Free CEH-001 Exam Braindumps (page: 51)

Page 50 of 220

Joseph has just been hired on to a contractor company of the Department of Defense as their Senior Security Analyst. Joseph has been instructed on the company's strict security policies that have been implemented, and the policies that have yet to be put in place. Per the Department of Defense, all DoD users and the users of their contractors must use two- factor authentication to access their networks. Joseph has been delegated the task of researching and implementing the best two-factor authentication method for his company.
Joseph's supervisor has told him that they would like to use some type of hardware device in tandem with a security or identifying pin number. Joseph's company has already researched using smart cards and all the resources needed to implement them, but found the smart cards to not be cost effective. What type of device should Joseph use for two- factor authentication?

  1. Biometric device
  2. OTP
  3. Proximity cards
  4. Security token

Answer(s): D



What type of attack is shown here?

  1. Bandwidth exhaust Attack
  2. Denial of Service Attack
  3. Cluster Service Attack
  4. Distributed Denial of Service Attack

Answer(s): D

Explanation:

We think this is a DDoS attack not DoS because the attack is initialed in multiple zombies not single machine.



What is the correct order of steps in CEH System Hacking Cycle?

  1. Option A
  2. Option B
  3. Option C
  4. Option D

Answer(s): A



Identify SQL injection attack from the HTTP requests shown below:

  1. http://www.myserver.c0m/search.asp?
    lname=smith%27%3bupdate%20usertable%20set%20passwd%3d%27hAx0r%27%3b-- %00
  2. http://www.myserver.c0m/script.php?mydata=%3cscript%20src=%22
  3. http%3a%2f%2fwww.yourserver.c0m%2fbadscript.js%22%3e%3c%2fscript%3e
  4. http://www.victim.com/example accountnumber=67891&creditamount=999999999

Answer(s): A






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts