Exam Details

  • Exam Code
    :CEH-001
  • Exam Name
    :Certified Ethical Hacker (CEH)
  • Certification
    :GAQM Certifications
  • Vendor
    :GAQM
  • Total Questions
    :878 Q&As
  • Last Updated
    :May 10, 2025

GAQM GAQM Certifications CEH-001 Questions & Answers

  • Question 561:

    Which of the following is an example of two factor authentication?

    A. PIN Number and Birth Date

    B. Username and Password

    C. Digital Certificate and Hardware Token

    D. Fingerprint and Smartcard ID

  • Question 562:

    A security consultant is trying to bid on a large contract that involves penetration testing and reporting. The company accepting bids wants proof of work so the consultant prints out several audits that have been performed. Which of the following is likely to occur as a result?

    A. The consultant will ask for money on the bid because of great work.

    B. The consultant may expose vulnerabilities of other companies.

    C. The company accepting bids will want the same type of format of testing.

    D. The company accepting bids will hire the consultant because of the great work performed.

  • Question 563:

    Which of the following scanning tools is specifically designed to find potential exploits in Microsoft Windows products?

    A. Microsoft Security Baseline Analyzer

    B. Retina

    C. Core Impact

    D. Microsoft Baseline Security Analyzer

  • Question 564:

    Which of the statements concerning proxy firewalls is correct?

    A. Proxy firewalls increase the speed and functionality of a network.

    B. Firewall proxy servers decentralize all activity for an application.

    C. Proxy firewalls block network packets from passing to and from a protected network.

    D. Computers establish a connection with a proxy firewall which initiates a new network connection for the client.

  • Question 565:

    A corporation hired an ethical hacker to test if it is possible to obtain users' login credentials using methods other than social engineering. Access to offices and to a network node is granted. Results from server scanning indicate all are adequately patched and physical access is denied, thus, administrators have access only through Remote Desktop. Which technique could be used to obtain login credentials?

    A. Capture every users' traffic with Ettercap.

    B. Capture LANMAN Hashes and crack them with LC6.

    C. Guess passwords using Medusa or Hydra against a network service.

    D. Capture administrators RDP traffic and decode it with Cain and Abel.

  • Question 566:

    What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a hotel room?

    A. Set a BIOS password.

    B. Encrypt the data on the hard drive.

    C. Use a strong logon password to the operating system.

    D. Back up everything on the laptop and store the backup in a safe place.

  • Question 567:

    The intrusion detection system at a software development company suddenly generates multiple alerts regarding attacks against the company's external webserver, VPN concentrator, and DNS servers. What should the security team do to determine which alerts to check first?

    A. Investigate based on the maintenance schedule of the affected systems.

    B. Investigate based on the service level agreements of the systems.

    C. Investigate based on the potential effect of the incident.

    D. Investigate based on the order that the alerts arrived in.

  • Question 568:

    How is sniffing broadly categorized?

    A. Active and passive

    B. Broadcast and unicast

    C. Unmanaged and managed

    D. Filtered and unfiltered

  • Question 569:

    An engineer is learning to write exploits in C++ and is using the exploit tool Backtrack. The engineer wants to compile the newest C++ exploit and name it calc.exe. Which command would the engineer use to accomplish this?

    A. g++ hackersExploit.cpp -o calc.exe

    B. g++ hackersExploit.py -o calc.exe

    C. g++ -i hackersExploit.pl -o calc.exe

    D. g++ --compile hackersExploit.cpp -o calc.exe

  • Question 570:

    A computer technician is using a new version of a word processing software package when it is discovered that a special sequence of characters causes the entire computer to crash. The technician researches the bug and discovers that no one else experienced the problem. What is the appropriate next step?

    A. Ignore the problem completely and let someone else deal with it.

    B. Create a document that will crash the computer when opened and send it to friends.

    C. Find an underground bulletin board and attempt to sell the bug to the highest bidder.

    D. Notify the vendor of the bug and do not disclose it until the vendor gets a chance to issue a fix.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CEH-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.