Free CEH-001 Exam Braindumps (page: 44)

Page 43 of 220

ViruXine.W32 virus hides their presence by changing the underlying executable code. This Virus code mutates while keeping the original algorithm intact, the code changes itself each time it runs, but the function of the code (its semantics) will not change at all.



What is this technique called?

  1. Polymorphic Virus
  2. Metamorphic Virus
  3. Dravidic Virus
  4. Stealth Virus

Answer(s): A



"Testing the network using the same methodologies and tools employed by attackers" Identify the correct terminology that defines the above statement.

  1. Vulnerability Scanning
  2. Penetration Testing
  3. Security Policy Implementation
  4. Designing Network Security

Answer(s): B



Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches. If these switches' ARP cache is successfully flooded, what will be the result?

  1. The switches will drop into hub mode if the ARP cache is successfully flooded.
  2. If the ARP cache is flooded, the switches will drop into pix mode making it less susceptible to attacks.
  3. Depending on the switch manufacturer, the device will either delete every entry in its ARP cache or reroute packets to the nearest switch.
  4. The switches will route all traffic to the broadcast address created collisions.

Answer(s): A



You are programming a buffer overflow exploit and you want to create a NOP sled of 200 bytes in the program exploit.c



What is the hexadecimal value of NOP instruction?

  1. 0x60
  2. 0x80
  3. 0x70
  4. 0x90

Answer(s): D






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts