of Trojan?

  1. Scan for suspicious startup programs using msconfig
  2. Scan for suspicious network activities using Wireshark
  3. Scan for suspicious device drivers in c:\windows\system32\drivers
  4. Scan for suspicious open ports using netstat

Answer(s): C






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts