Free CEH-001 Exam Braindumps (page: 78)

Page 77 of 220

Which tool can be used to silently copy files from USB devices?

  1. USB Grabber
  2. USB Dumper
  3. USB Sniffer
  4. USB Snoopy

Answer(s): B



How can a rootkit bypass Windows 7 operating system's kernel mode, code signing policy?

  1. Defeating the scanner from detecting any code change at the kernel
  2. Replacing patch system calls with its own version that hides the rootkit (attacker's) actions
  3. Performing common services for the application process and replacing real applications with fake ones
  4. Attaching itself to the master boot record in a hard drive and changing the machine's boot sequence/options

Answer(s): D



A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?

  1. Perform a vulnerability scan of the system.
  2. Determine the impact of enabling the audit feature.
  3. Perform a cost/benefit analysis of the audit feature.
  4. Allocate funds for staffing of audit log review.

Answer(s): B



A consultant has been hired by the V.P. of a large financial organization to assess the company's security posture. During the security testing, the consultant comes across child pornography on the V.P.'s computer. What is the consultant's obligation to the financial organization?

  1. Say nothing and continue with the security testing.
  2. Stop work immediately and contact the authorities.
  3. Delete the pornography, say nothing, and continue security testing.
  4. Bring the discovery to the financial organization's human resource department.

Answer(s): B






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Exam Discussions & Posts