Free CEH-001 Exam Braindumps (page: 38)

Page 37 of 220

One of the most common and the best way of cracking RSA encryption is to begin to derive the two prime numbers, which are used in the RSA PKI mathematical process. If the two numbers p and q are discovered through a _____________ process, then the private key can be derived.

  1. Factorization
  2. Prime Detection
  3. Hashing
  4. Brute-forcing

Answer(s): A



Data is sent over the network as clear text (unencrypted) when Basic Authentication is configured on Web Servers.

  1. true
  2. false

Answer(s): A



NetBIOS over TCP/IP allows files and/or printers to be shared over the network. You are trying to intercept the traffic from a victim machine to a corporate network printer. You are attempting to hijack the printer network connection from your laptop by sniffing the wire.
Which port does SMB over TCP/IP use?

  1. 443
  2. 139
  3. 179
  4. 445

Answer(s): D



One of the ways to map a targeted network for live hosts is by sending an ICMP ECHO request to the broadcast or the network address. The request would be broadcasted to all hosts on the targeted network. The live hosts will send an ICMP ECHO Reply to the attacker's source IP address.
You send a ping request to the broadcast address 192.168.5.255.



There are 40 computers up and running on the target network. Only 13 hosts send a reply while others do not. Why?

  1. Windows machines will not generate an answer (ICMP ECHO Reply) to an ICMP ECHO request aimed at the broadcast address or at the network address.
  2. Linux machines will not generate an answer (ICMP ECHO Reply) to an ICMP ECHO request aimed at the broadcast address or at the network address.
  3. You should send a ping request with this command ping ? 192.168.5.0-255
  4. You cannot ping a broadcast address. The above scenario is wrong.

Answer(s): A






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts