Free CEH-001 Exam Braindumps (page: 68)

Page 67 of 220

A company has five different subnets: 192.168.1.0, 192.168.2.0, 192.168.3.0, 192.168.4.0 and 192.168.5.0. How can NMAP be used to scan these adjacent Class C networks?

  1. NMAP -P 192.168.1-5.
  2. NMAP -P 192.168.0.0/16
  3. NMAP -P 192.168.1.0, 2.0, 3.0, 4.0, 5.0
  4. NMAP -P 192.168.1/17

Answer(s): A



Which vital role does the U.S. Computer Security Incident Response Team (CSIRT) provide?

  1. Incident response services to any user, company, government agency, or organization in partnership with the Department of Homeland Security
  2. Maintenance of the nation's Internet infrastructure, builds out new Internet infrastructure, and decommissions old Internet infrastructure
  3. Registration of critical penetration testing for the Department of Homeland Security and public and private sectors
  4. Measurement of key vulnerability assessments on behalf of the Department of Defense (DOD) and State Department, as well as private sectors

Answer(s): A



When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?

  1. Vulnerability scanning
  2. Social engineering
  3. Application security testing
  4. Network sniffing

Answer(s): B



What is the broadcast address for the subnet 190.86.168.0/22?

  1. 190.86.168.255
  2. 190.86.255.255
  3. 190.86.171.255
  4. 190.86.169.255

Answer(s): C






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts