GAQM CPEH-001 Exam
Certified Professional Ethical Hacker (CPEH) Exam (Page 9 )

Updated On: 1-Feb-2026

When Nmap performs a ping sweep, which of the following sets of requests does it send to the target device?

  1. ICMP ECHO_REQUEST & TCP SYN
  2. ICMP ECHO_REQUEST & TCP ACK
  3. ICMP ECHO_REPLY & TFP RST
  4. ICMP ECHO_REPLY & TCP FIN

Answer(s): B

Explanation:

The default behavior of NMAP is to do both an ICMP ping sweep (the usual kind of ping) and a TCP port 80 ACK ping sweep. If an admin is logging these this will be fairly characteristic of NMAP.



_________ is one of the programs used to wardial.

  1. DialIT
  2. Netstumbler
  3. TooPac
  4. Kismet
  5. ToneLoc

Answer(s): E

Explanation:

ToneLoc is one of the programs used to wardial.
While this is considered an "old school" technique, it is still effective at finding backdoors and out of band network entry points.



What are the default passwords used by SNMP? (Choose two.)

  1. Password
  2. SA
  3. Private
  4. Administrator
  5. Public
  6. Blank

Answer(s): C,E

Explanation:

Besides the fact that it passes information in clear text, SNMP also uses well-known passwords. Public and private are the default passwords used by SNMP.



Which of the following ICMP message types are used for destinations unreachables?

  1. 0
  2. 3
  3. 11
  4. 13
  5. 17

Answer(s): B

Explanation:

Type 3 messages are used for unreachable messages. 0 is Echo Reply, 8 is Echo request, 11 is time exceeded, 13 is timestamp and 17 is subnet mask request. Learning these would be advisable for the test.



What is the proper response for a FIN scan if the port is closed?

  1. SYN
  2. ACK
  3. FIN
  4. PSH
  5. RST

Answer(s): E

Explanation:

Closed ports respond to a FIN scan with a RST.



Viewing page 9 of 177
Viewing questions 41 - 45 out of 878 questions



Post your Comments and Discuss GAQM CPEH-001 exam prep with other Community members:

Join the CPEH-001 Discussion