Free CPEH-001 Exam Braindumps (page: 35)

Page 34 of 220

Which of the following Trojans would be considered 'Botnet Command Control Center'?

  1. YouKill DOOM
  2. Damen Rock
  3. Poison Ivy
  4. Matten Kit

Answer(s): C



What type of Virus is shown here?

  1. Macro Virus
  2. Cavity Virus
  3. Boot Sector Virus
  4. Metamorphic Virus
  5. Sparse Infector Virus

Answer(s): B



John is using a special tool on his Linux platform that has a database containing signatures to be able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI/ASPX scripts. Moreover, the database detects DDoS zombies and Trojans as well.
What would be the name of this tool?

  1. hping2
  2. nessus
  3. nmap
  4. make

Answer(s): B



Fred is scanning his network to ensure it is as secure as possible. Fred sends a TCP probe packet to a host with a FIN flag and he receives a RST/ACK response.
What does this mean?

  1. This response means the port he is scanning is open.
  2. The RST/ACK response means the port Fred is scanning is disabled.
  3. This means the port he is scanning is half open.
  4. This means that the port he is scanning on the host is closed.

Answer(s): D






Post your Comments and Discuss GAQM CPEH-001 exam with other Community members:

CPEH-001 Discussions & Posts