GAQM CPEH-001 Exam
Certified Professional Ethical Hacker (CPEH) Exam (Page 32 )

Updated On: 1-Feb-2026

During a penetration test, a tester finds a target that is running MS SQL 2000 with default credentials. The tester assumes that the service is running with Local System account. How can this weakness be exploited to access the system?

  1. Using the Metasploit psexec module setting the SA / Admin credential
  2. Invoking the stored procedure xp_shell to spawn a Windows command shell
  3. Invoking the stored procedure cmd_shell to spawn a Windows command shell
  4. Invoking the stored procedure xp_cmdshell to spawn a Windows command shell

Answer(s): D



Which of the following programming languages is most vulnerable to buffer overflow attacks?

  1. Perl
  2. C++
  3. Python
  4. Java

Answer(s): B



Which property ensures that a hash function will not produce the same hashed value for two different messages?

  1. Collision resistance
  2. Bit length
  3. Key strength
  4. Entropy

Answer(s): A



From the two screenshots below, which of the following is occurring?

  1. 10.0.0.253 is performing an IP scan against 10.0.0.0/24, 10.0.0.252 is performing a port scan against 10.0.0.2.
  2. 10.0.0.253 is performing an IP scan against 10.0.0.2, 10.0.0.252 is performing a port scan against 10.0.0.2.
  3. 10.0.0.2 is performing an IP scan against 10.0.0.0/24, 10.0.0.252 is performing a port scan against 10.0.0.2.
  4. 10.0.0.252 is performing an IP scan against 10.0.0.2, 10.0.0.252 is performing a port scan against 10.0.0.2.

Answer(s): A



Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?

  1. Restore a random file.
  2. Perform a full restore.
  3. Read the first 512 bytes of the tape.
  4. Read the last 512 bytes of the tape.

Answer(s): B



Viewing page 32 of 177
Viewing questions 156 - 160 out of 878 questions



Post your Comments and Discuss GAQM CPEH-001 exam prep with other Community members:

Join the CPEH-001 Discussion