GAQM CEH-001 Exam Questions
Certified Ethical Hacker (CEH) (Page 31 )

Updated On: 24-Feb-2026

Data is sent over the network as clear text (unencrypted) when Basic Authentication is configured on Web Servers.

  1. true
  2. false

Answer(s): A



NetBIOS over TCP/IP allows files and/or printers to be shared over the network. You are trying to intercept the traffic from a victim machine to a corporate network printer. You are attempting to hijack the printer network connection from your laptop by sniffing the wire.
Which port does SMB over TCP/IP use?

  1. 443
  2. 139
  3. 179
  4. 445

Answer(s): D



One of the ways to map a targeted network for live hosts is by sending an ICMP ECHO request to the broadcast or the network address. The request would be broadcasted to all hosts on the targeted network. The live hosts will send an ICMP ECHO Reply to the attacker's source IP address.
You send a ping request to the broadcast address 192.168.5.255.



There are 40 computers up and running on the target network. Only 13 hosts send a reply while others do not. Why?

  1. Windows machines will not generate an answer (ICMP ECHO Reply) to an ICMP ECHO request aimed at the broadcast address or at the network address.
  2. Linux machines will not generate an answer (ICMP ECHO Reply) to an ICMP ECHO request aimed at the broadcast address or at the network address.
  3. You should send a ping request with this command ping ? 192.168.5.0-255
  4. You cannot ping a broadcast address. The above scenario is wrong.

Answer(s): A



Charlie is the network administrator for his company. Charlie just received a new Cisco router and wants to test its capabilities out and to see if it might be susceptible to a DoS attack resulting in its locking up. The IP address of the Cisco switch is 172.16.0.45. What command can Charlie use to attempt this task?

  1. Charlie can use the command. ping -l 56550 172.16.0.45 -t.
  2. Charlie can try using the command. ping 56550 172.16.0.45.
  3. By using the command ping 172.16.0.45 Charlie would be able to lockup the router
  4. He could use the command. ping -4 56550 172.16.0.45.

Answer(s): A



What type of encryption does WPA2 use?

  1. DES 64 bit
  2. AES-CCMP 128 bit
  3. MD5 48 bit
  4. SHA 160 bit

Answer(s): B






Post your Comments and Discuss GAQM CEH-001 exam dumps with other Community members:

Join the CEH-001 Discussion