Exam Details

  • Exam Code
    :CEH-001
  • Exam Name
    :Certified Ethical Hacker (CEH)
  • Certification
    :GAQM Certifications
  • Vendor
    :GAQM
  • Total Questions
    :878 Q&As
  • Last Updated
    :May 10, 2025

GAQM GAQM Certifications CEH-001 Questions & Answers

  • Question 501:

    While conducting a penetration test, the tester determines that there is a firewall between the tester's machine and the target machine. The firewall is only monitoring TCP handshaking of packets at the session layer of the OSI model. Which type of firewall is the tester trying to traverse?

    A. Packet filtering firewall

    B. Application-level firewall

    C. Circuit-level gateway firewall

    D. Stateful multilayer inspection firewall

  • Question 502:

    A Security Engineer at a medium-sized accounting firm has been tasked with discovering how much information can be obtained from the firm's public facing web servers. The engineer decides to start by using netcat to port 80.

    The engineer receives this output:

    HTTP/1.1 200 OK

    Server: Microsoft-IIS/6

    Expires: Tue, 17 Jan 2011 01:41:33 GMT

    DatE. Mon, 16 Jan 2011 01:41:33 GMT

    Content-TypE. text/html Accept-Ranges: bytes Last-ModifieD. Wed, 28 Dec 2010 15:32:21 GMT ETaG. "b0aac0542e25c31:89d" Content-Length: 7369 Which of the following is an example of what the engineer performed?

    A. Cross-site scripting

    B. Banner grabbing

    C. SQL injection

    D. Whois database query

  • Question 503:

    To send a PGP encrypted message, which piece of information from the recipient must the sender have before encrypting the message?

    A. Recipient's private key

    B. Recipient's public key

    C. Master encryption key

    D. Sender's public key

  • Question 504:

    An attacker has been successfully modifying the purchase price of items purchased on the company's web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the Intrusion Detection System (IDS) logs and found no attacks that could have caused this. What is the mostly likely way the attacker has been able to modify the purchase price?

    A. By using SQL injection

    B. By changing hidden form values

    C. By using cross site scripting

    D. By utilizing a buffer overflow attack

  • Question 505:

    Which of the following items is unique to the N-tier architecture method of designing software applications?

    A. Application layers can be separated, allowing each layer to be upgraded independently from other layers.

    B. It is compatible with various databases including Access, Oracle, and SQL.

    C. Data security is tied into each layer and must be updated for all layers when any upgrade is performed.

    D. Application layers can be written in C, ASP.NET, or Delphi without any performance loss.

  • Question 506:

    A hacker is attempting to use nslookup to query Domain Name Service (DNS). The hacker uses the nslookup interactive mode for the search. Which command should the hacker type into the command shell to request the appropriate records?

    A. Locate type=ns

    B. Request type=ns

    C. Set type=ns

    D. Transfer type=ns

  • Question 507:

    After gaining access to the password hashes used to protect access to a web based application, knowledge of which cryptographic algorithms would be useful to gain access to the application?

    A. SHA1

    B. Diffie-Helman

    C. RSA

    D. AES

  • Question 508:

    Which element of Public Key Infrastructure (PKI) verifies the applicant?

    A. Certificate authority

    B. Validation authority

    C. Registration authority

    D. Verification authority

  • Question 509:

    Which Open Web Application Security Project (OWASP) implements a web application full of known vulnerabilities?

    A. WebBugs

    B. WebGoat

    C. VULN_HTML

    D. WebScarab

  • Question 510:

    What is the correct PCAP filter to capture all TCP traffic going to or from host 192.168.0.125 on port 25?

    A. tcp.src == 25 and ip.host == 192.168.0.125

    B. host 192.168.0.125:25

    C. port 25 and host 192.168.0.125

    D. tcp.port == 25 and ip.host == 192.168.0.125

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CEH-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.