Free CEH-001 Exam Braindumps (page: 30)

Page 29 of 220

The programmers on your team are analyzing the free, open source software being used to
run FTP services on a server in your organization. They notice that there is excessive number of functions in the source code that might lead to buffer overflow. These C++ functions do not check bounds. Identify the line in the source code that might lead to buffer overflow?

  1. 9
  2. 17
  3. 20
  4. 32
  5. 35

Answer(s): B



What framework architecture is shown in this exhibit?

  1. Core Impact
  2. Metasploit
  3. Immunity Canvas
  4. Nessus

Answer(s): B



Which of the following steganography utilities exploits the nature of white space and allows the user to conceal information in these white spaces?

  1. Image Hide
  2. Snow
  3. Gif-It-Up
  4. NiceText

Answer(s): B



You have chosen a 22 character word from the dictionary as your password. How long will it take to crack the password by an attacker?

  1. 16 million years
  2. 5 minutes
  3. 23 days
  4. 200 years

Answer(s): B






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts