Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CPEH-001 Certified Professional Ethical Hacker (CPEH) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CPEH-001 Practice Questions

Certified Professional Ethical Hacker (CPEH)

Last Update 1 hour ago
Total Questions : 736

Dive into our fully updated and stable CPEH-001 practice test platform, featuring all the latest Information Systems Security exam questions added this week. Our preparation tool is more than just a GAQM study aid; it's a strategic advantage.

Our free Information Systems Security practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CPEH-001. Use this test to pinpoint which areas you need to focus your study on.

CPEH-001 PDF

CPEH-001 PDF (Printable)
$43.75
$124.99

CPEH-001 Testing Engine

CPEH-001 PDF (Printable)
$50.75
$144.99

CPEH-001 PDF + Testing Engine

CPEH-001 PDF (Printable)
$63.7
$181.99
Question # 101

An attacker is trying to redirect the traffic of a small office. That office is using their own mail server, DNS server and NTP server because of the importance of their job. The attacker gains access to the DNS server and redirects the direction www.google.com to his own IP address. Now when the employees of the office want to go to Google they are being redirected to the attacker machine. What is the name of this kind of attack?

Options:

A.  

ARP Poisoning

B.  

Smurf Attack

C.  

DNS spoofing

D.  

MAC Flooding

Discussion 0
Question # 102

While performing online banking using a Web browser, a user receives an email that contains a link to an interesting Web site. When the user clicks on the link, another Web browser session starts and displays a video of cats playing a piano. The next business day, the user receives what looks like an email from his bank, indicating that his bank account has been accessed from a foreign country. The email asks the user to call his bank and verify the authorization of a funds transfer that took place.

What Web browser-based security vulnerability was exploited to compromise the user?

Options:

A.  

Cross-Site Request Forgery

B.  

Cross-Site Scripting

C.  

Clickjacking

D.  

Web form input validation

Discussion 0
Question # 103

A company's security policy states that all Web browsers must automatically delete their HTTP browser cookies upon terminating. What sort of security breach is this policy attempting to mitigate?

Options:

A.  

Attempts by attackers to access Web sites that trust the Web browser user by stealing the user's authentication credentials.

B.  

Attempts by attackers to access the user and password information stored in the company's SQL database.

C.  

Attempts by attackers to access passwords stored on the user's computer without the user's knowledge.

D.  

Attempts by attackers to determine the user's Web browser usage patterns, including when sites were visited and for how long.

Discussion 0
Question # 104

Which Metasploit Framework tool can help penetration tester for evading Anti-virus Systems?

Options:

A.  

msfpayload

B.  

msfcli

C.  

msfencode

D.  

msfd

Discussion 0
Question # 105

A hacker has managed to gain access to a Linux host and stolen the password file from /etc/passwd. How can he use it?

Options:

A.  

The password file does not contain the passwords themselves.

B.  

He can open it and read the user ids and corresponding passwords.

C.  

The file reveals the passwords to the root user only.

D.  

He cannot read it because it is encrypted.

Discussion 0
Question # 106

You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?

Options:

A.  

hping2 host.domain.com

B.  

hping2 --set-ICMP host.domain.com

C.  

hping2 -i host.domain.com

D.  

hping2 -1 host.domain.com

Discussion 0
Question # 107

Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?

Options:

A.  

A biometric system that bases authentication decisions on behavioral attributes.

B.  

A biometric system that bases authentication decisions on physical attributes.

C.  

An authentication system that creates one-time passwords that are encrypted with secret keys.

D.  

An authentication system that uses passphrases that are converted into virtual passwords.

Discussion 0
Question # 108

An attacker tries to do banner grabbing on a remote web server and executes the following command.

Question # 108

Service detection performed. Please report any incorrect results at http://nmap.org/submit/.

Nmap done: 1 IP address (1 host up) scanned in 6.42 seconds

What did the hacker accomplish?

Options:

A.  

nmap can't retrieve the version number of any running remote service.

B.  

The hacker successfully completed the banner grabbing.

C.  

The hacker should've used nmap -O host.domain.com.

D.  

The hacker failed to do banner grabbing as he didn't get the version of the Apache web server.

Discussion 0
Question # 109

By using a smart card and pin, you are using a two-factor authentication that satisfies

Options:

A.  

Something you know and something you are

B.  

Something you have and something you know

C.  

Something you have and something you are

D.  

Something you are and something you remember

Discussion 0
Question # 110

Sid is a judge for a programming contest. Before the code reaches him it goes through a restricted OS and is tested there. If it passes, then it moves onto Sid. What is this middle step called?

Options:

A.  

Fuzzy-testing the code

B.  

Third party running the code

C.  

Sandboxing the code

D.  

String validating the code

Discussion 0
Get CPEH-001 dumps and pass your exam in 24 hours!

Free Exams Sample Questions