Weekend Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: get65

GAQM Updated CEH-001 Exam Questions and Answers by carson

Page: 13 / 32

GAQM CEH-001 Exam Overview :

Exam Name: Certified Ethical Hacker (CEH)
Exam Code: CEH-001 Dumps
Vendor: GAQM Certification: Certified Ethical Hacker CEH
Questions: 878 Q&A's Shared By: carson
Question 52

What type of Virus is shown here?

Questions 52

Options:

A.

Macro Virus

B.

Cavity Virus

C.

Boot Sector Virus

D.

Metamorphic Virus

E.

Sparse Infector Virus

Discussion
Esmae
I highly recommend Cramkey Dumps to anyone preparing for the certification exam.
Mollie Jul 20, 2025
Absolutely. They really make it easier to study and retain all the important information. I'm so glad I found Cramkey Dumps.
Marley
Hey, I heard the good news. I passed the certification exam!
Jaxson Jul 13, 2025
Yes, I passed too! And I have to say, I couldn't have done it without Cramkey Dumps.
Walter
Yayyy!!! I passed my exam with the help of Cramkey Dumps. Highly appreciated!!!!
Angus Jul 17, 2025
YES….. I saw the same questions in the exam.
Peyton
Hey guys. Guess what? I passed my exam. Thanks a lot Cramkey, your provided information was relevant and reliable.
Coby Jul 13, 2025
Thanks for sharing your experience. I think I'll give Cramkey a try for my next exam.
Honey
I highly recommend it. They made a big difference for me and I'm sure they'll help you too. Just make sure to use them wisely and not solely rely on them. They should be used as a supplement to your regular studies.
Antoni Jul 26, 2025
Good point. Thanks for the advice. I'll definitely keep that in mind.
Question 53

Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches. If these switches' ARP cache is successfully flooded, what will be the result?

Options:

A.

The switches will drop into hub mode if the ARP cache is successfully flooded.

B.

If the ARP cache is flooded, the switches will drop into pix mode making it less susceptible to attacks.

C.

Depending on the switch manufacturer, the device will either delete every entry in its ARP cache or reroute packets to the nearest switch.

D.

The switches will route all traffic to the broadcast address created collisions.

Discussion
Question 54

Bob was frustrated with his competitor, Brownies Inc., and decided to launch an attack that would result in serious financial losses. He planned the attack carefully and carried out the attack at the appropriate moment.

Meanwhile, Trent, an administrator at Brownies Inc., realized that their main financial transaction server had been attacked. As a result of the attack, the server crashed and Trent needed to reboot the system, as no one was able to access the resources of the company. This process involves human interaction to fix it.

What kind of Denial of Service attack was best illustrated in the scenario above?

Options:

A.

Simple DDoS attack

B.

DoS attacks which involves flooding a network or system

C.

DoS attacks which involves crashing a network or system

D.

DoS attacks which is done accidentally or deliberately

Discussion
Question 55

When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK. How would an attacker exploit this design by launching TCP SYN attack?

Options:

A.

Attacker generates TCP SYN packets with random destination addresses towards a victim host

B.

Attacker floods TCP SYN packets with random source addresses towards a victim host

C.

Attacker generates TCP ACK packets with random source addresses towards a victim host

D.

Attacker generates TCP RST packets with random source addresses towards a victim host

Discussion
Page: 13 / 32
Title
Questions
Posted

CEH-001
PDF

$36.75  $104.99

CEH-001 Testing Engine

$43.75  $124.99

CEH-001 PDF + Testing Engine

$57.75  $164.99