CEH-001 Dumps

CEH-001 Free Practice Test

GAQM CEH-001: Certified Ethical Hacker (CEH)

QUESTION 6

- (Topic 8)
After studying the following log entries, what is the attacker ultimately trying to achieve as inferred from the log sequence?
1. mkdir -p /etc/X11/applnk/Internet/.etc
2. mkdir -p /etc/X11/applnk/Internet/.etcpasswd
3. touch -acmr /etc/passwd /etc/X11/applnk/Internet/.etcpasswd
4. touch -acmr /etc /etc/X11/applnk/Internet/.etc
5. passwd nobody -d
6. /usr/sbin/adduser dns -d/bin -u 0 -g 0 -s/bin/bash
7. passwd dns -d
8. touch -acmr /etc/X11/applnk/Internet/.etcpasswd /etc/passwd
9. touch -acmr /etc/X11/applnk/Internet/.etc /etc

Correct Answer: C

QUESTION 7

- (Topic 6)
What is the proper response for a NULL scan if the port is closed?

Correct Answer: E
Closed ports respond to a NULL scan with a reset.

QUESTION 8

- (Topic 4)
One advantage of an application-level firewall is the ability to

Correct Answer: B

QUESTION 9

- (Topic 8)
Which of the following statements best describes the term Vulnerability?

Correct Answer: A
Vulnerabilities are all weaknesses that can be exploited.

QUESTION 10

- (Topic 5)
Which of the following are variants of mandatory access control mechanisms? (Choose two.)

Correct Answer: AC