00:00

QUESTION 16

- (Topic 8)
All the web servers in the DMZ respond to ACK scan on port 80. Why is this happening ?

Correct Answer: D
If they used a stateful inspection firewall this firewall would know if there has been a SYN-ACK before the ACK.

QUESTION 17

- (Topic 4)
To reduce the attack surface of a system, administrators should perform which of the following processes to remove unnecessary software, services, and insecure configuration settings?

Correct Answer: C

QUESTION 18

- (Topic 1)
What type of attack is shown in the following diagram?
CEH-001 dumps exhibit

Correct Answer: A

QUESTION 19

- (Topic 7)
Samantha was hired to perform an internal security test of XYZ. She quickly realized that all networks are making use of switches instead of traditional hubs. This greatly limits her ability to gather information through network sniffing.
Which of the following techniques can she use to gather information from the switched network or to disable some of the traffic isolation features of the switch? (Choose two)

Correct Answer: BD
In a typical MAC flooding attack, a switch is flooded with packets, each containing different source MAC addresses. The intention is to consume the limited memory set aside in the switch to store the MAC address-to-physical port translation table.The result of this attack causes the switch to enter a state called failopen mode, in which all incoming packets are broadcast out on all ports (as with a hub), instead of just down the correct port as per normal operation. The principle of ARP spoofing is to send
fake, or 'spoofed', ARP messages to an Ethernet LAN. These frames contain false MAC addresses, confusing network devices, such as network switches. As a result frames intended for one machine can be mistakenly sent to another (allowing the packets to be sniffed) or an unreachable host (a denial of service attack).

QUESTION 20

- (Topic 2)
In this type of Man-in-the-Middle attack, packets and authentication tokens are captured using a sniffer. Once the relevant information is extracted, the tokens are placed back on the network to gain access.
CEH-001 dumps exhibit

Correct Answer: A