Free CEH-001 Exam Braindumps (page: 56)

Page 55 of 220

Web servers are often the most targeted and attacked hosts on organizations' networks. Attackers may exploit software bugs in the Web server, underlying operating system, or active content to gain unauthorized access.


Identify the correct statement related to the above Web Server installation?

  1. Lack of proper security policy, procedures and maintenance
  2. Bugs in server software, OS and web applications
  3. Installing the server with default settings
  4. Unpatched security flaws in the server software, OS and applications

Answer(s): C



If an attacker's computer sends an IPID of 24333 to a zombie (Idle Scanning) computer on a closed port, what will be the response?

  1. The zombie computer will respond with an IPID of 24334.
  2. The zombie computer will respond with an IPID of 24333.
  3. The zombie computer will not send a response.
  4. The zombie computer will respond with an IPID of 24335.

Answer(s): A



Jacob is looking through a traffic log that was captured using Wireshark. Jacob has come across what appears to be SYN requests to an internal computer from a spoofed IP address. What is Jacob seeing here?

  1. Jacob is seeing a Smurf attack.
  2. Jacob is seeing a SYN flood.
  3. He is seeing a SYN/ACK attack.
  4. He has found evidence of an ACK flood.

Answer(s): B



Which of the following Registry location does a Trojan add entries to make it persistent on Windows 7? (Select 2 answers)

  1. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
  2. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\System32\CurrentVersion\ Run
  3. HKEY_CURRENT_USER\Software\Microsoft\Windows\System32\CurrentVersion\Run
  4. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

Answer(s): A,D






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts