Exam Details

  • Exam Code
    :CEH-001
  • Exam Name
    :Certified Ethical Hacker (CEH)
  • Certification
    :GAQM Certifications
  • Vendor
    :GAQM
  • Total Questions
    :878 Q&As
  • Last Updated
    :May 10, 2025

GAQM GAQM Certifications CEH-001 Questions & Answers

  • Question 281:

    Under what conditions does a secondary name server request a zone transfer from a primary name server?

    A. When a primary SOA is higher that a secondary SOA

    B. When a secondary SOA is higher that a primary SOA

    C. When a primary name server has had its service restarted

    D. When a secondary name server has had its service restarted

    E. When the TTL falls to zero

  • Question 282:

    What is the proper response for a NULL scan if the port is closed?

    A. SYN

    B. ACK

    C. FIN

    D. PSH

    E. RST

    F. No response

  • Question 283:

    One of your team members has asked you to analyze the following SOA record. What is the TTL?

    Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600

    3600 604800 2400.

    A. 200303028

    B. 3600

    C. 604800

    D. 2400

    E. 60

    F. 4800

  • Question 284:

    What is the following command used for?

    net use \targetipc$ "" /u:""

    A. Grabbing the etc/passwd file

    B. Grabbing the SAM

    C. Connecting to a Linux computer through Samba.

    D. This command is used to connect as a null session

    E. Enumeration of Cisco routers

  • Question 285:

    Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool "SIDExtractor". Here is the output of the SIDs:

    From the above list identify the user account with System Administrator privileges.

    A. John

    B. Rebecca

    C. Sheela

    D. Shawn

    E. Somia

    F. Chang

    G. Micah

  • Question 286:

    Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"?

    A. Overloading Port Address Translation

    B. Dynamic Port Address Translation

    C. Dynamic Network Address Translation

    D. Static Network Address Translation

  • Question 287:

    Bob is acknowledged as a hacker of repute and is popular among visitors of "underground" sites. Bob is willing to share his knowledge with those who are willing to learn, and many have expressed their interest in learning from him. However, this knowledge has a risk associated with it, as it can be used for malevolent attacks as well.

    In this context, what would be the most affective method to bridge the knowledge gap between the "black" hats or crackers and the "white" hats or computer security professionals? (Choose the test answer)

    A. Educate everyone with books, articles and training on risk analysis, vulnerabilities and safeguards.

    B. Hire more computer security monitoring personnel to monitor computer systems and networks.

    C. Make obtaining either a computer security certification or accreditation easier to achieve so more individuals feel that they are a part of something larger than life.

    D. Train more National Guard and reservist in the art of computer security to help out in times of emergency or crises.

  • Question 288:

    Sandra has been actively scanning the client network on which she is doing a vulnerability assessment test. While conducting a port scan she notices open ports in the range of 135 to 139. What protocol is most likely to be listening on those ports?

    A. Finger

    B. FTP

    C. Samba

    D. SMB

  • Question 289:

    SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long been used by hackers to gather great amount of information about remote hosts.

    Which of the following features makes this possible? (Choose two)

    A. It used TCP as the underlying protocol.

    B. It uses community string that is transmitted in clear text.

    C. It is susceptible to sniffing.

    D. It is used by all network devices on the market.

  • Question 290:

    Study the log below and identify the scan type.

    A. nmap -sR 192.168.1.10

    B. nmap -sS 192.168.1.10

    C. nmap -sV 192.168.1.10

    D. nmap -sO -T 192.168.1.10

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CEH-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.