GAQM CPEH-001 Exam
Certified Professional Ethical Hacker (CPEH) Exam (Page 25 )

Updated On: 1-Feb-2026

The following is a sample of output from a penetration tester's machine targeting a machine with the IP address of 192.168.1.106:



What is most likely taking place?

  1. Ping sweep of the 192.168.1.106 network
  2. Remote service brute force attempt
  3. Port scan of 192.168.1.106
  4. Denial of service attack on 192.168.1.106

Answer(s): B



A tester is attempting to capture and analyze the traffic on a given network and realizes that the network has several switches.
What could be used to successfully sniff the traffic on this switched network? (Choose three.)

  1. ARP spoofing
  2. MAC duplication
  3. MAC flooding
  4. SYN flood
  5. Reverse smurf attack
  6. ARP broadcasting

Answer(s): A,B,C



A newly discovered flaw in a software application would be considered which kind of security vulnerability?

  1. Input validation flaw
  2. HTTP header injection vulnerability
  3. 0-day vulnerability
  4. Time-to-check to time-to-use flaw

Answer(s): C



What are the three types of authentication?

  1. Something you: know, remember, prove
  2. Something you: have, know, are
  3. Something you: show, prove, are
  4. Something you: show, have, prove

Answer(s): B



What are the three types of compliance that the Open Source Security Testing Methodology Manual (OSSTMM) recognizes?

  1. Legal, performance, audit
  2. Audit, standards based, regulatory
  3. Contractual, regulatory, industry
  4. Legislative, contractual, standards based

Answer(s): D



Viewing page 25 of 177
Viewing questions 121 - 125 out of 878 questions



Post your Comments and Discuss GAQM CPEH-001 exam prep with other Community members:

Join the CPEH-001 Discussion