Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CPEH-001 Certified Professional Ethical Hacker (CPEH) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CPEH-001 Practice Questions

Certified Professional Ethical Hacker (CPEH)

Last Update 4 days ago
Total Questions : 736

Dive into our fully updated and stable CPEH-001 practice test platform, featuring all the latest Information Systems Security exam questions added this week. Our preparation tool is more than just a GAQM study aid; it's a strategic advantage.

Our free Information Systems Security practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CPEH-001. Use this test to pinpoint which areas you need to focus your study on.

CPEH-001 PDF

CPEH-001 PDF (Printable)
$43.75
$124.99

CPEH-001 Testing Engine

CPEH-001 PDF (Printable)
$50.75
$144.99

CPEH-001 PDF + Testing Engine

CPEH-001 PDF (Printable)
$63.7
$181.99
Question # 81

How can a policy help improve an employee's security awareness?

Options:

A.  

By implementing written security procedures, enabling employee security training, and promoting the benefits of security

B.  

By using informal networks of communication, establishing secret passing procedures, and immediately terminating employees

C.  

By sharing security secrets with employees, enabling employees to share secrets, and establishing a consultative help line

D.  

By decreasing an employee's vacation time, addressing ad-hoc employment clauses, and ensuring that managers know employee strengths

Discussion 0
Question # 82

When setting up a wireless network, an administrator enters a pre-shared key for security. Which of the following is true?

Options:

A.  

The key entered is a symmetric key used to encrypt the wireless data.

B.  

The key entered is a hash that is used to prove the integrity of the wireless data.

C.  

The key entered is based on the Diffie-Hellman method.

D.  

The key is an RSA key used to encrypt the wireless data.

Discussion 0
Question # 83

For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?

Options:

A.  

Sender's public key

B.  

Receiver's private key

C.  

Receiver's public key

D.  

Sender's private key

Discussion 0
Question # 84

Which of the following is a common Service Oriented Architecture (SOA) vulnerability?

Options:

A.  

Cross-site scripting

B.  

SQL injection

C.  

VPath injection

D.  

XML denial of service issues

Discussion 0
Question # 85

A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which of the following has occurred?

Options:

A.  

The gateway is not routing to a public IP address.

B.  

The computer is using an invalid IP address.

C.  

The gateway and the computer are not on the same network.

D.  

The computer is not using a private IP address.

Discussion 0
Question # 86

Which of the following is an advantage of utilizing security testing methodologies to conduct a security audit?

Options:

A.  

They provide a repeatable framework.

B.  

Anyone can run the command line scripts.

C.  

They are available at low cost.

D.  

They are subject to government regulation.

Discussion 0
Question # 87

Some passwords are stored using specialized encryption algorithms known as hashes. Why is this an appropriate method?

Options:

A.  

It is impossible to crack hashed user passwords unless the key used to encrypt them is obtained.

B.  

If a user forgets the password, it can be easily retrieved using the hash key stored by administrators.

C.  

Hashing is faster compared to more traditional encryption algorithms.

D.  

Passwords stored using hashes are non-reversible, making finding the password much more difficult.

Discussion 0
Question # 88

Which type of security document is written with specific step-by-step details?

Options:

A.  

Process

B.  

Procedure

C.  

Policy

D.  

Paradigm

Discussion 0
Question # 89

In the OSI model, where does PPTP encryption take place?

Options:

A.  

Transport layer

B.  

Application layer

C.  

Data link layer

D.  

Network layer

Discussion 0
Question # 90

How do employers protect assets with security policies pertaining to employee surveillance activities?

Options:

A.  

Employers promote monitoring activities of employees as long as the employees demonstrate trustworthiness.

B.  

Employers use informal verbal communication channels to explain employee monitoring activities to employees.

C.  

Employers use network surveillance to monitor employee email traffic, network access, and to record employee keystrokes.

D.  

Employers provide employees written statements that clearly discuss the boundaries of monitoring activities and consequences.

Discussion 0
Get CPEH-001 dumps and pass your exam in 24 hours!

Free Exams Sample Questions