Free CEH-001 Exam Braindumps (page: 21)

Page 20 of 220

What type of Trojan is this?

  1. RAT Trojan
  2. E-Mail Trojan
  3. Defacement Trojan
  4. Destructing Trojan
  5. Denial of Service Trojan

Answer(s): C



Maintaining a secure Web server requires constant effort, resources, and vigilance from an organization. Securely administering a Web server on a daily basis is an essential aspect of Web server security.
Maintaining the security of a Web server will usually involve the following steps:

1. Configuring, protecting, and analyzing log files
2. Backing up critical information frequently
3. Maintaining a protected authoritative copy of the organization's Web content
4. Establishing and following procedures for recovering from compromise
5. Testing and applying patches in a timely manner
6. Testing security periodically.
In which step would you engage a forensic investigator?

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

Answer(s): D



In Buffer Overflow exploit, which of the following registers gets overwritten with return address of the exploit code?

  1. EEP
  2. ESP
  3. EAP
  4. EIP

Answer(s): D



Web servers often contain directories that do not need to be indexed. You create a text file with search engine indexing restrictions and place it on the root directory of the Web Server.

User-agent: *
Disallow: /images/
Disallow: /banners/
Disallow: /Forms/
Disallow: /Dictionary/
Disallow: /_borders/
Disallow: /_fpclass/
Disallow: /_overlay/
Disallow: /_private/
Disallow: /_themes/

What is the name of this file?

  1. robots.txt
  2. search.txt
  3. blocklist.txt
  4. spf.txt

Answer(s): A






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts