GAQM CPEH-001 Exam
Certified Professional Ethical Hacker (CPEH) Exam (Page 21 )

Updated On: 1-Feb-2026

Null sessions are un-authenticated connections (not using a username or password.) to an NT or 2000 system.
Which TCP and UDP ports must you filter to check null sessions on your network?

  1. 137 and 139
  2. 137 and 443
  3. 139 and 443
  4. 139 and 445

Answer(s): D

Explanation:

NULL sessions take advantage of "features" in the SMB (Server Message Block) protocol that exist primarily for trust relationships. You can establish a NULL session with a Windows host by logging on with a NULL user name and password. Primarily the following ports are vulnerable if they are accessible:



Exhibit:



Study the following log extract and identify the attack.

  1. Hexcode Attack
  2. Cross Site Scripting
  3. Multiple Domain Traversal Attack
  4. Unicode Directory Traversal Attack

Answer(s): D

Explanation:

The "Get /msadc/....../....../....../winnt/system32/cmd.exe?" shows that a Unicode Directory Traversal Attack has been performed.



Exhibit:
Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?

  1. har.txt
  2. SAM file
  3. wwwroot
  4. Repair file

Answer(s): B

Explanation:

He is actually trying to get the file har.txt but this file contains a copy of the SAM file.



Exhibit:



The following is an entry captured by a network IDS.You are assigned the task of analyzing this entry. You notice the value 0x90, which is the most common NOOP instruction for the Intel processor. You figure that the attacker is attempting a buffer overflow attack. You also notice "/bin/sh" in the ASCII part of the output. As an analyst what would you conclude about the attack?

  1. The buffer overflow attack has been neutralized by the IDS
  2. The attacker is creating a directory on the compromised machine
  3. The attacker is attempting a buffer overflow attack and has succeeded
  4. The attacker is attempting an exploit that launches a command-line shell

Answer(s): D

Explanation:

This log entry shows a hacker using a buffer overflow to fill the data buffer and trying to insert the execution of /bin/sh into the executable code part of the thread. It is probably an existing exploit that is used, or a directed attack with a custom built buffer overflow with the "payload" that launches the command shell.



As a securing consultant, what are some of the things you would recommend to a company to ensure DNS security? Select the best answers.

  1. Use the same machines for DNS and other applications
  2. Harden DNS servers
  3. Use split-horizon operation for DNS servers
  4. Restrict Zone transfers
  5. Have subnet diversity between DNS servers

Answer(s): B,C,D,E

Explanation:

A is not a correct answer as it is never recommended to use a DNS server for any other application. Hardening of the DNS servers makes them less vulnerable to attack. It is recommended to split internal and external DNS servers (called split-horizon operation). Zone transfers should only be accepted from authorized DNS servers.
By having DNS servers on different subnets, you may prevent both from going down, even if one of your networks goes down.



Viewing page 21 of 177
Viewing questions 101 - 105 out of 878 questions



Post your Comments and Discuss GAQM CPEH-001 exam prep with other Community members:

Join the CPEH-001 Discussion