Exam Details

  • Exam Code
    :CEH-001
  • Exam Name
    :Certified Ethical Hacker (CEH)
  • Certification
    :GAQM Certifications
  • Vendor
    :GAQM
  • Total Questions
    :878 Q&As
  • Last Updated
    :May 10, 2025

GAQM GAQM Certifications CEH-001 Questions & Answers

  • Question 51:

    Bob, an Administrator at XYZ was furious when he discovered that his buddy Trent, has launched a session hijack attack against his network, and sniffed on his communication, including administrative tasks suck as configuring routers,

    firewalls, IDS, via Telnet.

    Bob, being an unhappy administrator, seeks your help to assist him in ensuring that attackers such as Trent will not be able to launch a session hijack in XYZ.

    Based on the above scenario, please choose which would be your corrective measurement actions. (Choose two)

    A. Use encrypted protocols, like those found in the OpenSSH suite.

    B. Implement FAT32 filesystem for faster indexing and improved performance.

    C. Configure the appropriate spoof rules on gateways (internal and external).

    D. Monitor for CRP caches, by using IDS products.

  • Question 52:

    While scanning a network you observe that all of the web servers in the DMZ are responding to ACK packets on port 80. What can you infer from this observation?

    A. They are using Windows based web servers.

    B. They are using UNIX based web servers.

    C. They are not using an intrusion detection system.

    D. They are not using a stateful inspection firewall.

  • Question 53:

    You are the security administrator for a large network. You want to prevent attackers from running any sort of traceroute into your DMZ and discover the internal structure of publicly accessible areas of the network. How can you achieve this?

    A. Block ICMP at the firewall.

    B. Block UDP at the firewall.

    C. Both A and B.

    D. There is no way to completely block doing a trace route into this area.

  • Question 54:

    An employee wants to defeat detection by a network-based IDS application. He does not want to attack the system containing the IDS application. Which of the following strategies can be used to defeat detection by a network-based IDS application? (Choose the best answer)

    A. Create a network tunnel.

    B. Create a multiple false positives.

    C. Create a SYN flood.

    D. Create a ping flood.

  • Question 55:

    Carl has successfully compromised a web server from behind a firewall by exploiting a vulnerability in the web server program. He wants to proceed by installing a backdoor program. However, he is aware that not all inbound ports on the firewall are in the open state.

    From the list given below, identify the port that is most likely to be open and allowed to reach the server that Carl has just compromised.

    A. 53

    B. 110

    C. 25

    D. 69

  • Question 56:

    What makes web application vulnerabilities so aggravating? (Choose two)

    A. They can be launched through an authorized port.

    B. A firewall will not stop them.

    C. They exist only on the Linux platform.

    D. They are detectable by most leading antivirus software.

  • Question 57:

    Which one of the following attacks will pass through a network layer intrusion detection system undetected?

    A. A teardrop attack

    B. A SYN flood attack

    C. A DNS spoofing attack

    D. A test.cgi attack

  • Question 58:

    Why would an ethical hacker use the technique of firewalking?

    A. It is a technique used to discover wireless network on foot.

    B. It is a technique used to map routers on a network link.

    C. It is a technique used to discover the nature of rules configured on a gateway.

    D. It is a technique used to discover interfaces in promiscuous mode.

  • Question 59:

    Once an intruder has gained access to a remote system with a valid username and password, the attacker will attempt to increase his privileges by escalating the used account to one that has increased privileges. such as that of an administrator. What would be the best countermeasure to protect against escalation of priveges?

    A. Give users tokens

    B. Give user the least amount of privileges

    C. Give users two passwords

    D. Give users a strong policy document

  • Question 60:

    You are attempting to map out the firewall policy for an organization. You discover your target system is one hop beyond the firewall. Using hping2, you send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024. What is this process known as?

    A. Footprinting

    B. Firewalking

    C. Enumeration

    D. Idle scanning

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CEH-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.