GAQM CPEH-001 Certified Professional Ethical Hacker (CPEH) Online Training
GAQM CPEH-001 Online Training
The questions for CPEH-001 were last updated at Feb 21,2025.
- Exam Code: CPEH-001
- Exam Name: Certified Professional Ethical Hacker (CPEH)
- Certification Provider: GAQM
- Latest update: Feb 21,2025
You are looking for SQL injection vulnerability by sending a special character to web applications.
Which of the following is the most useful for quick validation?
- A . Double quotation
- B . Backslash
- C . Semicolon
- D . Single quotation
A virus that attempts to install itself inside the file it is infecting is called?
- A . Tunneling virus
- B . Cavity virus
- C . Polymorphic virus
- D . Stealth virus
Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations.
Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA.
In this context, what can you say?
- A . Bob can be right since DMZ does not make sense when combined with stateless firewalls
- B . Bob is partially right. He does not need to separate networks if he can create rules by destination IPs, one by one
- C . Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations
- D . Bob is partially right. DMZ does not make sense when a stateless firewall is available
Sam is working as s pen-tester in an organization in Houston. He performs penetration testing on IDS in order to find the different ways an attacker uses to evade the IDS. Sam sends a large amount of packets to the target IDS that generates alerts, which enable Sam to hide the real traffic.
What type of method is Sam using to evade IDS?
- A . Denial-of-Service
- B . False Positive Generation
- C . Insertion Attack
- D . Obfuscating