Exam Details

  • Exam Code
    :CEH-001
  • Exam Name
    :Certified Ethical Hacker (CEH)
  • Certification
    :GAQM Certifications
  • Vendor
    :GAQM
  • Total Questions
    :878 Q&As
  • Last Updated
    :May 10, 2025

GAQM GAQM Certifications CEH-001 Questions & Answers

  • Question 101:

    Jackson discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic. What authentication mechanism is being followed here?

    A. no authentication

    B. single key authentication

    C. shared key authentication

    D. open system authentication

  • Question 102:

    Jacob would like your advice on using a wireless hacking tool that can save him time and get him better results with lesser packets. You would like to recommend a tool that uses KoreK's implementation. Which tool would you recommend from the list below?

    A. Kismet

    B. Shmoo

    C. Aircrack

    D. John the Ripper

  • Question 103:

    Bob reads an article about how insecure wireless networks can be. He gets approval from his management to implement a policy of not allowing any wireless devices on the network. What other steps does Bob have to take in order to successfully implement this? (Select 2 answer.)

    A. Train users in the new policy.

    B. Disable all wireless protocols at the firewall.

    C. Disable SNMP on the network so that wireless devices cannot be configured.

    D. Continuously survey the area for wireless devices.

  • Question 104:

    Access control is often implemented through the use of MAC address filtering on wireless Access Points. Why is this considered to be a very limited security measure?

    A. Vendors MAC address assignment is published on the Internet.

    B. The MAC address is not a real random number.

    C. The MAC address is broadcasted and can be captured by a sniffer.

    D. The MAC address is used properly only on Macintosh computers.

  • Question 105:

    In order to attack a wireless network, you put up an access point and override the signal of the real access point. As users send authentication data, you are able to capture it. What kind of attack is this?

    A. Rouge access point attack

    B. Unauthorized access point attack

    C. War Chalking

    D. WEP attack

  • Question 106:

    On wireless networks, SSID is used to identify the network. Why are SSID not considered to be a good security mechanism to protect a wireless networks?

    A. The SSID is only 32 bits in length.

    B. The SSID is transmitted in clear text.

    C. The SSID is the same as the MAC address for all vendors.

    D. The SSID is to identify a station, not a network.

  • Question 107:

    802.11b is considered a ____________ protocol.

    A. Connectionless

    B. Secure

    C. Unsecure

    D. Token ring based

    E. Unreliable

  • Question 108:

    While probing an organization you discover that they have a wireless network. From your attempts to connect to the WLAN you determine that they have deployed MAC filtering by using ACL on the access points. What would be the easiest way to circumvent and communicate on the WLAN?

    A. Attempt to crack the WEP key using Airsnort.

    B. Attempt to brute force the access point and update or delete the MAC ACL.

    C. Steel a client computer and use it to access the wireless network.

    D. Sniff traffic if the WLAN and spoof your MAC address to one that you captured.

  • Question 109:

    Which of the following is true of the wireless Service Set ID (SSID)? (Select all that apply.)

    A. Identifies the wireless network

    B. Acts as a password for network access

    C. Should be left at the factory default setting

    D. Not broadcasting the SSID defeats NetStumbler and other wireless discovery tools

  • Question 110:

    Which of the following wireless technologies can be detected by NetStumbler? (Select all that apply)

    A. 802.11b

    B. 802.11e

    C. 802.11a

    D. 802.11g

    E. 802.11

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CEH-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.