Question 115

- (Topic 5)
Which system consists of a publicly available set of databases that contain domain name registration contact information?

Correct Answer:A

Question 116

- (Topic 5)
An NMAP scan of a server shows port 69 is open. What risk could this pose?

Correct Answer:A

Question 117

- (Topic 3)
Which tool would be used to collect wireless packet data?

Correct Answer:A

Question 118

- (Topic 5)
What are the three types of compliance that the Open Source Security Testing Methodology Manual (OSSTMM) recognizes?

Correct Answer:D

Question 119

- (Topic 8)
What is Hunt used for?

Correct Answer:D
Hunt can be used to intercept traffic. It is useful with telnet, ftp, and others to grab traffic between two computers or to hijack sessions.

Question 120

- (Topic 3)
After a client sends a connection request (SYN) packet to the server, the server will respond (SYN-ACK) with a sequence number of its choosing, which then must be acknowledged (ACK) by the client. This sequence number is predictable; the attack connects to a service first with its own IP address, records the sequence number chosen, and then opens a second connection from a forged IP address. The attack doesn't see the SYN-ACK (or any other packet) from the server, but can guess the correct responses. If the source IP address is used for authentication, then the attacker can use the one-sided communication to break into the server. What attacks can you successfully launch against a server using the above technique?

Correct Answer:B

START CEH-001 EXAM