Exam Details

  • Exam Code
    :CEH-001
  • Exam Name
    :Certified Ethical Hacker (CEH)
  • Certification
    :GAQM Certifications
  • Vendor
    :GAQM
  • Total Questions
    :878 Q&As
  • Last Updated
    :May 10, 2025

GAQM GAQM Certifications CEH-001 Questions & Answers

  • Question 111:

    Which of the following is NOT a reason 802.11 WEP encryption is vulnerable?

    A. There is no mutual authentication between wireless clients and access points

    B. Automated tools like AirSnort are available to discover WEP keys

    C. The standard does not provide for centralized key management

    D. The 24 bit Initialization Vector (IV) field is too small

  • Question 112:

    In an attempt to secure his wireless network, Bob turns off broadcasting of the SSID. He concludes that since his access points require the client computer to have the proper SSID, it would prevent others from connecting to the wireless

    network. Unfortunately unauthorized users are still able to connect to the wireless network.

    Why do you think this is possible?

    A. Bob forgot to turn off DHCP.

    B. All access points are shipped with a default SSID.

    C. The SSID is still sent inside both client and AP packets.

    D. Bob's solution only works in ad-hoc mode.

  • Question 113:

    In an attempt to secure his 802.11b wireless network, Ulf decides to use a strategic antenna positioning. He places the antenna for the access points near the center of the building. For those access points near the outer edge of the building he uses semi- directional antennas that face towards the building's center. There is a large parking lot and outlying filed surrounding the building that extends out half a mile around the building. Ulf figures that with this and his placement of antennas, his wireless network will be safe from attack.

    Which of the following statements is true?

    A. With the 300 feet limit of a wireless signal, Ulf's network is safe.

    B. Wireless signals can be detected from miles away, Ulf's network is not safe.

    C. Ulf's network will be safe but only of he doesn't switch to 802.11a.

    D. Ulf's network will not be safe until he also enables WEP.

  • Question 114:

    In an attempt to secure his wireless network, Bob implements a VPN to cover the wireless communications. Immediately after the implementation, users begin complaining about how slow the wireless network is. After benchmarking the network's speed. Bob discovers that throughput has dropped by almost half even though the number of users has remained the same.

    Why does this happen in the VPN over wireless implementation?

    A. The stronger encryption used by the VPN slows down the network.

    B. Using a VPN with wireless doubles the overhead on an access point for all direct client to access point communications.

    C. VPNs use larger packets then wireless networks normally do.

    D. Using a VPN on wireless automatically enables WEP, which causes additional overhead.

  • Question 115:

    RC4 is known to be a good stream generator. RC4 is used within the WEP standard on wireless LAN. WEP is known to be insecure even if we are using a stream cipher that is known to be secured.

    What is the most likely cause behind this?

    A. There are some flaws in the implementation.

    B. There is no key management.

    C. The IV range is too small.

    D. All of the above.

    E. None of the above.

  • Question 116:

    WEP is used on 802.11 networks, what was it designed for?

    A. WEP is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what it usually expected of a wired LAN.

    B. WEP is designed to provide strong encryption to a wireless local area network (WLAN) with a lever of integrity and privacy adequate for sensible but unclassified information.

    C. WEP is designed to provide a wireless local area network (WLAN) with a level of availability and privacy comparable to what is usually expected of a wired LAN.

    D. WEOP is designed to provide a wireless local area network (WLAN) with a level of privacy comparable to what it usually expected of a wired LAN.

  • Question 117:

    Sandra is conducting a penetration test for XYZ.com. She knows that XYZ.com is using wireless networking for some of the offices in the building right down the street. Through social engineering she discovers that they are using 802.11g. Sandra knows that 802.11g uses the same 2.4GHz frequency range as 802.11b. Using NetStumbler and her 802.11b wireless NIC, Sandra drives over to the building to map the wireless networks. However, even though she repositions herself around the building several times, Sandra is not able to detect a single AP.

    What do you think is the reason behind this?

    A. Netstumbler does not work against 802.11g.

    B. You can only pick up 802.11g signals with 802.11a wireless cards.

    C. The access points probably have WEP enabled so they cannot be detected.

    D. The access points probably have disabled broadcasting of the SSID so they cannot be detected.

    E. 802.11g uses OFDM while 802.11b uses DSSS so despite the same frequency and 802.11b card cannot see an 802.11g signal.

    F. Sandra must be doing something wrong, as there is no reason for her to not see the signals.

  • Question 118:

    Look at the following SQL query.

    SELECT * FROM product WHERE PCategory='computers' or 1=1--' What will it return? Select the best answer.

    A. All computers and all 1's

    B. All computers

    C. All computers and everything else

    D. Everything except computers

  • Question 119:

    Your boss Tess King is attempting to modify the parameters of a Web-based application in order to alter the SQL statements that are parsed to retrieve data from the database. What would you call such an attack?

    A. SQL Input attack

    B. SQL Piggybacking attack

    C. SQL Select attack

    D. SQL Injection attack

  • Question 120:

    When a malicious hacker identifies a target and wants to eventually compromise this target, what would be among the first steps that he would perform? (Choose the best answer)

    A. Cover his tracks by eradicating the log files and audit trails.

    B. Gain access to the remote computer in order to conceal the venue of attacks.

    C. Perform a reconnaissance of the remote target for identical of venue of attacks.

    D. Always begin with a scan in order to quickly identify venue of attacks.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CEH-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.