Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CPEH-001 Certified Professional Ethical Hacker (CPEH) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CPEH-001 Practice Questions

Certified Professional Ethical Hacker (CPEH)

Last Update 4 days ago
Total Questions : 736

Dive into our fully updated and stable CPEH-001 practice test platform, featuring all the latest Information Systems Security exam questions added this week. Our preparation tool is more than just a GAQM study aid; it's a strategic advantage.

Our free Information Systems Security practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CPEH-001. Use this test to pinpoint which areas you need to focus your study on.

CPEH-001 PDF

CPEH-001 PDF (Printable)
$43.75
$124.99

CPEH-001 Testing Engine

CPEH-001 PDF (Printable)
$50.75
$144.99

CPEH-001 PDF + Testing Engine

CPEH-001 PDF (Printable)
$63.7
$181.99
Question # 91

An attacker has captured a target file that is encrypted with public key cryptography. Which of the attacks below is likely to be used to crack the target file?

Options:

A.  

Timing attack

B.  

Replay attack

C.  

Memory trade-off attack

D.  

Chosen plain-text attack

Discussion 0
Question # 92

Which NMAP feature can a tester implement or adjust while scanning for open ports to avoid detection by the network’s IDS?

Options:

A.  

Timing options to slow the speed that the port scan is conducted

B.  

Fingerprinting to identify which operating systems are running on the network

C.  

ICMP ping sweep to determine which hosts on the network are not available

D.  

Traceroute to control the path of the packets sent during the scan

Discussion 0
Question # 93

Which of the following is optimized for confidential communications, such as bidirectional voice and video?

Options:

A.  

RC4

B.  

RC5

C.  

MD4

D.  

MD5

Discussion 0
Question # 94

Which method can provide a better return on IT security investment and provide a thorough and comprehensive assessment of organizational security covering policy, procedure design, and implementation?

Options:

A.  

Penetration testing

B.  

Social engineering

C.  

Vulnerability scanning

D.  

Access control list reviews

Discussion 0
Question # 95

Which of the following algorithms provides better protection against brute force attacks by using a 160-bit message digest?

Options:

A.  

MD5

B.  

SHA-1

C.  

RC4

D.  

MD4

Discussion 0
Question # 96

When comparing the testing methodologies of Open Web Application Security Project (OWASP) and Open Source Security Testing Methodology Manual (OSSTMM) the main difference is

Options:

A.  

OWASP is for web applications and OSSTMM does not include web applications.

B.  

OSSTMM is gray box testing and OWASP is black box testing.

C.  

OWASP addresses controls and OSSTMM does not.

D.  

OSSTMM addresses controls and OWASP does not.

Discussion 0
Question # 97

The company ABC recently contracted a new accountant. The accountant will be working with the financial statements. Those financial statements need to be approved by the CFO and then they will be sent to the accountant but the CFO is worried because he wants to be sure that the information sent to the accountant was not modified once he approved it. What of the following options can be useful to ensure the integrity of the data?

Options:

A.  

The document can be sent to the accountant using an exclusive USB for that document.

B.  

The CFO can use a hash algorithm in the document once he approved the financial statements.

C.  

The financial statements can be sent twice, one by email and the other delivered in USB and the accountant can compare both to be sure it is the same document.

D.  

The CFO can use an excel file with a password.

Discussion 0
Question # 98

An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network's external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file.

What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

Options:

A.  

Protocol analyzer

B.  

Intrusion Prevention System (IPS)

C.  

Network sniffer

D.  

Vulnerability scanner

Discussion 0
Question # 99

A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not responding to the association requests being sent by the wireless client.

What is a possible source of this problem?

Options:

A.  

The WAP does not recognize the client’s MAC address

B.  

The client cannot see the SSID of the wireless network

C.  

Client is configured for the wrong channel

D.  

The wireless client is not configured to use DHCP

Discussion 0
Question # 100

In both pharming and phishing attacks an attacker can create websites that look similar to legitimate sites with the intent of collecting personal identifiable information from its victims. What is the difference between pharming and phishing attacks?

Options:

A.  

In a pharming attack a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DNS. In a phishing attack an attacker provides the victim with a URL that is either misspelled or looks similar to the actual websites domain name.

B.  

Both pharming and phishing attacks are purely technical and are not considered forms of social engineering.

C.  

Both pharming and phishing attacks are identical.

D.  

In a phishing attack a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DNS. In a pharming attack an attacker provides the victim with a URL that is either misspelled or looks very similar to the actual websites domain name.

Discussion 0
Get CPEH-001 dumps and pass your exam in 24 hours!

Free Exams Sample Questions