Free GAQM CEH-001 Exam Braindumps (page: 35)

Which of the following Trojans would be considered 'Botnet Command Control Center'?

  1. YouKill DOOM
  2. Damen Rock
  3. Poison Ivy
  4. Matten Kit

Answer(s): C



What type of Virus is shown here?

  1. Macro Virus
  2. Cavity Virus
  3. Boot Sector Virus
  4. Metamorphic Virus
  5. Sparse Infector Virus

Answer(s): B



John is using a special tool on his Linux platform that has a database containing signatures to be able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI/ASPX scripts. Moreover, the database detects DDoS zombies and Trojans as well.
What would be the name of this tool?

  1. hping2
  2. nessus
  3. nmap
  4. make

Answer(s): B



Fred is scanning his network to ensure it is as secure as possible. Fred sends a TCP probe packet to a host with a FIN flag and he receives a RST/ACK response. What does this mean?

  1. This response means the port he is scanning is open.
  2. The RST/ACK response means the port Fred is scanning is disabled.
  3. This means the port he is scanning is half open.
  4. This means that the port he is scanning on the host is closed.

Answer(s): D



Viewing page 35 of 221
Viewing questions 137 - 140 out of 878 questions



Post your Comments and Discuss GAQM CEH-001 exam prep with other Community members:

CEH-001 Exam Discussions & Posts