Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CPEH-001 Certified Professional Ethical Hacker (CPEH) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CPEH-001 Practice Questions

Certified Professional Ethical Hacker (CPEH)

Last Update 4 days ago
Total Questions : 736

Dive into our fully updated and stable CPEH-001 practice test platform, featuring all the latest Information Systems Security exam questions added this week. Our preparation tool is more than just a GAQM study aid; it's a strategic advantage.

Our free Information Systems Security practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CPEH-001. Use this test to pinpoint which areas you need to focus your study on.

CPEH-001 PDF

CPEH-001 PDF (Printable)
$43.75
$124.99

CPEH-001 Testing Engine

CPEH-001 PDF (Printable)
$50.75
$144.99

CPEH-001 PDF + Testing Engine

CPEH-001 PDF (Printable)
$63.7
$181.99
Question # 41

A hacker is attempting to see which ports have been left open on a network. Which NMAP switch would the hacker use?

Options:

A.  

-sO

B.  

-sP

C.  

-sS

D.  

-sU

Discussion 0
Question # 42

A company has publicly hosted web applications and an internal Intranet protected by a firewall. Which technique will help protect against enumeration?

Options:

A.  

Reject all invalid email received via SMTP.

B.  

Allow full DNS zone transfers.

C.  

Remove A records for internal hosts.

D.  

Enable null session pipes.

Discussion 0
Question # 43

John the Ripper is a technical assessment tool used to test the weakness of which of the following?

Options:

A.  

Usernames

B.  

File permissions

C.  

Firewall rulesets

D.  

Passwords

Discussion 0
Question # 44

Which set of access control solutions implements two-factor authentication?

Options:

A.  

USB token and PIN

B.  

Fingerprint scanner and retina scanner

C.  

Password and PIN

D.  

Account and password

Discussion 0
Question # 45

What technique is used to perform a Connection Stream Parameter Pollution (CSPP) attack?

Options:

A.  

Injecting parameters into a connection string using semicolons as a separator

B.  

Inserting malicious Javascript code into input parameters

C.  

Setting a user's session identifier (SID) to an explicit known value

D.  

Adding multiple parameters with the same name in HTTP requests

Discussion 0
Question # 46

In order to show improvement of security over time, what must be developed?

Options:

A.  

Reports

B.  

Testing tools

C.  

Metrics

D.  

Taxonomy of vulnerabilities

Discussion 0
Question # 47

How can rainbow tables be defeated?

Options:

A.  

Password salting

B.  

Use of non-dictionary words

C.  

All uppercase character passwords

D.  

Lockout accounts under brute force password cracking attempts

Discussion 0
Question # 48

One advantage of an application-level firewall is the ability to

Options:

A.  

filter packets at the network level.

B.  

filter specific commands, such as http:post.

C.  

retain state information for each packet.

D.  

monitor tcp handshaking.

Discussion 0
Question # 49

How does the Address Resolution Protocol (ARP) work?

Options:

A.  

It sends a request packet to all the network elements, asking for the MAC address from a specific IP.

B.  

It sends a reply packet to all the network elements, asking for the MAC address from a specific IP.

C.  

It sends a reply packet for a specific IP, asking for the MAC address.

D.  

It sends a request packet to all the network elements, asking for the domain name from a specific IP.

Discussion 0
Question # 50

Which of the following describes the characteristics of a Boot Sector Virus?

Options:

A.  

Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR

B.  

Moves the MBR to another location on the RAM and copies itself to the original location of the MBR

C.  

Modifies directory table entries so that directory entries point to the virus code instead of the actual program

D.  

Overwrites the original MBR and only executes the new virus code

Discussion 0
Get CPEH-001 dumps and pass your exam in 24 hours!

Free Exams Sample Questions