Free CEH-001 Exam Dumps

Question 101

- (Topic 3)
Which tool would be used to collect wireless packet data?

Correct Answer:A

Question 102

- (Topic 3)
What is the main reason the use of a stored biometric is vulnerable to an attack?

Correct Answer:D

Question 103

- (Topic 3)
A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed. Which security policy must the security analyst check to see if dial-out modems are allowed?

Correct Answer:C

Question 104

- (Topic 8)
Peter is a Linux network admin. As a knowledgeable security consultant, he turns to you to look for help on a firewall. He wants to use Linux as his firewall and use the latest freely available version that is offered. What do you recommend?
Select the best answer.

Correct Answer:B
Explanations:
Ipchains was improved over ipfwadm with its chaining mechanism so that it can have multiple rulesets. However, it isn't the latest version of a free Linux firewall. Iptables
replaced ipchains and is the latest of the free Linux firewall tools. Any Checkpoint firewall is not going to meet Jason's desire to have a free firewall. Ipfwadm is used to build Linux firewall rules prior to 2.2.0. It is a outdated version.

Question 105

- (Topic 7)
What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?

Correct Answer:E
If a rootkit is discovered, you will need to reload from known good media. This typically means performing a complete reinstall.