GAQM CPEH-001 Exam
Certified Professional Ethical Hacker (CPEH) Exam (Page 10 )

Updated On: 1-Feb-2026

What is the proper response for a X-MAS scan if the port is closed?

  1. SYN
  2. ACK
  3. FIN
  4. PSH
  5. RST
  6. No response

Answer(s): E

Explanation:

Closed ports respond to a X-MAS scan with a RST.



What flags are set in a X-MAS scan?(Choose all that apply.

  1. SYN
  2. ACK
  3. FIN
  4. PSH
  5. RST
  6. URG

Answer(s): C,D,F

Explanation:

FIN, URG, and PSH are set high in the TCP packet for a X-MAS scan



Which of the following is an automated vulnerability assessment tool?

  1. Whack a Mole
  2. Nmap
  3. Nessus
  4. Kismet
  5. Jill32

Answer(s): C

Explanation:

Nessus is a vulnerability assessment tool.



John is using a special tool on his Linux platform that has a signature database and is therefore able to detect hundred of vulnerabilities in UNIX, Windows, and commonly-used web CGI scripts. Additionally, the database detects DDoS zombies and Trojans.
What would be the name of this multifunctional tool?

  1. nmap
  2. hping
  3. nessus
  4. make

Answer(s): C

Explanation:

Nessus is the world's most popular vulnerability scanner, estimated to be used by over 75, 000 organizations world-wide. Nmap is mostly used for scanning, not for detecting vulnerabilities. Hping is a free packet generator and analyzer for the TCP/IP protocol and make is used to automatically build large applications on the *nix plattform.



What is the disadvantage of an automated vulnerability assessment tool?

  1. Ineffective
  2. Slow
  3. Prone to false positives
  4. Prone to false negatives
  5. Noisy

Answer(s): E

Explanation:

Vulnerability assessment tools perform a good analysis of system vulnerabilities; however, they are noisy and will quickly trip IDS systems.



Viewing page 10 of 177
Viewing questions 46 - 50 out of 878 questions



Post your Comments and Discuss GAQM CPEH-001 exam prep with other Community members:

Join the CPEH-001 Discussion