CEH-001

Practice CEH-001 Exam

Is it difficult for you to decide to purchase EC-Council CEH-001 exam dumps questions? CertQueen provides FREE online Certified Ethical Hacker (CEH) CEH-001 exam questions below, and you can test your CEH-001 skills first, and then decide whether to buy the full version or not. We promise you get the following advantages after purchasing our CEH-001 exam dumps questions.
1.Free update in ONE year from the date of your purchase.
2.Full payment fee refund if you fail CEH-001 exam with the dumps

 

 Full CEH-001 Exam Dump Here

Latest CEH-001 Exam Dumps Questions

The dumps for CEH-001 exam was last updated on Jun 12,2025 .

Viewing page 1 out of 3 pages.

Viewing questions 1 out of 18 questions

Question#1

What do you conclude from the nmap results below?
Staring nmap V. 3.10ALPHA0 (www.insecure.org/map/)
(The 1592 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
25/tcp open smtp
80/tcp open http
443/tcp open https
Remote operating system guess: Too many signatures match the reliability guess the OS. Nmap run completed C 1 IP address (1 host up) scanned in 91.66 seconds

A. The system is a Windows Domain Controller.
B. The system is not firewalled.
C. The system is not running Linux or Solaris.
D. The system is not properly patched.

Explanation:
There is no reports of any ports being filtered.

Question#2

If you receive a RST packet while doing an ACK scan, it indicates that the port is open.(True/False).

A. True
B. False

Explanation:
When and ACK is sent to an open port, a RST is returned.

Question#3

Which of the following is the best way an attacker can passively learn about technologies used in an organization?

A. By sending web bugs to key personnel
B. By webcrawling the organization web site
C. By searching regional newspapers and job databases for skill sets technology hires need to possess in the organization
D. By performing a port scan on the organization's web site

Explanation:
Note: Sending web bugs, webcrawling their site and port scanning are considered "active" attacks, the question asks "passive"

Question#4

Which of the following statements best describes the term Vulnerability?

A. A weakness or error that can lead to a compromise
B. An agent that has the potential to take advantage of a weakness
C. An action or event that might prejudice security
D. The loss potential of a threat.

Explanation:
Vulnerabilities are all weaknesses that can be exploited.

Question#5

Which of the following is not an effective countermeasure against replay attacks?

A. Digital signatures
B. Time Stamps
C. System identification
D. Sequence numbers

Explanation:
A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. Effective countermeasures should be anything that makes it hard to delay or replay the packet (time stamps and sequence numbers) or anything that prove the package is received as it was sent from the original sender (digital signature)

Exam Code: CEH-001         Q & A: 878 Q&As         Updated:  Jun 12,2025

 

 Full CEH-001 Exam Dumps Here