GAQM CPEH-001 Exam Questions
Certified Professional Ethical Hacker (CPEH) Exam (Page 24 )

Updated On: 24-Feb-2026

You are gathering competitive intelligence on an organization. You notice that they have jobs listed on a few Internet job-hunting sites. There are two jobs for network and system administrators. How can this help you in foot printing the organization?

  1. To learn about the IP range used by the target network
  2. To identify the number of employees working for the company
  3. To test the limits of the corporate security policy enforced in the company
  4. To learn about the operating systems, services and applications used on the network

Answer(s): D



TCP packets transmitted in either direction after the initial three-way handshake will have which of the following bit set?

  1. SYN flag
  2. ACK flag
  3. FIN flag
  4. XMAS flag

Answer(s): B



The programmers on your team are analyzing the free, open source software being used to run FTP services on a server in your organization. They notice that there is excessive number of functions in the source code that might lead to buffer overflow. These C++ functions do not check bounds. Identify the line in the source code that might lead to buffer overflow?

  1. 99
  2. 1717
  3. 2020
  4. 3232
  5. 3535

Answer(s): B



What framework architecture is shown in this exhibit?

  1. Core Impact
  2. Metasploit
  3. Immunity Canvas
  4. Nessus

Answer(s): B



Which of the following steganography utilities exploits the nature of white space and allows the user to conceal information in these white spaces?

  1. Image Hide
  2. Snow
  3. Gif-It-Up
  4. NiceText

Answer(s): B






Post your Comments and Discuss GAQM CPEH-001 exam dumps with other Community members:

Join the CPEH-001 Discussion