Free CEH-001 Exam Braindumps (page: 54)

Page 53 of 220

What do you call a pre-computed hash?

  1. Sun tables
  2. Apple tables
  3. Rainbow tables
  4. Moon tables

Answer(s): C



Why attackers use proxy servers?

  1. To ensure the exploits used in the attacks always flip reverse vectors
  2. Faster bandwidth performance and increase in attack speed
  3. Interrupt the remote victim's network traffic and reroute the packets to attackers machine
  4. To hide the source IP address so that an attacker can hack without any legal corollary

Answer(s): D



The SNMP Read-Only Community String is like a password. The string is sent along with each SNMP Get-Request and allows (or denies) access to a device. Most network vendors ship their equipment with a default password of "public". This is the so-called "default public community string". How would you keep intruders from getting sensitive information regarding the network devices using SNMP? (Select 2 answers)

  1. Enable SNMPv3 which encrypts username/password authentication
  2. Use your company name as the public community string replacing the default 'public'
  3. Enable IP filtering to limit access to SNMP device
  4. The default configuration provided by device vendors is highly secure and you don't need to change anything

Answer(s): A,C



You are writing security policy that hardens and prevents Footprinting attempt by Hackers. Which of the following countermeasures will NOT be effective against this attack?

  1. Configure routers to restrict the responses to Footprinting requests
  2. Configure Web Servers to avoid information leakage and disable unwanted protocols
  3. Lock the ports with suitable Firewall configuration
  4. Use an IDS that can be configured to refuse suspicious traffic and pick up Footprinting patterns
  5. Evaluate the information before publishing it on the Website/Intranet
  6. Monitor every employee computer with Spy cameras, keyloggers and spy on them
  7. Perform Footprinting techniques and remove any sensitive information found on DMZ sites
  8. Prevent search engines from caching a Webpage and use anonymous registration services
  9. Disable directory and use split-DNS

Answer(s): F






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts