Free CEH-001 Exam Braindumps (page: 89)

Page 88 of 220

Which of the following tools will scan a network to perform vulnerability checks and compliance auditing?

  1. NMAP
  2. Metasploit
  3. Nessus
  4. BeEF

Answer(s): C



The use of technologies like IPSec can help guarantee the followinG. authenticity, integrity, confidentiality and

  1. non-repudiation.
  2. operability.
  3. security.
  4. usability.

Answer(s): A



A security administrator notices that the log file of the company`s webserver contains suspicious entries:

Based on source code analysis, the analyst concludes that the login.php script is vulnerable to

  1. command injection.
  2. SQL injection.
  3. directory traversal.
  4. LDAP injection.

Answer(s): B



Which of the following is a detective control?

  1. Smart card authentication
  2. Security policy
  3. Audit trail
  4. Continuity of operations plan

Answer(s): C






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Exam Discussions & Posts