GAQM CPEH-001 Exam
Certified Professional Ethical Hacker (CPEH) Exam (Page 24 )

Updated On: 1-Feb-2026

A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network.
What tool should the analyst use to perform a Blackjacking attack?

  1. Paros Proxy
  2. BBProxy
  3. BBCrack
  4. Blooover

Answer(s): B



ICMP ping and ping sweeps are used to check for active systems and to check

  1. if ICMP ping traverses a firewall.
  2. the route that the ICMP ping took.
  3. the location of the switchport in relation to the ICMP ping.
  4. the number of hops an ICMP ping takes to reach a destination.

Answer(s): A



A hacker searches in Google for filetype:pcf to find Cisco VPN config files. Those files may contain connectivity passwords that can be decoded with which of the following?

  1. Cupp
  2. Nessus
  3. Cain and Abel
  4. John The Ripper Pro

Answer(s): C



Which technical characteristic do Ethereal/Wireshark, TCPDump, and Snort have in common?

  1. They are written in Java.
  2. They send alerts to security monitors.
  3. They use the same packet analysis engine.
  4. They use the same packet capture utility.

Answer(s): D



A pentester gains acess to a Windows application server and needs to determine the settings of the built-in Windows firewall.
Which command would be used?

  1. Netsh firewall show config
  2. WMIC firewall show config
  3. Net firewall show config
  4. Ipconfig firewall show config

Answer(s): A



Viewing page 24 of 177
Viewing questions 116 - 120 out of 878 questions



Post your Comments and Discuss GAQM CPEH-001 exam prep with other Community members:

Join the CPEH-001 Discussion