Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

Full Access GAQM CEH-001 Tutorials

Page: 25 / 32
Question 100

In which step Steganography fits in CEH System Hacking Cycle (SHC)

Options:

A.

Step 2: Crack the password

B.

Step 1: Enumerate users

C.

Step 3: Escalate privileges

D.

Step 4: Execute applications

E.

Step 5: Hide files

F.

Step 6: Cover your tracks

Question 101

LAN Manager Passwords are concatenated to 14 bytes, and split in half. The two halves are hashed individually. If the password is 7 characters or less, than the second half of the hash is always:

Options:

A.

0xAAD3B435B51404EE

B.

0xAAD3B435B51404AA

C.

0xAAD3B435B51404BB

D.

0xAAD3B435B51404CC

Question 102

An Attacker creates a zuckerjournals.com website by copying and mirroring HACKERJOURNALS.COM site to spread the news that Hollywood actor Jason Jenkins died in a car accident. The attacker then submits his fake site for indexing in major search engines. When users search for "Jason Jenkins", attacker's fake site shows up and dupes victims by the fake news.

This is another great example that some people do not know what URL's are. Real website:

Fake website:

The website is clearly not WWW.HACKERJOURNALS.COM. It is obvious for many, but unfortunately some people still do not know what an URL is. It's the address that you enter into the address bar at the top your browser and this is clearly not legit site, its

How would you verify if a website is authentic or not?

Options:

A.

Visit the site using secure HTTPS protocol and check the SSL certificate for authenticity

B.

Navigate to the site by visiting various blogs and forums for authentic links

C.

Enable Cache on your browser and lookout for error message warning on the screen

D.

Visit the site by clicking on a link from Google search engine

Question 103

A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?

Options:

A.

Perform a vulnerability scan of the system.

B.

Determine the impact of enabling the audit feature.

C.

Perform a cost/benefit analysis of the audit feature.

D.

Allocate funds for staffing of audit log review.

Page: 25 / 32
Exam Code: CEH-001
Exam Name: Certified Ethical Hacker (CEH)
Last Update: Nov 7, 2024
Questions: 878
CEH-001 pdf

CEH-001 PDF

$28  $80
CEH-001 Engine

CEH-001 Testing Engine

$33.25  $95
CEH-001 PDF + Engine

CEH-001 PDF + Testing Engine

$45.5  $130