Exam Details

  • Exam Code
    :CEH-001
  • Exam Name
    :Certified Ethical Hacker (CEH)
  • Certification
    :GAQM Certifications
  • Vendor
    :GAQM
  • Total Questions
    :878 Q&As
  • Last Updated
    :May 10, 2025

GAQM GAQM Certifications CEH-001 Questions & Answers

  • Question 461:

    Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?

    A. Cavity virus

    B. Polymorphic virus

    C. Tunneling virus

    D. Stealth virus

  • Question 462:

    The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?

    A. An extensible security framework named COBIT

    B. A list of flaws and how to fix them

    C. Web application patches

    D. A security certification for hardened web applications

  • Question 463:

    WPA2 uses AES for wireless data encryption at which of the following encryption levels?

    A. 64 bit and CCMP

    B. 128 bit and CRC

    C. 128 bit and CCMP

    D. 128 bit and TKIP

  • Question 464:

    Which of the following network attacks relies on sending an abnormally large packet size that exceeds TCP/IP specifications?

    A. Ping of death

    B. SYN flooding

    C. TCP hijacking

    D. Smurf attack

  • Question 465:

    Which of the following levels of algorithms does Public Key Infrastructure (PKI) use?

    A. RSA 1024 bit strength

    B. AES 1024 bit strength

    C. RSA 512 bit strength

    D. AES 512 bit strength

  • Question 466:

    Which cipher encrypts the plain text digit (bit or byte) one by one?

    A. Classical cipher

    B. Block cipher

    C. Modern cipher

    D. Stream cipher

  • Question 467:

    Which of the following cryptography attack methods is usually performed without the use of a computer?

    A. Ciphertext-only attack

    B. Chosen key attack

    C. Rubber hose attack

    D. Rainbow table attack

  • Question 468:

    What technique is used to perform a Connection Stream Parameter Pollution (CSPP) attack?

    A. Injecting parameters into a connection string using semicolons as a separator

    B. Inserting malicious Javascript code into input parameters

    C. Setting a user's session identifier (SID) to an explicit known value

    D. Adding multiple parameters with the same name in HTTP requests

  • Question 469:

    Which of the following open source tools would be the best choice to scan a network for potential targets?

    A. NMAP

    B. NIKTO

    C. CAIN

    D. John the Ripper

  • Question 470:

    Which of the following is a client-server tool utilized to evade firewall inspection?

    A. tcp-over-dns

    B. kismet

    C. nikto

    D. hping

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CEH-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.