GAQM CPEH-001 Exam Questions
Certified Professional Ethical Hacker (CPEH) Exam (Page 9 )

Updated On: 24-Feb-2026

Jayden is a network administrator for her company. Jayden wants to prevent MAC spoofing on all the Cisco switches in the network. How can she accomplish this?

  1. Jayden can use the commanD. ip binding set.
  2. Jayden can use the commanD. no ip spoofing.
  3. She should use the commanD. no dhcp spoofing.
  4. She can use the comman ip dhcp snooping binding.

Answer(s): D



Peter extracts the SID list from Windows 2008 Server machine using the hacking tool "SIDExtracter".
Here is the output of the SIDs:



From the above list identify the user account with System Administrator privileges?

  1. John
  2. Rebecca
  3. Sheela
  4. Shawn
  5. Somia
  6. Chang
  7. Micah

Answer(s): F



What is the problem with this ASP script (login.asp)?

  1. The ASP script is vulnerable to Cross Site Scripting attack
  2. The ASP script is vulnerable to Session Splice attack
  3. The ASP script is vulnerable to XSS attack
  4. The ASP script is vulnerable to SQL Injection attack

Answer(s): D



Google uses a unique cookie for each browser used by an individual user on a computer. This cookie contains information that allows Google to identify records about that user on its database. This cookie is submitted every time a user launches a Google search, visits a site using AdSense etc. The information stored in Google's database, identified by the cookie, includes · Everything you search for using Google
· Every web page you visit that has Google Adsense ads How would you prevent Google from storing your search keywords?

  1. Block Google Cookie by applying Privacy and Security settings in your web browser
  2. Disable the Google cookie using Google Advanced Search settings on Google Search page
  3. Do not use Google but use another search engine Bing which will not collect and store your search keywords
  4. Use MAC OS X instead of Windows 7. Mac OS has higher level of privacy controls by default.

Answer(s): A



How many bits encryption does SHA-1 use?

  1. 64 bits
  2. 128 bits
  3. 256 bits
  4. 160 bits

Answer(s): D






Post your Comments and Discuss GAQM CPEH-001 exam dumps with other Community members:

Join the CPEH-001 Discussion