CPEH-001 Practice Online

Quickly grab our CPEH-001 product now and kickstart your exam preparation today!

Name: Certified Professional Ethical Hacker (CPEH)
Exam Code: CPEH-001
Certification: Information Systems Security
Vendor: GAQM
Total Questions: 881
Last Updated: May 09, 2024
Page:    1 / 177      
Total 881 Questions | Updated On: May 09, 2024
Question 1

Use the traceroute results shown above to answer the following
Question:
Other-Image-2b59c889b-c75b-4ac0-b591-85f86c0ab8a6
The perimeter security at targetcorp.com does not permit ICMP TTL-expired packets out.


Answer: A

Question 2

Michael is a junior security analyst working for the National Security Agency (NSA) working primarily on breaking terrorist encrypted messages. The NSA has a number of methods they use to decipher encrypted messages including Government Access to Keys (GAK) and inside informants. The NSA holds secret backdoor keys to many of the encryption algorithms used on the Internet. The problem for the NSA, and Michael, is that terrorist organizations are starting to use custom-built algorithms or obscure algorithms purchased from corrupt governments. For this reason, Michael and other security analysts like him have been forced to find different methods of deciphering terrorist messages. One method that Michael thought of using was to hide malicious code inside seemingly harmless programs. Michael first monitors sites and bulletin boards used by known terrorists, and then he is able to glean email addresses to some of these suspected terrorists. Michael then inserts a stealth keylogger into a mapping program file readme.txt and then sends that as an attachment to the terrorist. This keylogger takes screenshots every 2 minutes and also logs all keyboard activity into a hidden file on the terrorist's computer. Then, the keylogger emails those files to Michael twice a day with a built in SMTP server. What technique has Michael used to disguise this keylogging software?


Answer: C

Question 3

To what does ''message repudiation'' refer to what concept in the realm of email security?


Answer: A

Question 4

What are two types of ICMP code used when using the ping command?


Answer: A

Question 5

If an e-commerce site was put into a live environment and the programmers failed to remove the secret entry point that was used during the application development, what is this secret entry point known as?


Answer: D

Page:    1 / 177      
Total 881 Questions | Updated On: May 09, 2024