Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CPEH-001 Certified Professional Ethical Hacker (CPEH) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CPEH-001 Practice Questions

Certified Professional Ethical Hacker (CPEH)

Last Update 4 days ago
Total Questions : 736

Dive into our fully updated and stable CPEH-001 practice test platform, featuring all the latest Information Systems Security exam questions added this week. Our preparation tool is more than just a GAQM study aid; it's a strategic advantage.

Our free Information Systems Security practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CPEH-001. Use this test to pinpoint which areas you need to focus your study on.

CPEH-001 PDF

CPEH-001 PDF (Printable)
$43.75
$124.99

CPEH-001 Testing Engine

CPEH-001 PDF (Printable)
$50.75
$144.99

CPEH-001 PDF + Testing Engine

CPEH-001 PDF (Printable)
$63.7
$181.99
Question # 71

Your next door neighbor, that you do not get along with, is having issues with their network, so he yells to his spouse the network's SSID and password and you hear them both clearly. What do you do with this information?

Options:

A.  

Nothing, but suggest to him to change the network's SSID and password.

B.  

Sell his SSID and password to friends that come to your house, so it doesn't slow down your network.

C.  

Log onto to his network, after all it's his fault that you can get in.

D.  

Only use his network when you have large downloads so you don't tax your own network.

Discussion 0
Question # 72

While you were gathering information as part of security assessments for one of your clients, you were able to gather data that show your client is involved with fraudulent activities. What should you do?

Options:

A.  

Immediately stop work and contact the proper legal authorities

B.  

Ignore the data and continue the assessment until completed as agreed

C.  

Confront the client in a respectful manner and ask her about the data

D.  

Copy the data to removable media and keep it in case you need it

Discussion 0
Question # 73

Which of the following is a form of penetration testing that relies heavily on human interaction and often involves tricking people into breaking normal security procedures?

Options:

A.  

Social Engineering

B.  

Piggybacking

C.  

Tailgating

D.  

Eavesdropping

Discussion 0
Question # 74

Matthew received an email with an attachment named “YouWon$10Grand.zip.” The zip file contains a file named “HowToClaimYourPrize.docx.exe.” Out of excitement and curiosity, Matthew opened the said file. Without his knowledge, the file copies itself to Matthew’s APPDATA\IocaI directory and begins to beacon to a Command-and-control server to download additional malicious binaries. What type of malware has Matthew encountered?

Options:

A.  

Key-logger

B.  

Trojan

C.  

Worm

D.  

Macro Virus

Discussion 0
Question # 75

Which type of security feature stops vehicles from crashing through the doors of a building?

Options:

A.  

Turnstile

B.  

Bollards

C.  

Mantrap

D.  

Receptionist

Discussion 0
Question # 76

What tool should you use when you need to analyze extracted metadata from files you collected when you were in the initial stage of penetration test (information gathering)?

Options:

A.  

Armitage

B.  

Dimitry

C.  

Metagoofil

D.  

cdpsnarf

Discussion 0
Question # 77

Which of the following BEST describes the mechanism of a Boot Sector Virus?

Options:

A.  

Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR

B.  

Moves the MBR to another location on the RAM and copies itself to the original location of the MBR

C.  

Overwrites the original MBR and only executes the new virus code

D.  

Modifies directory table entries so that directory entries point to the virus code instead of the actual program

Discussion 0
Question # 78

Which type of Nmap scan is the most reliable, but also the most visible, and likely to be picked up by and IDS?

Options:

A.  

SYN scan

B.  

ACK scan

C.  

RST scan

D.  

Connect scan

E.  

FIN scan

Discussion 0
Question # 79

Which of the following is the BEST way to protect Personally Identifiable Information (PII) from being exploited due to vulnerabilities of varying web applications?

Options:

A.  

Use cryptographic storage to store all PII

B.  

Use full disk encryption on all hard drives to protect PII

C.  

Use encrypted communications protocols to transmit PII

D.  

Use a security token to log into all Web applications that use PII

Discussion 0
Question # 80

Shellshock had the potential for an unauthorized user to gain access to a server. It affected many internet-facing services, which OS did it not directly affect?

Options:

A.  

Windows

B.  

Unix

C.  

Linux

D.  

OS X

Discussion 0
Get CPEH-001 dumps and pass your exam in 24 hours!

Free Exams Sample Questions