Free CEH-001 Exam Braindumps (page: 79)

Page 78 of 220

How is sniffing broadly categorized?

  1. Active and passive
  2. Broadcast and unicast
  3. Unmanaged and managed
  4. Filtered and unfiltered

Answer(s): A



An engineer is learning to write exploits in C++ and is using the exploit tool Backtrack. The engineer wants to compile the newest C++ exploit and name it calc.exe. Which command would the engineer use to accomplish this?

  1. g++ hackersExploit.cpp -o calc.exe
  2. g++ hackersExploit.py -o calc.exe
  3. g++ -i hackersExploit.pl -o calc.exe
  4. g++ --compile ­i hackersExploit.cpp -o calc.exe

Answer(s): A



A computer technician is using a new version of a word processing software package when it is discovered that a special sequence of characters causes the entire computer to crash. The technician researches the bug and discovers that no one else experienced the problem. What is the appropriate next step?

  1. Ignore the problem completely and let someone else deal with it.
  2. Create a document that will crash the computer when opened and send it to friends.
  3. Find an underground bulletin board and attempt to sell the bug to the highest bidder.
  4. Notify the vendor of the bug and do not disclose it until the vendor gets a chance to issue a fix.

Answer(s): D



What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a hotel room?

  1. Set a BIOS password.
  2. Encrypt the data on the hard drive.
  3. Use a strong logon password to the operating system.
  4. Back up everything on the laptop and store the backup in a safe place.

Answer(s): B






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Exam Discussions & Posts