Free GAQM CEH-001 Exam Actual Questions

The questions for CEH-001 were last updated On Jan 12, 2025

Question No. 1

Which of the following is an Example of two factor authentication?

Show Answer Hide Answer
Correct Answer: D

Question No. 2

When working with Windows systems, what is the RID of the true administrator account?

Show Answer Hide Answer
Correct Answer: A

Because of the way in which Windows functions, the true administrator account always has a RID of 500.


Question No. 3

The SNMP Read-Only Community String is like a password. The string is sent along with each SNMP Get-Request and allows (or denies) access to a device. Most network vendors ship their equipment with a default password of "public". This is the so-called "default public community string". How would you keep intruders from getting sensitive information regarding the network devices using SNMP? (Select 2 answers)

Show Answer Hide Answer
Correct Answer: A, C

Question No. 4

The following excerpt is taken from a honeyput log. The log captures activities across three days. There are several intrusion attempts; however, a few are successful. Study the log given below and answer the following question:

(Note: The objective of this questions is to test whether the student has learnt about passive OS fingerprinting (which should tell them the OS from log captures): can they tell a SQL injection attack signature; can they infer if a user ID has been created by an attacker and whether they can read plain source -- destination entries from log entries.)

What can you infer from the above log?

Show Answer Hide Answer
Correct Answer: A

Question No. 5

Which of the following best describes session key creation in SSL?

Show Answer Hide Answer
Correct Answer: D

An SSL session always begins with an exchange of messages called the SSL handshake. The handshake allows the server to authenticate itself to the client using public-key techniques, then allows the client and the server to cooperate in the creation of symmetric keys used for rapid encryption, decryption, and tamper detection during the session that follows. Optionally, the handshake also allows the client to authenticate itself to the server.