Free CEH-001 Exam Braindumps (page: 86)

Page 85 of 220

Which types of detection methods are employed by Network Intrusion Detection Systems (NIDS)? (Choose two.)

  1. Signature
  2. Anomaly
  3. Passive
  4. Reactive

Answer(s): A,B



The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses which of the following?

  1. Multiple keys for non-repudiation of bulk data
  2. Different keys on both ends of the transport medium
  3. Bulk encryption for data transmission over fiber
  4. The same key on each end of the transmission medium

Answer(s): D



Which command lets a tester enumerate alive systems in a class C network via ICMP using native Windows tools?

  1. ping 192.168.2.
  2. ping 192.168.2.255
  3. for %V in (1 1 255) do PING 192.168.2.%V
  4. for /L %V in (1 1 254) do PING -n 1 192.168.2.%V | FIND /I "Reply"

Answer(s): D



How can telnet be used to fingerprint a web server?

  1. telnet webserverAddress 80
    HEAD / HTTP/1.0
  2. telnet webserverAddress 80
    PUT / HTTP/1.0
  3. telnet webserverAddress 80
    HEAD / HTTP/2.0
  4. telnet webserverAddress 80
    PUT / HTTP/2.0

Answer(s): A






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Exam Discussions & Posts