Free CEH-001 Exam Braindumps (page: 83)

Page 82 of 220

Which of the following programs is usually targeted at Microsoft Office products?

  1. Polymorphic virus
  2. Multipart virus
  3. Macro virus
  4. Stealth virus

Answer(s): C



What is the main difference between a "Normal" SQL Injection and a "Blind" SQL Injection vulnerability?

  1. The request to the web server is not visible to the administrator of the vulnerable application.
  2. The attack is called "Blind" because, although the application properly filters user input, it is still vulnerable to code injection.
  3. The successful attack does not show an error message to the administrator of the affected application.
  4. The vulnerable application does not display errors with information about the injection results to the attacker.

Answer(s): D



Which of the following ensures that updates to policies, procedures, and configurations are made in a controlled and documented fashion?

  1. Regulatory compliance
  2. Peer review
  3. Change management
  4. Penetration testing

Answer(s): C



Data hiding analysis can be useful in

  1. determining the level of encryption used to encrypt the data.
  2. detecting and recovering data that may indicate knowledge, ownership or intent.
  3. identifying the amount of central processing unit (cpu) usage over time to process the data.
  4. preventing a denial of service attack on a set of enterprise servers to prevent users from accessing the data.

Answer(s): B






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Exam Discussions & Posts