Free CEH-001 Exam Braindumps (page: 63)

Page 62 of 220

Trojan horse attacks pose one of the most serious threats to computer security. The image below shows different ways a Trojan can get into a system. Which are the easiest and most convincing ways to infect a computer?

  1. IRC (Internet Relay Chat)
  2. Legitimate "shrink-wrapped" software packaged by a disgruntled employee
  3. NetBIOS (File Sharing)
  4. Downloading files, games and screensavers from Internet sites

Answer(s): B



SSL has been seen as the solution to a lot of common security problems. Administrator will often time make use of SSL to encrypt communications from points A to point B. Why do you think this could be a bad idea if there is an Intrusion Detection System deployed to monitor the traffic between point A and B?

  1. SSL is redundant if you already have IDS's in place
  2. SSL will trigger rules at regular interval and force the administrator to turn them off
  3. SSL will slow down the IDS while it is breaking the encryption to see the packet content
  4. SSL will blind the content of the packet and Intrusion Detection Systems will not be able to detect them

Answer(s): D



Jake is a network administrator who needs to get reports from all the computer and network devices on his network. Jake wants to use SNMP but is afraid that won't be secure since passwords and messages are in clear text. How can Jake gather network information in a secure manner?

  1. He can use SNMPv3
  2. Jake can use SNMPrev5
  3. He can use SecWMI
  4. Jake can use SecSNMP

Answer(s): A



June, a security analyst, understands that a polymorphic virus has the ability to mutate and can change its known viral signature and hide from signature-based antivirus programs. Can June use an antivirus program in this case and would it be effective against a polymorphic virus?

  1. Yes. June can use an antivirus program since it compares the parity bit of executable files to the database of known check sum counts and it is effective on a polymorphic virus
  2. Yes. June can use an antivirus program since it compares the signatures of executable files to the database of known viral signatures and it is very effective against a polymorphic virus
  3. No. June can't use an antivirus program since it compares the signatures of executable files to the database of known viral signatures and in the case the polymorphic viruses cannot be detected by a signature-based anti-virus program
  4. No. June can't use an antivirus program since it compares the size of executable files to the database of known viral signatures and it is effective on a polymorphic virus

Answer(s): C






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts