GAQM CEH-001 Exam Questions
Certified Ethical Hacker (CEH) (Page 42 )

Updated On: 27-Feb-2026

Neil is closely monitoring his firewall rules and logs on a regular basis. Some of the users have complained to Neil that there are a few employees who are visiting offensive web site during work hours, without any consideration for others.

Neil knows that he has an up-to- date content filtering system and such access should not be authorized. What type of technique might be used by these offenders to access the Internet without restriction?

  1. They are using UDP that is always authorized at the firewall
  2. They are using HTTP tunneling software that allows them to communicate with protocols in a way it was not intended
  3. They have been able to compromise the firewall, modify the rules, and give themselves proper access
  4. They are using an older version of Internet Explorer that allow them to bypass the proxy server

Answer(s): B



In this attack, a victim receives an e-mail claiming from PayPal stating that their account has been disabled and confirmation is required before activation. The attackers then scam to collect not one but two credit card numbers, ATM PIN number and other personal details.


Ignorant users usually fall prey to this scam. Which of the following statement is incorrect
related to this attack?

  1. Do not reply to email messages or popup ads asking for personal or financial information
  2. Do not trust telephone numbers in e-mails or popup ads
  3. Review credit card and bank account statements regularly
  4. Antivirus, anti-spyware, and firewall software can very easily detect these type of attacks
  5. Do not send credit card numbers, and personal or financial information via e-mail

Answer(s): D



Bob is going to perform an active session hijack against Brownies Inc. He has found a target that allows session oriented connections (Telnet) and performs the sequence prediction on the target operating system. He manages to find an active session due to the high level of traffic on the network. What is Bob supposed to do next?

  1. Take over the session
  2. Reverse sequence prediction
  3. Guess the sequence numbers
  4. Take one of the parties offline

Answer(s): C



ViruXine.W32 virus hides their presence by changing the underlying executable code. This Virus code mutates while keeping the original algorithm intact, the code changes itself each time it runs, but the function of the code (its semantics) will not change at all.



What is this technique called?

  1. Polymorphic Virus
  2. Metamorphic Virus
  3. Dravidic Virus
  4. Stealth Virus

Answer(s): A



"Testing the network using the same methodologies and tools employed by attackers" Identify the correct terminology that defines the above statement.

  1. Vulnerability Scanning
  2. Penetration Testing
  3. Security Policy Implementation
  4. Designing Network Security

Answer(s): B






Post your Comments and Discuss GAQM CEH-001 exam dumps with other Community members:

Join the CEH-001 Discussion