Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CPEH-001 Certified Professional Ethical Hacker (CPEH) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CPEH-001 Practice Questions

Certified Professional Ethical Hacker (CPEH)

Last Update 4 days ago
Total Questions : 736

Dive into our fully updated and stable CPEH-001 practice test platform, featuring all the latest Information Systems Security exam questions added this week. Our preparation tool is more than just a GAQM study aid; it's a strategic advantage.

Our free Information Systems Security practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CPEH-001. Use this test to pinpoint which areas you need to focus your study on.

CPEH-001 PDF

CPEH-001 PDF (Printable)
$43.75
$124.99

CPEH-001 Testing Engine

CPEH-001 PDF (Printable)
$50.75
$144.99

CPEH-001 PDF + Testing Engine

CPEH-001 PDF (Printable)
$63.7
$181.99
Question # 11

Which of the following statements is TRUE?

Options:

A.  

Sniffers operate on Layer 2 of the OSI model

B.  

Sniffers operate on Layer 3 of the OSI model

C.  

Sniffers operate on both Layer 2 & Layer 3 of the OSI model.

D.  

Sniffers operate on the Layer 1 of the OSI model.

Discussion 0
Question # 12

In Wireshark, the packet bytes panes show the data of the current packet in which format?

Options:

A.  

Decimal

B.  

ASCII only

C.  

Binary

D.  

Hexadecimal

Discussion 0
Question # 13

In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?

Options:

A.  

Keyed Hashing

B.  

Key Stretching

C.  

Salting

D.  

Double Hashing

Discussion 0
Question # 14

A pen tester is configuring a Windows laptop for a test. In setting up Wireshark, what river and library

are required to allow the NIC to work in promiscuous mode?

Options:

A.  

Libpcap

B.  

Awinpcap

C.  

Winprom

D.  

Winpcap

Discussion 0
Question # 15

You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity, what tool would you most likely select?

Options:

A.  

Nmap

B.  

Cain & Abel

C.  

Nessus

D.  

Snort

Discussion 0
Question # 16

What network security concept requires multiple layers of security controls to be placed throughout an IT infrastructure, which improves the security posture of an organization to defend against malicious attacks or potential vulnerabilities?

What kind of Web application vulnerability likely exists in their software?

Options:

A.  

Host-Based Intrusion Detection System

B.  

Security through obscurity

C.  

Defense in depth

D.  

Network-Based Intrusion Detection System

Discussion 0
Question # 17

Study the snort rule given below:

Question # 17

From the options below, choose the exploit against which this rule applies.

Options:

A.  

WebDav

B.  

SQL Slammer

C.  

MS Blaster

D.  

MyDoom

Discussion 0
Question # 18

Which DNS resource record can indicate how long any "DNS poisoning" could last?

Options:

A.  

MX

B.  

SOA

C.  

NS

D.  

TIMEOUT

Discussion 0
Question # 19

A zone file consists of which of the following Resource Records (RRs)?

Options:

A.  

DNS, NS, AXFR, and MX records

B.  

DNS, NS, PTR, and MX records

C.  

SOA, NS, AXFR, and MX records

D.  

SOA, NS, A, and MX records

Discussion 0
Question # 20

You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers will never be able to gain access to your network with complex security system in place.

Your peer, Peter Smith who works at the same department disagrees with you.

He says even the best network security technologies cannot prevent hackers gaining access to the network because of presence of "weakest link" in the security chain.

What is Peter Smith talking about?

Options:

A.  

Untrained staff or ignorant computer users who inadvertently become the weakest link in your security chain

B.  

"zero-day" exploits are the weakest link in the security chain since the IDS will not be able to detect these attacks

C.  

"Polymorphic viruses" are the weakest link in the security chain since the Anti-Virus scanners will not be able to detect these attacks

D.  

Continuous Spam e-mails cannot be blocked by your security system since spammers use different techniques to bypass the filters in your gateway

Discussion 0
Get CPEH-001 dumps and pass your exam in 24 hours!

Free Exams Sample Questions