00:00

QUESTION 21

- (Topic 2)
In which step Steganography fits in CEH System Hacking Cycle (SHC)

Correct Answer: E

QUESTION 22

- (Topic 5)
Which system consists of a publicly available set of databases that contain domain name registration contact information?

Correct Answer: A

QUESTION 23

- (Topic 2)
You have successfully gained access to a victim's computer using Windows 2003 Server SMB Vulnerability. Which command will you run to disable auditing from the cmd?

Correct Answer: D

QUESTION 24

- (Topic 8)
Rebecca has noted multiple entries in her logs about users attempting to connect on ports that are either not opened or ports that are not for public usage. How can she restrict this type of abuse by limiting access to only specific IP addresses that are trusted by using one of the built-in Linux Operating System tools?

Correct Answer: B
ipchains is a free software based firewall for Linux. It is a rewrite of Linux's previous IPv4 firewalling code, ipfwadm. In Linux 2.2, ipchains is required to administer the IP packet filters. ipchains was written because the older IPv4 firewall code used in Linux
2.0 did not work with IP fragments and didn't allow for specification of protocols other than TCP, UDP, and ICMP.

QUESTION 25

- (Topic 2)
Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches. If these switches' ARP cache is successfully flooded, what will be the result?

Correct Answer: A