Free CEH-001 Exam Braindumps (page: 92)

Page 91 of 220

There is a WEP encrypted wireless access point (AP) with no clients connected. In order to crack the WEP key, a fake authentication needs to be performed. What information is needed when performing fake authentication to an AP? (Choose two.)

  1. The IP address of the AP
  2. The MAC address of the AP
  3. The SSID of the wireless network
  4. A failed authentication packet

Answer(s): B,C



What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the received response?

  1. Passive
  2. Reflective
  3. Active
  4. Distributive

Answer(s): C



How do employers protect assets with security policies pertaining to employee surveillance activities?

  1. Employers promote monitoring activities of employees as long as the employees demonstrate trustworthiness.
  2. Employers use informal verbal communication channels to explain employee monitoring activities to employees.
  3. Employers use network surveillance to monitor employee email traffic, network access, and to record employee keystrokes.
  4. Employers provide employees written statements that clearly discuss the boundaries of monitoring activities and consequences.

Answer(s): D



When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's computer to update the router configuration. What type of an alert is this?

  1. False positive
  2. False negative
  3. True positve
  4. True negative

Answer(s): A






Post your Comments and Discuss GAQM CEH-001 exam with other Community members:

CEH-001 Exam Discussions & Posts