Exam Details

  • Exam Code
    :CEH-001
  • Exam Name
    :Certified Ethical Hacker (CEH)
  • Certification
    :GAQM Certifications
  • Vendor
    :GAQM
  • Total Questions
    :878 Q&As
  • Last Updated
    :May 10, 2025

GAQM GAQM Certifications CEH-001 Questions & Answers

  • Question 601:

    Which of the following conditions must be given to allow a tester to exploit a Cross-Site Request Forgery (CSRF) vulnerable web application?

    A. The victim user must open the malicious link with an Internet Explorer prior to version 8.

    B. The session cookies generated by the application do not have the HttpOnly flag set.

    C. The victim user must open the malicious link with a Firefox prior to version 3.

    D. The web application should not use random tokens.

  • Question 602:

    Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?

    A. SHA-1

    B. MD5

    C. HAVAL

    D. MD4

  • Question 603:

    A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted. Which cryptography attack is the student attempting?

    A. Man-in-the-middle attack

    B. Brute-force attack

    C. Dictionary attack

    D. Session hijacking

  • Question 604:

    In order to show improvement of security over time, what must be developed?

    A. Reports

    B. Testing tools

    C. Metrics

    D. Taxonomy of vulnerabilities

  • Question 605:

    In the software security development life cyle process, threat modeling occurs in which phase?

    A. Design

    B. Requirements

    C. Verification

    D. Implementation

  • Question 606:

    Which of the following items of a computer system will an anti-virus program scan for viruses?

    A. Boot Sector

    B. Deleted Files

    C. Windows Process List

    D. Password Protected Files

  • Question 607:

    John the Ripper is a technical assessment tool used to test the weakness of which of the following?

    A. Usernames

    B. File permissions

    C. Firewall rulesets

    D. Passwords

  • Question 608:

    A company has made the decision to host their own email and basic web services. The administrator needs to set up the external firewall to limit what protocols should be allowed to get to the public part of the company's network. Which ports should the administrator open? (Choose three.)

    A. Port 22

    B. Port 23

    C. Port 25

    D. Port 53

    E. Port 80

    F. Port 139

    G. Port 445

  • Question 609:

    Which type of scan measures a person's external features through a digital video camera?

    A. Iris scan

    B. Retinal scan

    C. Facial recognition scan D. Signature kinetics scan

  • Question 610:

    When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?

    A. Vulnerability scanning

    B. Social engineering

    C. Application security testing

    D. Network sniffing

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CEH-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.