Exam Details

  • Exam Code
    :CEH-001
  • Exam Name
    :Certified Ethical Hacker (CEH)
  • Certification
    :GAQM Certifications
  • Vendor
    :GAQM
  • Total Questions
    :878 Q&As
  • Last Updated
    :May 10, 2025

GAQM GAQM Certifications CEH-001 Questions & Answers

  • Question 161:

    How would you prevent session hijacking attacks?

    A. Using biometrics access tokens secures sessions against hijacking

    B. Using non-Internet protocols like http secures sessions against hijacking

    C. Using hardware-based authentication secures sessions against hijacking

    D. Using unpredictable sequence numbers secures sessions against hijacking

  • Question 162:

    What is Hunt used for?

    A. Hunt is used to footprint networks

    B. Hunt is used to sniff traffic

    C. Hunt is used to hack web servers

    D. Hunt is used to intercept traffic i.e. man-in-the-middle traffic

    E. Hunt is used for password cracking

  • Question 163:

    You want to carry out session hijacking on a remote server. The server and the client are communicating via TCP after a successful TCP three way handshake. The server has just received packet #120 from the client. The client has a receive window of 200 and the server has a receive window of 250.

    Within what range of sequence numbers should a packet, sent by the client fall in order to be accepted by the server?

    A. 200-250

    B. 121-371

    C. 120-321

    D. 121-231 E. 120-370

  • Question 164:

    What type of cookies can be generated while visiting different web sites on the Internet?

    A. Permanent and long term cookies.

    B. Session and permanent cookies.

    C. Session and external cookies.

    D. Cookies are all the same, there is no such thing as different type of cookies.

  • Question 165:

    Which is the right sequence of packets sent during the initial TCP three way handshake?

    A. FIN, FIN-ACK, ACK

    B. SYN, URG, ACK

    C. SYN, ACK, SYN-ACK

    D. SYN, SYN-ACK, ACK

  • Question 166:

    John is using tokens for the purpose of strong authentication. He is not confident that his security is considerably strong.

    In the context of Session hijacking why would you consider this as a false sense of security?

    A. The token based security cannot be easily defeated.

    B. The connection can be taken over after authentication.

    C. A token is not considered strong authentication.

    D. Token security is not widely used in the industry.

  • Question 167:

    What is the key advantage of Session Hijacking?

    A. It can be easily done and does not require sophisticated skills.

    B. You can take advantage of an authenticated connection.

    C. You can successfully predict the sequence number generation.

    D. You cannot be traced in case the hijack is detected.

  • Question 168:

    Eve decides to get her hands dirty and tries out a Denial of Service attack that is relatively new to her. This time she envisages using a different kind of method to attack Brownies Inc. Eve tries to forge the packets and uses the broadcast address. She launches an attack similar to that of fraggle. What is the technique that Eve used in the case above?

    A. Smurf

    B. Bubonic

    C. SYN Flood

    D. Ping of Death

  • Question 169:

    Peter is a Network Admin. He is concerned that his network is vulnerable to a smurf attack.

    What should Peter do to prevent a smurf attack?

    Select the best answer.

    A. He should disable unicast on all routers

    B. Disable multicast on the router

    C. Turn off fragmentation on his router

    D. Make sure all anti-virus protection is updated on all systems

    E. Make sure his router won't take a directed broadcast

  • Question 170:

    Henry is an attacker and wants to gain control of a system and use it to flood a target system with requests, so as to prevent legitimate users from gaining access. What type of attack is Henry using?

    A. Henry is executing commands or viewing data outside the intended target path

    B. Henry is using a denial of service attack which is a valid threat used by an attacker

    C. Henry is taking advantage of an incorrect configuration that leads to access with higher- than-expected privilege

    D. Henry uses poorly designed input validation routines to create or alter commands to gain access to unintended data or execute commands

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CEH-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.