Free CPEH-001 Exam Braindumps (page: 8)

Page 7 of 220

What type of Virus is shown here?

  1. Cavity Virus
  2. Macro Virus
  3. Boot Sector Virus
  4. Metamorphic Virus
  5. Sparse Infector Virus

Answer(s): E





An attacker finds a web page for a target organization that supplies contact information for the company. Using available details to make the message seem authentic, the attacker drafts e-mail to an employee on the contact page that appears to come from an individual who might reasonably request confidential information, such as a network administrator. The email asks the employee to log into a bogus page that requests the employee's user name and password or click on a link that will download spyware or other malicious programming. Google's Gmail was hacked using this technique and attackers stole source code and sensitive data from Google servers. This is highly sophisticated attack using zero-day exploit vectors, social engineering and malware websites that focused on targeted individuals working for the company.
What is this deadly attack called?

  1. Spear phishing attack
  2. Trojan server attack
  3. Javelin attack
  4. Social networking attack

Answer(s): A



Vulnerability scanners are automated tools that are used to identify vulnerabilities and misconfigurations of hosts. They also provide information regarding mitigating discovered vulnerabilities.



Which of the following statements is incorrect?

  1. Vulnerability scanners attempt to identify vulnerabilities in the hosts scanned.
  2. Vulnerability scanners can help identify out-of-date software versions, missing patches, or system upgrades
  3. They can validate compliance with or deviations from the organization's security policy
  4. Vulnerability scanners can identify weakness and automatically fix and patch the vulnerabilities without user intervention

Answer(s): D



How does traceroute map the route a packet travels from point A to point B?

  1. Uses a TCP timestamp packet that will elicit a time exceeded in transit message
  2. Manipulates the value of the time to live (TTL) within packet to elicit a time exceeded in transit message
  3. Uses a protocol that will be rejected by gateways on its way to the destination
  4. Manipulates the flags within packets to force gateways into generating error messages

Answer(s): B

Explanation:

Traceroute works by increasing the "time-to-live" value of each successive batch of packets sent. The first three packets have a time-to-live (TTL) value of one (implying that they make a single hop). The next three packets have a TTL value of 2, and so on.
When a packet passes through a host, normally the host decrements the TTL value by one, and forwards the packet to the next host.
When a packet with a TTL of one reaches a host, the host discards the packet and sends an ICMP time exceeded (type 11) packet to the sender. The traceroute utility uses these returning packets to produce a list of hosts that the packets have traversed en route to the destination.






Post your Comments and Discuss GAQM CPEH-001 exam with other Community members:

CPEH-001 Discussions & Posts