Free CEH-001 Exam Braindumps (page: 60)

Page 59 of 220

Harold just got home from working at Henderson LLC where he works as an IT technician. He was able to get off early because they were not too busy. When he walks into his home office, he notices his teenage daughter on the computer, apparently chatting with someone online. As soon as she hears Harold enter the room, she closes all her windows and tries to act like she was playing a game. When Harold asks her what she was doing, she acts very nervous and does not give him a straight answer. Harold is very concerned because he does not want his daughter to fall victim to online predators and the sort. Harold doesn't necessarily want to install any programs that will restrict the sites his daughter goes to, because he doesn't want to alert her to his trying to figure out what she is doing. Harold wants to use some kind of program that will track her activities online, and send Harold an email of her activity once a day so he can see what she has been up to. What kind of software could Harold use to accomplish this?

  1. Install hardware Keylogger on her computer
  2. Install screen capturing Spyware on her computer
  3. Enable Remote Desktop on her computer
  4. Install VNC on her computer

Answer(s): B



You are performing a port scan with nmap. You are in hurry and conducting the scans at the fastest possible speed. However, you don't want to sacrifice reliability for speed. If stealth is not an issue, what type of scan should you run to get very reliable results?

  1. Stealth scan
  2. Connect scan
  3. Fragmented packet scan
  4. XMAS scan

Answer(s): B



Blane is a security analyst for a law firm. One of the lawyers needs to send out an email to a client but he wants to know if the email is forwarded on to any other recipients. The client is explicitly asked not to re-send the email since that would be a violation of the lawyer's and client's agreement for this particular case. What can Blane use to accomplish this?

  1. He can use a split-DNS service to ensure the email is not forwarded on.
  2. A service such as HTTrack would accomplish this.
  3. Blane could use MetaGoofil tracking tool.
  4. Blane can use a service such as ReadNotify tracking tool.

Answer(s): D



You ping a target IP to check if the host is up. You do not get a response. You suspect ICMP is blocked at the firewall. Next you use hping2 tool to ping the target host and you get a response. Why does the host respond to hping2 and not ping packet?

  1. Ping packets cannot bypass firewalls
  2. You must use ping 10.2.3.4 switch
  3. Hping2 uses stealth TCP packets to connect
  4. Hping2 uses TCP instead of ICMP by default

Answer(s): D






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts