Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CPEH-001 Certified Professional Ethical Hacker (CPEH) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CPEH-001 Practice Questions

Certified Professional Ethical Hacker (CPEH)

Last Update 4 days ago
Total Questions : 736

Dive into our fully updated and stable CPEH-001 practice test platform, featuring all the latest Information Systems Security exam questions added this week. Our preparation tool is more than just a GAQM study aid; it's a strategic advantage.

Our free Information Systems Security practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CPEH-001. Use this test to pinpoint which areas you need to focus your study on.

CPEH-001 PDF

CPEH-001 PDF (Printable)
$43.75
$124.99

CPEH-001 Testing Engine

CPEH-001 PDF (Printable)
$50.75
$144.99

CPEH-001 PDF + Testing Engine

CPEH-001 PDF (Printable)
$63.7
$181.99
Question # 51

You have successfully gained access to a linux server and would like to ensure that the succeeding outgoing traffic from this server will not be caught by a Network Based Intrusion Detection Systems (NIDS).

What is the best way to evade the NIDS?

Options:

A.  

Encryption

B.  

Protocol Isolation

C.  

Alternate Data Streams

D.  

Out of band signalling

Discussion 0
Question # 52

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration?

alert tcp any any -> 192.168.100.0/24 21 (msg: "FTP on the network!";)

Options:

A.  

An Intrusion Detection System

B.  

A firewall IPTable

C.  

A Router IPTable

D.  

FTP Server rule

Discussion 0
Question # 53

Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?

Options:

A.  

PKI

B.  

single sign on

C.  

biometrics

D.  

SOA

Discussion 0
Question # 54

Which of the following is a design pattern based on distinct pieces of software providing application functionality as services to other applications?

Options:

A.  

Service Oriented Architecture

B.  

Object Oriented Architecture

C.  

Lean Coding

D.  

Agile Process

Discussion 0
Question # 55

What is the process of logging, recording, and resolving events that take place in an organization?

Options:

A.  

Incident Management Process

B.  

Security Policy

C.  

Internal Procedure

D.  

Metrics

Discussion 0
Question # 56

You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine.

What wireshark filter will show the connections from the snort machine to kiwi syslog machine?

Options:

A.  

tcp.dstport==514 && ip.dst==192.168.0.150

B.  

tcp.srcport==514 && ip.src==192.168.0.99

C.  

tcp.dstport==514 && ip.dst==192.168.0.0/16

D.  

tcp.srcport==514 && ip.src==192.168.150

Discussion 0
Question # 57

Nation-state threat actors often discover vulnerabilities and hold on to them until they want to launch a sophisticated attack. The Stuxnet attack was an unprecedented style of attack because it used four types of vulnerability.

What is this style of attack called?

Options:

A.  

zero-day

B.  

zero-hour

C.  

zero-sum

D.  

no-day

Discussion 0
Question # 58

Which tool allows analysts and pen testers to examine links between data using graphs and link analysis?

Options:

A.  

Maltego

B.  

Cain & Abel

C.  

Metasploit

D.  

Wireshark

Discussion 0
Question # 59

You are performing a penetration test. You achieved access via a buffer overflow exploit and you proceed to find interesting data, such as files with usernames and passwords. You find a hidden folder that has the administrator's bank account password and login information for the administrator's bitcoin account.

What should you do?

Options:

A.  

Report immediately to the administrator

B.  

Do not report it and continue the penetration test.

C.  

Transfer money from the administrator's account to another account.

D.  

Do not transfer the money but steal the bitcoins.

Discussion 0
Question # 60

Which of the following is the successor of SSL?

Options:

A.  

TLS

B.  

RSA

C.  

GRE

D.  

IPSec

Discussion 0
Get CPEH-001 dumps and pass your exam in 24 hours!

Free Exams Sample Questions