Question 7

- (Topic 5)
A pentester is using Metasploit to exploit an FTP server and pivot to a LAN. How will the pentester pivot using Metasploit?

Correct Answer:D

Question 8

- (Topic 6)
While performing ping scans into a target network you get a frantic call from the organization’s security team. They report that they are under a denial of service attack. When you stop your scan, the smurf attack event stops showing up on the organization’s IDS monitor. How can you modify your scan to prevent triggering this event in the IDS?

Correct Answer:B
Scanning the broadcast address makes the scan target all IP addresses on that subnet at the same time.

Question 9

- (Topic 5)
Which United States legislation mandates that the Chief Executive Officer (CEO) and the Chief Financial Officer (CFO) must sign statements verifying the completeness and accuracy of financial reports?

Correct Answer:A

Question 10

- (Topic 5)
Which set of access control solutions implements two-factor authentication?

Correct Answer:A

Question 11

- (Topic 5)
A newly discovered flaw in a software application would be considered which kind of security vulnerability?

Correct Answer:C

Question 12

- (Topic 3)
Bill is a security analyst for his company. All the switches used in the company's office are Cisco switches. Bill wants to make sure all switches are safe from ARP poisoning. How can Bill accomplish this?

Correct Answer:A

START CEH-001 EXAM