GAQM CPEH-001 Exam
Certified Professional Ethical Hacker (CPEH) Exam (Page 26 )

Updated On: 1-Feb-2026

While checking the settings on the internet browser, a technician finds that the proxy server settings have been checked and a computer is trying to use itself as a proxy server. What specific octet within the subnet does the technician see?

  1. 10.10.10.10
  2. 127.0.0.1
  3. 192.168.1.1
  4. 192.168.168.168

Answer(s): B



Which of the following business challenges could be solved by using a vulnerability scanner?

  1. Auditors want to discover if all systems are following a standard naming convention.
  2. A web server was compromised and management needs to know if any further systems were compromised.
  3. There is an emergency need to remove administrator access from multiple machines for an employee that quit.
  4. There is a monthly requirement to test corporate compliance with host application usage and security policies.

Answer(s): D



Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?

  1. Fast processor to help with network traffic analysis
  2. They must be dual-homed
  3. Similar RAM requirements
  4. Fast network interface cards

Answer(s): B



If an e-commerce site was put into a live environment and the programmers failed to remove the secret entry point that was used during the application development, what is this secret entry point known as?

  1. SDLC process
  2. Honey pot
  3. SQL injection
  4. Trap door

Answer(s): D



A Certificate Authority (CA) generates a key pair that will be used for encryption and decryption of email. The integrity of the encrypted email is dependent on the security of which of the following?

  1. Public key
  2. Private key
  3. Modulus length
  4. Email server certificate

Answer(s): B



Viewing page 26 of 177
Viewing questions 126 - 130 out of 878 questions



Post your Comments and Discuss GAQM CPEH-001 exam prep with other Community members:

Join the CPEH-001 Discussion