GAQM CPEH-001 Exam
Certified Professional Ethical Hacker (CPEH) Exam (Page 22 )

Updated On: 1-Feb-2026

Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?

  1. To determine who is the holder of the root account
  2. To perform a DoS
  3. To create needless SPAM
  4. To illicit a response back that will reveal information about email servers and how they treat undeliverable mail
  5. To test for virus protection

Answer(s): D

Explanation:

Sending a bogus email is one way to find out more about internal servers. Also, to gather additional IP addresses and learn how they treat mail.



What tool can crack Windows SMB passwords simply by listening to network traffic? Select the best answer.

  1. This is not possible
  2. Netbus
  3. NTFSDOS
  4. L0phtcrack

Answer(s): D

Explanation:

This is possible with a SMB packet capture module for L0phtcrack and a known weaknesses in the LM hash algorithm.



A network admin contacts you. He is concerned that ARP spoofing or poisoning might occur on his network.
What are some things he can do to prevent it? Select the best answers.

  1. Use port security on his switches.
  2. Use a tool like ARPwatch to monitor for strange ARP activity.
  3. Use a firewall between all LAN segments.
  4. If you have a small network, use static ARP entries.
  5. Use only static IP addresses on all PC's.

Answer(s): A,B,D

Explanation:

By using port security on his switches, the switches will only allow the first MAC address that is connected to the switch to use that port, thus preventing ARP spoofing.ARPWatch is a tool that monitors for strange ARP activity. This may help identify ARP spoofing when it happens. Using firewalls between all LAN segments is possible and may help, but is usually pretty unrealistic. On a very small network, static ARP entries are a possibility. However, on a large network, this is not an realistic option. ARP spoofing doesn't have anything to do with static or dynamic IP addresses. Thus, this option won't help you.



Peter, a Network Administrator, has come to you looking for advice on a tool that would help him perform SNMP enquires over the network.
Which of these tools would do the SNMP enumeration he is looking for?
Select the best answers.

  1. SNMPUtil
  2. SNScan
  3. SNMPScan
  4. Solarwinds IP Network Browser
  5. NMap

Answer(s): A,B,D

Explanation:

SNMPUtil is a SNMP enumeration utility that is a part of the Windows 2000 resource kit. With SNMPUtil, you can retrieve all sort of valuable information through SNMP. SNScan is a SNMP network scanner by Foundstone. It does SNMP scanning to find open SNMP ports. Solarwinds IP Network Browser is a SNMP enumeration tool with a graphical tree-view of the remote machine's SNMP data.



If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?

  1. Birthday
  2. Brute force
  3. Man-in-the-middle
  4. Smurf

Answer(s): B

Explanation:

Brute force attacks are performed with tools that cycle through many possible character, number, and symbol combinations to guess a password. Since the token allows offline checking of PIN, the cracker can keep trying PINS until it is cracked.



Viewing page 22 of 177
Viewing questions 106 - 110 out of 878 questions



Post your Comments and Discuss GAQM CPEH-001 exam prep with other Community members:

Join the CPEH-001 Discussion