Free CEH-001 Exam Braindumps (page: 77)

Page 76 of 220

Employees in a company are no longer able to access Internet web sites on their computers. The network administrator is able to successfully ping IP address of web servers on the Internet and is able to open web sites by using an IP address in place of the URL. The administrator runs the nslookup command for www.eccouncil.org and receives an error message stating there is no response from the server. What should the administrator do next?

  1. Configure the firewall to allow traffic on TCP ports 53 and UDP port 53.
  2. Configure the firewall to allow traffic on TCP ports 80 and UDP port 443.
  3. Configure the firewall to allow traffic on TCP port 53.
  4. Configure the firewall to allow traffic on TCP port 8080.

Answer(s): A



Which initial procedure should an ethical hacker perform after being brought into an organization?

  1. Begin security testing.
  2. Turn over deliverables.
  3. Sign a formal contract with non-disclosure.
  4. Assess what the organization is trying to protect.

Answer(s): C



Which of the following guidelines or standards is associated with the credit card industry?

  1. Control Objectives for Information and Related Technology (COBIT)
  2. Sarbanes-Oxley Act (SOX)
  3. Health Insurance Portability and Accountability Act (HIPAA)
  4. Payment Card Industry Data Security Standards (PCI DSS)

Answer(s): D



An attacker has captured a target file that is encrypted with public key cryptography. Which of the attacks below is likely to be used to crack the target file?

  1. Timing attack
  2. Replay attack
  3. Memory trade-off attack
  4. Chosen plain-text attack

Answer(s): D






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Exam Discussions & Posts