- (Topic 19)
SSL has been seen as the solution to several common security problems. Administrators will often make use of SSL to encrypt communication from point A to point B. Why do you think this could be a bad idea if there is an Intrusion Detection System deployed to monitor the traffic between point A and B?
Correct Answer:
D
Because the traffic is encrypted, an IDS cannot understand it or evaluate the payload.
- (Topic 4)
Under what conditions does a secondary name server request a zone transfer from a primary name server?
Correct Answer:
A
Understanding DNS is critical to meeting the requirements of the CEH. When the serial number that is within the SOA record of the primary server is higher than the Serial number within the SOA record of the secondary DNS server, a zone transfer will take place.
- (Topic 3)
War dialing is a very old attack and depicted in movies that were made years ago. Why would a modem security tester consider using such an old technique?
Correct Answer:
B
If you are lucky and find a modem that answers and is connected to the target network, it usually is less protected (as only employees are supposed to know of its existence) and once connected you don’t need to take evasive actions towards any firewalls or IDS.
- (Topic 23)
If you receive a RST packet while doing an ACK scan, it indicates that the port is open.(True/False).
Correct Answer:
A
When and ACK is sent to an open port, a RST is returned.
- (Topic 23)
Which type of password cracking technique works like dictionary attack but adds some numbers and symbols to the words from the dictionary and tries to crack the password?
Correct Answer:
C