Exam Details

  • Exam Code
    :CEH-001
  • Exam Name
    :Certified Ethical Hacker (CEH)
  • Certification
    :GAQM Certifications
  • Vendor
    :GAQM
  • Total Questions
    :878 Q&As
  • Last Updated
    :May 10, 2025

GAQM GAQM Certifications CEH-001 Questions & Answers

  • Question 511:

    When creating a security program, which approach would be used if senior management is supporting and enforcing the security policy?

    A. A bottom-up approach

    B. A top-down approach

    C. A senior creation approach

    D. An IT assurance approach

  • Question 512:

    Which of the following parameters enables NMAP's operating system detection feature?

    A. NMAP -sV

    B. NMAP -oS

    C. NMAP -sR

    D. NMAP -O

  • Question 513:

    Which of the following is an example of IP spoofing?

    A. SQL injections

    B. Man-in-the-middle

    C. Cross-site scripting

    D. ARP poisoning

  • Question 514:

    Which of the following processes of PKI (Public Key Infrastructure) ensures that a trust relationship exists and that a certificate is still valid for specific operations?

    A. Certificate issuance

    B. Certificate validation

    C. Certificate cryptography

    D. Certificate revocation

  • Question 515:

    How do employers protect assets with security policies pertaining to employee surveillance activities?

    A. Employers promote monitoring activities of employees as long as the employees demonstrate trustworthiness.

    B. Employers use informal verbal communication channels to explain employee monitoring activities to employees.

    C. Employers use network surveillance to monitor employee email traffic, network access, and to record employee keystrokes.

    D. Employers provide employees written statements that clearly discuss the boundaries of monitoring activities and consequences.

  • Question 516:

    When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's computer to update the router configuration. What type of an alert is this?

    A. False positive

    B. False negative

    C. True positve

    D. True negative

  • Question 517:

    There is a WEP encrypted wireless access point (AP) with no clients connected. In order to crack the WEP key, a fake authentication needs to be performed. What information is needed when performing fake authentication to an AP? (Choose two.)

    A. The IP address of the AP

    B. The MAC address of the AP

    C. The SSID of the wireless network

    D. A failed authentication packet

  • Question 518:

    What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the received response?

    A. Passive

    B. Reflective

    C. Active

    D. Distributive

  • Question 519:

    Which command line switch would be used in NMAP to perform operating system detection?

    A. -OS

    B. -sO

    C. -sP

    D. -O

  • Question 520:

    Bluetooth uses which digital modulation technique to exchange information between paired devices?

    A. PSK (phase-shift keying)

    B. FSK (frequency-shift keying)

    C. ASK (amplitude-shift keying)

    D. QAM (quadrature amplitude modulation)

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CEH-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.