Exam Details

  • Exam Code
    :CEH-001
  • Exam Name
    :Certified Ethical Hacker (CEH)
  • Certification
    :GAQM Certifications
  • Vendor
    :GAQM
  • Total Questions
    :878 Q&As
  • Last Updated
    :May 10, 2025

GAQM GAQM Certifications CEH-001 Questions & Answers

  • Question 471:

    Which of the following is a symmetric cryptographic standard?

    A. DSA

    B. PKI

    C. RSA

    D. 3DES

  • Question 472:

    Which of the following is a primary service of the U.S. Computer Security Incident Response Team (CSIRT)?

    A. CSIRT provides an incident response service to enable a reliable and trusted single point of contact for reporting computer security incidents worldwide.

    B. CSIRT provides a computer security surveillance service to supply a government with important intelligence information on individuals travelling abroad.

    C. CSIRT provides a penetration testing service to support exception reporting on incidents worldwide by individuals and multi-national corporations.

    D. CSIRT provides a vulnerability assessment service to assist law enforcement agencies with profiling an individual's property or company's asset.

  • Question 473:

    What is the best defense against privilege escalation vulnerability?

    A. Patch systems regularly and upgrade interactive login privileges at the system administrator level.

    B. Run administrator and applications on least privileges and use a content registry for tracking.

    C. Run services with least privileged accounts and implement multi-factor authentication and authorization.

    D. Review user roles and administrator privileges for maximum utilization of automation services.

  • Question 474:

    Fingerprinting VPN firewalls is possible with which of the following tools?

    A. Angry IP

    B. Nikto

    C. Ike-scan

    D. Arp-scan

  • Question 475:

    A company has publicly hosted web applications and an internal Intranet protected by a firewall. Which technique will help protect against enumeration?

    A. Reject all invalid email received via SMTP.

    B. Allow full DNS zone transfers.

    C. Remove A records for internal hosts.

    D. Enable null session pipes.

  • Question 476:

    Company A and Company B have just merged and each has its own Public Key Infrastructure (PKI). What must the Certificate Authorities (CAs) establish so that the private PKIs for Company A and Company B trust one another and each private PKI can validate digital certificates from the other company?

    A. Poly key exchange

    B. Cross certification

    C. Poly key reference

    D. Cross-site exchange

  • Question 477:

    Which of the following algorithms provides better protection against brute force attacks by using a 160-bit message digest?

    A. MD5

    B. SHA-1

    C. RC4

    D. MD4

  • Question 478:

    In keeping with the best practices of layered security, where are the best places to place intrusion detection/intrusion prevention systems? (Choose two.)

    A. HID/HIP (Host-based Intrusion Detection/Host-based Intrusion Prevention)

    B. NID/NIP (Node-based Intrusion Detection/Node-based Intrusion Prevention)

    C. NID/NIP (Network-based Intrusion Detection/Network-based Intrusion Prevention)

    D. CID/CIP (Computer-based Intrusion Detection/Computer-based Intrusion Prevention)

  • Question 479:

    What is one thing a tester can do to ensure that the software is trusted and is not changing or tampering with critical data on the back end of a system it is loaded on?

    A. Proper testing

    B. Secure coding principles

    C. Systems security and architecture review

    D. Analysis of interrupts within the software

  • Question 480:

    A developer for a company is tasked with creating a program that will allow customers to update their billing and shipping information. The billing address field used is limited to 50 characters. What pseudo code would the developer use to avoid a buffer overflow attack on the billing address field?

    A. if (billingAddress = 50) {update field} else exit

    B. if (billingAddress != 50) {update field} else exit

    C. if (billingAddress >= 50) {update field} else exit

    D. if (billingAddress <= 50) {update field} else exit

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CEH-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.