Free CEH-001 Exam Braindumps (page: 69)

Page 68 of 220

Which of the following are valid types of rootkits? (Choose three.)

  1. Hypervisor level
  2. Network level
  3. Kernel level
  4. Application level
  5. Physical level
  6. Data access level

Answer(s): A,C,D



John the Ripper is a technical assessment tool used to test the weakness of which of the following?

  1. Usernames
  2. File permissions
  3. Firewall rulesets
  4. Passwords

Answer(s): D



A company has made the decision to host their own email and basic web services. The administrator needs to set up the external firewall to limit what protocols should be allowed to get to the public part of the company's network. Which ports should the administrator open? (Choose three.)

  1. Port 22
  2. Port 23
  3. Port 25
  4. Port 53
  5. Port 80
  6. Port 139
  7. Port 445

Answer(s): C,D,E



Which type of scan measures a person's external features through a digital video camera?

  1. Iris scan
  2. Retinal scan
  3. Facial recognition scan
  4. Signature kinetics scan

Answer(s): C






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts