Exam Details

  • Exam Code
    :CEH-001
  • Exam Name
    :Certified Ethical Hacker (CEH)
  • Certification
    :GAQM Certifications
  • Vendor
    :GAQM
  • Total Questions
    :878 Q&As
  • Last Updated
    :May 10, 2025

GAQM GAQM Certifications CEH-001 Questions & Answers

  • Question 681:

    What type of attack is shown here?

    A. Bandwidth exhaust Attack

    B. Denial of Service Attack

    C. Cluster Service Attack

    D. Distributed Denial of Service Attack

  • Question 682:

    Joseph has just been hired on to a contractor company of the Department of Defense as their Senior Security Analyst. Joseph has been instructed on the company's strict security policies that have been implemented, and the policies that have yet to be put in place. Per the Department of Defense, all DoD users and the users of their contractors must use two- factor authentication to access their networks. Joseph has been delegated the task of researching and implementing the best two-factor authentication method for his company. Joseph's supervisor has told him that they would like to use some type of hardware device in tandem with a security or identifying pin number. Joseph's company has already researched using smart cards and all the resources needed to implement them, but found the smart cards to not be cost effective. What type of device should Joseph use for two- factor authentication?

    A. Biometric device

    B. OTP

    C. Proximity cards

    D. Security token

  • Question 683:

    Which definition below best describes a covert channel?

    A. A server program using a port that is not well known

    B. Making use of a protocol in a way it was not intended to be used

    C. It is the multiplexing taking place on a communication link

    D. It is one of the weak channels used by WEP that makes it insecure

  • Question 684:

    In which step Steganography fits in CEH System Hacking Cycle (SHC)

    A. Step 2: Crack the password

    B. Step 1: Enumerate users

    C. Step 3: Escalate privileges

    D. Step 4: Execute applications

    E. Step 5: Hide files

    F. Step 6: Cover your tracks

  • Question 685:

    Which of the following encryption is NOT based on block cipher?

    A. DES

    B. Blowfish

    C. AES (Rijndael)

    D. RC4

  • Question 686:

    Michael is a junior security analyst working for the National Security Agency (NSA) working primarily on breaking terrorist encrypted messages. The NSA has a number of methods they use to decipher encrypted messages including Government Access to Keys (GAK) and inside informants. The NSA holds secret backdoor keys to many of the encryption algorithms used on the Internet. The problem for the NSA, and Michael, is that terrorist organizations are starting to use custom-built algorithms or obscure algorithms purchased from corrupt governments. For this reason, Michael and other security analysts like him have been forced to find different methods of deciphering terrorist messages. One method that Michael thought of using was to hide malicious code inside seemingly harmless programs. Michael first monitors sites and bulletin boards used by known terrorists, and then he is able to glean email addresses to some of these suspected terrorists. Michael then inserts a stealth keylogger into a mapping program file readme.txt and then sends that as an attachment to the terrorist. This keylogger takes screenshots every 2 minutes and also logs all keyboard activity into a hidden file on the terrorist's computer. Then, the keylogger emails those files to Michael twice a day with a built in SMTP server. What technique has Michael used to disguise this keylogging software?

    A. Steganography

    B. Wrapping

    C. ADS

    D. Hidden Channels

  • Question 687:

    Buffer X in an Accounting application module for Brownies Inc. can contain 200 characters. The programmer makes an assumption that 200 characters are more than enough. Because there were no proper boundary checks being conducted, Bob decided to insert 400 characters into the 200-character buffer. (Overflows the buffer). Below is the code snippet:

    How can you protect/fix the problem of your application as shown above?

    A. Because the counter starts with 0, we would stop when the counter is less than 200

    B. Because the counter starts with 0, we would stop when the counter is more than 200

    C. Add a separate statement to signify that if we have written less than 200 characters to the buffer, the stack should stop because it cannot hold any more data

    D. Add a separate statement to signify that if we have written 200 characters to the buffer, the stack should stop because it cannot hold any more data

  • Question 688:

    This is an attack that takes advantage of a web site vulnerability in which the site displays content that includes un-sanitized user-provided data.

    See foobar

    What is this attack?

    A. Cross-site-scripting attack

    B. SQL Injection

    C. URL Traversal attack

    D. Buffer Overflow attack

  • Question 689:

    You are trying to break into a highly classified top-secret mainframe computer with highest security system in place at Merclyn Barley Bank located in Los Angeles. You know that conventional hacking doesn't work in this case, because organizations such as banks are generally tight and secure when it comes to protecting their systems. In other words you are trying to penetrate an otherwise impenetrable system. How would you proceed?

    A. Look for "zero-day" exploits at various underground hacker websites in Russia and China and buy the necessary exploits from these hackers and target the bank's network

    B. Try to hang around the local pubs or restaurants near the bank, get talking to a poorly- paid or disgruntled employee, and offer them money if they'll abuse their access privileges by providing you with sensitive information

    C. Launch DDOS attacks against Merclyn Barley Bank's routers and firewall systems using 100, 000 or more "zombies" and "bots"

    D. Try to conduct Man-in-the-Middle (MiTM) attack and divert the network traffic going to the Merclyn Barley Bank's Webserver to that of your machine using DNS Cache Poisoning techniques

  • Question 690:

    How does a denial-of-service attack work?

    A. A hacker prevents a legitimate user (or group of users) from accessing a service

    B. A hacker uses every character, word, or letter he or she can think of to defeat authentication

    C. A hacker tries to decipher a password by using a system, which subsequently crashes the network

    D. A hacker attempts to imitate a legitimate user by confusing a computer or even another person

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CEH-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.