Free CEH-001 Exam Braindumps (page: 46)

Page 45 of 220

What port number is used by LDAP protocol?

  1. 110
  2. 389
  3. 464
  4. 445

Answer(s): B



Fred is the network administrator for his company. Fred is testing an internal switch. From an external IP address, Fred wants to try and trick this switch into thinking it already has established a session with his computer. How can Fred accomplish this?

  1. Fred can accomplish this by sending an IP packet with the RST/SIN bit and the source address of his computer.
  2. He can send an IP packet with the SYN bit and the source address of his computer.
  3. Fred can send an IP packet with the ACK bit set to zero and the source address of the switch.
  4. Fred can send an IP packet to the switch with the ACK bit and the source address of his machine.

Answer(s): D



Within the context of Computer Security, which of the following statements describes Social Engineering best?

  1. Social Engineering is the act of publicly disclosing information
  2. Social Engineering is the means put in place by human resource to perform time accounting
  3. Social Engineering is the act of getting needed information from a person rather than breaking into a system
  4. Social Engineering is a training program within sociology studies

Answer(s): C



In Trojan terminology, what is a covert channel?

  1. A channel that transfers information within a computer system or network in a way that violates the security policy
  2. A legitimate communication path within a computer system or network for transfer of data
  3. It is a kernel operation that hides boot processes and services to mask detection
  4. It is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establish connections

Answer(s): A






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts