Free GAQM CPEH-001 Exam Questions

Try our Free Demo Practice Tests for Comprehensive CPEH-001 Exam Preparation

  • GAQM CPEH-001 Exam Questions
  • Provided By: GAQM
  • Exam: Certified Professional Ethical Hacker (CPEH)
  • Certification: Information Systems Security
  • Total Questions: 881
  • Updated On: Jan 28, 2025
  • Rated: 4.9 |
  • Online Users: 1762
Page No. 1 of 177
Add To Cart
  • Question 1
    • Which Type of scan sends a packets with no flags set? Select the Answer

      Answer: B
  • Question 2
    • You are trying to hijack a telnet session from a victim machine with IP address 10.0.0.5 to Cisco router at 10.0.0.1. You sniff the traffic and attempt to predict the sequence and acknowledgement numbers to successfully hijack the telnet session. Here is the captured data in tcpdump.
      Other-Image-2b59c889b-c75b-4ac0-b591-85f86c0ab8a6
      What are the next sequence and acknowledgement numbers that the router will send to the victim machine?

      Answer: A
  • Question 3
    • How would you prevent session hijacking attacks?

      Answer: D
  • Question 4
    • Doug is conducting a port scan of a target network. He knows that his client target network has a web server and that there is a mail server also which is up and running. Doug has been sweeping the network but has not been able to elicit any response from the remote target. Which of the following could be the most likely cause behind this lack of response? Select 4.

      Answer: A,C,D
  • Question 5
    • Bob was frustrated with his competitor, Brownies Inc., and decided to launch an attack that would result in serious financial losses. He planned the attack carefully and carried out the attack at the appropriate moment. Meanwhile, Trent, an administrator at Brownies Inc., realized that their main financial transaction server had been attacked. As a result of the attack, the server crashed and Trent needed to reboot the system, as no one was able to access the resources of the company. This process involves human interaction to fix it. What kind of Denial of Service attack was best illustrated in the scenario above?

      Answer: C
PAGE: 1 - 177
Add To Cart

© Copyrights Dumpscity 2025. All Rights Reserved

We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the Dumpscity.