00:00

QUESTION 1

- (Topic 8)
Steven the hacker realizes that the network administrator of XYZ is using syskey to protect organization resources in the Windows 2000 Server. Syskey independently encrypts the hashes so that physical access to the server, tapes, or ERDs is only first step to cracking the passwords. Steven must break through the encryption used by syskey before he can attempt to brute force dictionary attacks on the hashes. Steven runs a program called “SysCracker” targeting the Windows 2000 Server machine in attempting to crack the hash used by Syskey. He needs to configure the encryption level before he can launch attach.
How many bits does Syskey use for encryption?

Correct Answer: D
SYSKEY is a utility that encrypts the hashed password information in a SAM database using a 128-bit encryption key.

QUESTION 2

- (Topic 5)
What are the three types of authentication?

Correct Answer: B

QUESTION 3

- (Topic 3)
Simon is security analyst writing signatures for a Snort node he placed internally that captures all mirrored traffic from his border firewall. From the following signature, what will Snort look for in the payload of the suspected packets?
alert tcp $EXTERNAL_NET any -> $HOME_NET 27374 (msG. "BACKDOOR SIG -
SubSseven 22";flags: A+; content: "|0d0a5b52504c5d3030320d0a|"; reference:arachnids, 485;) alert

Correct Answer: B

QUESTION 4

- (Topic 7)
What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?

Correct Answer: E
If a rootkit is discovered, you will need to reload from known good media. This typically means performing a complete reinstall.

QUESTION 5

- (Topic 2)
You are programming a buffer overflow exploit and you want to create a NOP sled of 200 bytes in the program exploit.c
CEH-001 dumps exhibit
What is the hexadecimal value of NOP instruction?

Correct Answer: D