GAQM CEH-001 Exam Questions
Certified Ethical Hacker (CEH) (Page 32 )

Updated On: 24-Feb-2026

Attackers send an ACK probe packet with random sequence number, no response means port is filtered (Stateful firewall is present) and RST response means the port is not filtered.
What type of Port Scanning is this?

  1. RST flag scanning
  2. FIN flag scanning
  3. SYN flag scanning
  4. ACK flag scanning

Answer(s): D



What is the command used to create a binary log file using tcpdump?

  1. tcpdump -w ./log
  2. tcpdump -r log
  3. tcpdump -vde logtcpdump -vde ? log
  4. tcpdump -l /var/log/

Answer(s): A



Which port, when configured on a switch receives a copy of every packet that passes through it?

  1. R-DUPE Port
  2. MIRROR port
  3. SPAN port
  4. PORTMON

Answer(s): C



What is the IV key size used in WPA2?

  1. 32
  2. 24
  3. 16
  4. 48
  5. 128

Answer(s): D

Explanation:

Every WPA key includes a 48 bit IV key, which creates 500 trillion combinations and is a stronger encryption compared to WEP. With so many combinations, the possibility of the encryption key reuse is lesser and therefore the encryption can endure hacking attacks better than WEP. WPA does not make direct use of the master encryption keys and has a message integrity checking facility.



What type of session hijacking attack is shown in the exhibit?

  1. Session Sniffing Attack
  2. Cross-site scripting Attack
  3. SQL Injection Attack
  4. Token sniffing Attack

Answer(s): A






Post your Comments and Discuss GAQM CEH-001 exam dumps with other Community members:

Join the CEH-001 Discussion