GAQM CPEH-001 Exam
Certified Professional Ethical Hacker (CPEH) Exam (Page 34 )

Updated On: 1-Feb-2026

A security engineer has been asked to deploy a secure remote access solution that will allow employees to connect to the company's internal network.
Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?

  1. SSL
  2. Mutual authentication
  3. IPSec
  4. Static IP addresses

Answer(s): C



An IT security engineer notices that the company's web server is currently being hacked.
What should the engineer do next?

  1. Unplug the network connection on the company's web server.
  2. Determine the origin of the attack and launch a counterattack.
  3. Record as much information as possible from the attack.
  4. Perform a system restart on the company's web server.

Answer(s): C



Attackers can potentially intercept and modify unsigned SMB packets, modify the traffic and forward it so that the server might perform undesirable actions. Alternatively, the attacker could pose as the server or client after a legitimate authentication and gain unauthorized access to data.
Which of the following is NOT a means that can be used to minimize or protect against such an attack?

  1. Timestamps
  2. SMB Signing
  3. File permissions
  4. Sequence numbers monitoring

Answer(s): A,B,D



A hacker is attempting to see which ports have been left open on a network.
Which NMAP switch would the hacker use?

  1. -sO
  2. -sP
  3. -sS
  4. -sU

Answer(s): A



Which security control role does encryption meet?

  1. Preventative
  2. Detective
  3. Offensive
  4. Defensive

Answer(s): A



Viewing page 34 of 177
Viewing questions 166 - 170 out of 878 questions



Post your Comments and Discuss GAQM CPEH-001 exam prep with other Community members:

Join the CPEH-001 Discussion