CEH-001 Dumps

CEH-001 Free Practice Test

GAQM CEH-001: Certified Ethical Hacker (CEH)

QUESTION 1

- (Topic 1)
Attacking well-known system defaults is one of the most common hacker attacks. Most software is shipped with a default configuration that makes it easy to install and setup the application. You should change the default settings to secure the system.
Which of the following is NOT an example of default installation?

Correct Answer: D

QUESTION 2

- (Topic 8)
You visit a website to retrieve the listing of a company's staff members. But you can not find it on the website. You know the listing was certainly present one year before. How can you retrieve information from the outdated website?

Correct Answer: B
Archive.org mirrors websites and categorizes them by date and month depending on the crawl time. Archive.org dates back to 1996, Google is incorrect because the cache is only as recent as the latest crawl, the cache is over-written on each subsequent crawl. Download the website is incorrect becausethat\'s the same as what you see online. Visiting customer partners websites is just bogus. The answer is then Firmly, C, archive.org

QUESTION 3

- (Topic 2)
You have successfully gained access to a victim's computer using Windows 2003 Server SMB Vulnerability. Which command will you run to disable auditing from the cmd?

Correct Answer: D

QUESTION 4

- (Topic 7)
Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?

Correct Answer: D
Sending a bogus email is one way to find out more about internal servers. Also, to gather additional IP addresses and learn how they treat mail.

QUESTION 5

- (Topic 8)
Jane has just accessed her preferred e-commerce web site and she has seen an item she would like to buy. Jane considers the price a bit too steep; she looks at the page source code and decides to save the page locally to modify some of the page variables. In the context of web application security, what do you think Jane has changed?

Correct Answer: C
Changing hidden form values is possible when a web site is poorly built and is trusting the visitors computer to submit vital data, like the price of a product, to the database.