Free CEH-001 Exam Braindumps (page: 55)

Page 54 of 220

Bank of Timbuktu is a medium-sized, regional financial institution in Timbuktu. The bank has deployed a new Internet-accessible Web application recently. Customers can access their account balances, transfer money between accounts, pay bills and conduct online financial business using a Web browser.
John Stevens is in charge of information security at Bank of Timbuktu. After one month in production, several customers have complained about the Internet enabled banking application. Strangely, the account balances of many of the bank's customers had been changed! However, money hasn't been removed from the bank; instead, money was transferred between accounts. Given this attack profile, John Stevens reviewed the Web application's logs and found the following entries:



What kind of attack did the Hacker attempt to carry out at the bank?

  1. Brute force attack in which the Hacker attempted guessing login ID and password from password cracking tools.
  2. The Hacker attempted Session hijacking, in which the Hacker opened an account with the bank, then logged in to receive a session ID, guessed the next ID and took over Jason's session.
  3. The Hacker used a generator module to pass results to the Web server and exploited Web application CGI vulnerability.
  4. The Hacker first attempted logins with suspected user names, then used SQL Injection to gain access to valid bank login IDs.

Answer(s): D



WWW wanderers or spiders are programs that traverse many pages in the World Wide Web by recursively retrieving linked pages. Search engines like Google, frequently spider web pages for indexing. How will you stop web spiders from crawling certain directories on your website?

  1. Place robots.txt file in the root of your website with listing of directories that you don't want to be crawled
  2. Place authentication on root directories that will prevent crawling from these spiders
  3. Enable SSL on the restricted directories which will block these spiders from crawling
  4. Place "HTTP:NO CRAWL" on the html pages that you don't want the crawlers to index

Answer(s): A



You are trying to hijack a telnet session from a victim machine with IP address 10.0.0.5 to Cisco router at 10.0.0.1. You sniff the traffic and attempt to predict the sequence and acknowledgement numbers to successfully hijack the telnet session.
Here is the captured data in tcpdump.



What are the next sequence and acknowledgement numbers that the router will send to the victim machine?

  1. Sequence number: 82980070 Acknowledgement number: 17768885
  2. Sequence number: 17768729 Acknowledgement number: 82980070
  3. Sequence number: 87000070 Acknowledgement number: 85320085
  4. Sequence number: 82980010 Acknowledgement number: 17768885

Answer(s): A



Hayden is the network security administrator for her company, a large finance firm based in Miami. Hayden just returned from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. Hayden is worried about the current security state of her company's network so she decides to start scanning the network from an external IP address. To see how some of the hosts on her network react, she sends out SYN packets to an IP range. A number of IPs responds with a SYN/ACK response. Before the connection is established she sends RST packets to those hosts to stop the session. She does this to see how her intrusion detection system will log the traffic. What type of scan is Hayden attempting here?

  1. Hayden is attempting to find live hosts on her company's network by using an XMAS scan
  2. She is utilizing a SYN scan to find live hosts that are listening on her network
  3. The type of scan, she is using is called a NULL scan
  4. Hayden is using a half-open scan to find live hosts on her network

Answer(s): D






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts