GAQM CPEH-001 Exam
Certified Professional Ethical Hacker (CPEH) Exam (Page 12 )

Updated On: 1-Feb-2026

Which type of Nmap scan is the most reliable, but also the most visible, and likely to be picked up by and IDS?

  1. SYN scan
  2. ACK scan
  3. RST scan
  4. Connect scan
  5. FIN scan

Answer(s): D

Explanation:

The TCP full connect (-sT) scan is the most reliable.



Sandra is the security administrator of XYZ.com. One day she notices that the XYZ.com Oracle database server has been compromised and customer information along with financial data has been stolen. The financial loss will be estimated in millions of dollars if the database gets into the hands of competitors. Sandra wants to report this crime to the law enforcement agencies immediately.
Which organization coordinates computer crime investigations throughout the United States?

  1. NDCA
  2. NICP
  3. CIRP
  4. NPC
  5. CIA

Answer(s): D



What is a NULL scan?

  1. A scan in which all flags are turned off
  2. A scan in which certain flags are off
  3. A scan in which all flags are on
  4. A scan in which the packet size is set to zero
  5. A scan with a illegal packet size

Answer(s): A

Explanation:

A null scan has all flags turned off.



What is the proper response for a NULL scan if the port is open?

  1. SYN
  2. ACK
  3. FIN
  4. PSH
  5. RST
  6. No response

Answer(s): F

Explanation:

A NULL scan will have no response if the port is open.



Which of the following statements about a zone transfer correct?(Choose three.

  1. A zone transfer is accomplished with the DNS
  2. A zone transfer is accomplished with the nslookup service
  3. A zone transfer passes all zone information that a DNS server maintains
  4. A zone transfer passes all zone information that a nslookup server maintains
  5. A zone transfer can be prevented by blocking all inbound TCP port 53 connections
  6. Zone transfers cannot occur on the Internet

Answer(s): A,C,E

Explanation:

Securing DNS servers should be a priority of the organization. Hackers obtaining DNS information can discover a wealth of information about an organization. This information can be used to further exploit the network.



Viewing page 12 of 177
Viewing questions 45 - 48 out of 878 questions



Post your Comments and Discuss GAQM CPEH-001 exam prep with other Community members:

Join the CPEH-001 Discussion