Free CEH-001 Exam Braindumps (page: 72)

Page 71 of 220

Which tool is used to automate SQL injections and exploit a database by forcing a given web application to connect to another database controlled by a hacker?

  1. DataThief
  2. NetCat
  3. Cain and Abel
  4. SQLInjector

Answer(s): D

Explanation:

Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a Boolean query based technique. The Mole uses a command based interface, allowing the user to indicate the action he wants to perform easily



A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed. Which security policy must the security analyst check to see if dial-out modems are allowed?

  1. Firewall-management policy
  2. Acceptable-use policy
  3. Remote-access policy
  4. Permissive policy

Answer(s): C



A company is using Windows Server 2003 for its Active Directory (AD). What is the most efficient way to crack the passwords for the AD users?

  1. Perform a dictionary attack.
  2. Perform a brute force attack.
  3. Perform an attack with a rainbow table.
  4. Perform a hybrid attack.

Answer(s): C



When an alert rule is matched in a network-based IDS like snort, the IDS does which of the following?

  1. Drops the packet and moves on to the next one
  2. Continues to evaluate the packet until all rules are checked
  3. Stops checking rules, sends an alert, and lets the packet continue
  4. Blocks the connection with the source IP address in the packet

Answer(s): B






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Discussions & Posts