GAQM CPEH-001 Exam
Certified Professional Ethical Hacker (CPEH) Exam (Page 33 )

Updated On: 1-Feb-2026

An NMAP scan of a server shows port 69 is open.
What risk could this pose?

  1. Unauthenticated access
  2. Weak SSL version
  3. Cleartext login
  4. Web portal data leak

Answer(s): A



A tester has been using the msadc.pl attack script to execute arbitrary commands on a Windows NT4 web server.
While it is effective, the tester finds it tedious to perform extended functions. On further research, the tester come across a perl script that runs the following msadc functions:system("perl msadc.pl -h $host -C \"echo open $your >testfile\"");



Which exploit is indicated by this script?

  1. A buffer overflow exploit
  2. A chained exploit
  3. A SQL injection exploit
  4. A denial of service exploit

Answer(s): B



When setting up a wireless network, an administrator enters a pre-shared key for security.
Which of the following is true?

  1. The key entered is a symmetric key used to encrypt the wireless data.
  2. The key entered is a hash that is used to prove the integrity of the wireless data.
  3. The key entered is based on the Diffie-Hellman method.
  4. The key is an RSA key used to encrypt the wireless data.

Answer(s): A



Which of the following defines the role of a root Certificate Authority (CA) in a Public Key Infrastructure (PKI)?

  1. The root CA is the recovery agent used to encrypt data when a user's certificate is lost.
  2. The root CA stores the user's hash value for safekeeping.
  3. The CA is the trusted root that issues certificates.
  4. The root CA is used to encrypt email messages to prevent unintended disclosure of data.

Answer(s): C



Firewalk has just completed the second phase (the scanning phase) and a technician receives the output shown below.
What conclusions can be drawn based on these scan results? TCP port 21 ­ no response TCP port 22 ­ no response TCP port 23 ­ Time-to-live exceeded

  1. The firewall itself is blocking ports 21 through 23 and a service is listening on port 23 of the target host.
  2. The lack of response from ports 21 and 22 indicate that those services are not running on the destination server.
  3. The scan on port 23 passed through the filtering device. This indicates that port 23 was not blocked at the firewall.
  4. The scan on port 23 was able to make a connection to the destination host prompting the firewall to respond with a TTL error.

Answer(s): C



Viewing page 33 of 177
Viewing questions 161 - 165 out of 878 questions



Post your Comments and Discuss GAQM CPEH-001 exam prep with other Community members:

Join the CPEH-001 Discussion