CEH-001 Dumps

CEH-001 Free Practice Test

GAQM CEH-001: Certified Ethical Hacker (CEH)

QUESTION 21

- (Topic 6)
What port scanning method is the most reliable but also the most detectable?

Correct Answer: B
A TCP Connect scan, named after the Unix connect() system call is the most accurate scanning method. If a port is open the operating system completes the TCP three- way handshake, and the port scanner immediately closes the connection.

QUESTION 22

- (Topic 7)
A POP3 client contacts the POP3 server:

Correct Answer: B
POP is used to receive e-mail. SMTP is used to send e-mail.

QUESTION 23

- (Topic 6)
You are manually conducting Idle Scanning using Hping2. During your scanning you notice that almost every query increments the IPID regardless of the port being queried. One or two of the queries cause the IPID to increment by more than one value. Why do you think this occurs?

Correct Answer: A
If the IPID is incremented by more than the normal increment for this type of system it means that the system is interacting with some other system beside yours and has sent packets to an unknown host between the packets destined for you.

QUESTION 24

- (Topic 5)
A hacker is attempting to see which ports have been left open on a network. Which NMAP switch would the hacker use?

Correct Answer: A

QUESTION 25

- (Topic 8)
Exhibit:
<>

Correct Answer: D
The attacker submits a PASS to the honeypot and receives a login incorrect before disconnecting.