Free CEH-001 Exam Dumps

Question 36

- (Topic 1)
In the context of password security: a simple dictionary attack involves loading a dictionary file (a text file full of dictionary words) into a cracking application such as L0phtCrack or John the Ripper, and running it against user accounts located by the application. The larger the word and word fragment selection, the more effective the dictionary attack is. The brute force method is the most inclusive - though slow. Usually, it tries every possible letter and number combination in its automated exploration. If you would use both brute force and dictionary combined together to have variations of words, what would you call such an attack?

Correct Answer:C

Question 37

- (Topic 4)
Which of the following is an advantage of utilizing security testing methodologies to conduct a security audit?

Correct Answer:A

Question 38

- (Topic 5)
Which of the following techniques will identify if computer files have been changed?

Correct Answer:C

Question 39

- (Topic 4)
What statement is true regarding LM hashes?

Correct Answer:D

Question 40

- (Topic 4)
Which type of intrusion detection system can monitor and alert on attacks, but cannot stop them?

Correct Answer:B