GAQM CPEH-001 Exam
Certified Professional Ethical Hacker (CPEH) Exam (Page 20 )

Updated On: 1-Feb-2026

Which definition among those given below best describes a covert channel?

  1. A server program using a port that is not well known.
  2. Making use of a protocol in a way it is not intended to be used.
  3. It is the multiplexing taking place on a communication link.
  4. It is one of the weak channels used by WEP which makes it insecure.

Answer(s): B

Explanation:

A covert channel is described as: "any communication channel that can be exploited by a process to transfer information in a manner that violates the systems security policy." Essentially, it is a method of communication that is not part of an actual computer system design, but can be used to transfer information to users or system processes that normally would not be allowed access to the information.



Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory.
What kind of attack is Susan carrying on?

  1. A sniffing attack
  2. A spoofing attack
  3. A man in the middle attack
  4. A denial of service attack

Answer(s): C

Explanation:

A man-in-the-middle attack (MITM) is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised.



Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two.
What would you call this attack?

  1. Interceptor
  2. Man-in-the-middle
  3. ARP Proxy
  4. Poisoning Attack

Answer(s): B

Explanation:

A man-in-the-middle attack (MITM) is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised.



What port scanning method involves sending spoofed packets to a target system and then looking for adjustments to the IPID on a zombie system?

  1. Blind Port Scanning
  2. Idle Scanning
  3. Bounce Scanning
  4. Stealth Scanning
  5. UDP Scanning

Answer(s): B

Explanation:

From NMAP:
-sI <zombie host[:probeport]> Idlescan: This advanced scan method allows for a truly blind TCP port scan of the target (meaning no packets are sent to the tar- get from your real IP address). Instead, a unique side-channel attack exploits predictable "IP fragmentation ID" sequence generation on the zombie host to glean information about the open ports on the target.



Eve is spending her day scanning the library computers. She notices that Alice is using a computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate Alice machine. From the command prompt, she types the following command.
For /f "tokens=1 %%a in (hackfile.txt) do net use * \\10.1.2.3\c$ /user:"Administrator" %%a

What is Eve trying to do?

  1. Eve is trying to connect as an user with Administrator privileges
  2. Eve is trying to enumerate all users with Administrative privileges
  3. Eve is trying to carry out a password crack for user Administrator
  4. Eve is trying to escalate privilege of the null user to that of Administrator

Answer(s): C

Explanation:

Eve tries to get a successful login using the username Administrator and passwords from the file hackfile.txt.



Viewing page 20 of 177
Viewing questions 96 - 100 out of 878 questions



Post your Comments and Discuss GAQM CPEH-001 exam prep with other Community members:

Join the CPEH-001 Discussion