Free CEH-001 Exam Braindumps (page: 91)

Page 90 of 220

Which command line switch would be used in NMAP to perform operating system detection?

  1. -OS
  2. -sO
  3. -sP
  4. -O

Answer(s): D



Bluetooth uses which digital modulation technique to exchange information between paired devices?

  1. PSK (phase-shift keying)
  2. FSK (frequency-shift keying)
  3. ASK (amplitude-shift keying)
  4. QAM (quadrature amplitude modulation)

Answer(s): A



A security consultant decides to use multiple layers of anti-virus defense, such as end user desktop anti-virus and E-mail gateway. This approach can be used to mitigate which kind of attack?

  1. Forensic attack
  2. ARP spoofing attack
  3. Social engineering attack
  4. Scanning attack

Answer(s): C



A security policy will be more accepted by employees if it is consistent and has the support of

  1. coworkers.
  2. executive management.
  3. the security officer.
  4. a supervisor.

Answer(s): B






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Exam Discussions & Posts