Free CEH-001 Exam Braindumps (page: 53)

Page 52 of 220

Bill is a security analyst for his company. All the switches used in the company's office are Cisco switches. Bill wants to make sure all switches are safe from ARP poisoning. How can Bill accomplish this?

  1. Bill can use the command: ip dhcp snooping.
  2. Bill can use the command: no ip snoop.
  3. Bill could use the command: ip arp no flood.
  4. He could use the command: ip arp no snoop.

Answer(s): A



You generate MD5 128-bit hash on all files and folders on your computer to keep a baseline check for security reasons?


What is the length of the MD5 hash?

  1. 32 character
  2. 64 byte
  3. 48 char
  4. 128 kb

Answer(s): A



Which type of password cracking technique works like dictionary attack but adds some numbers and symbols to the words from the dictionary and tries to crack the password?

  1. Dictionary attack
  2. Brute forcing attack
  3. Hybrid attack
  4. Syllable attack
  5. Rule-based attack

Answer(s): C



What command would you type to OS fingerprint a server using the command line?

  1. Option A
  2. Option B
  3. Option C
  4. Option D

Answer(s): C






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts