GAQM CPEH-001 Certified Professional Ethical Hacker (CPEH) Online Training
GAQM CPEH-001 Online Training
The questions for CPEH-001 were last updated at Nov 19,2024.
- Exam Code: CPEH-001
- Exam Name: Certified Professional Ethical Hacker (CPEH)
- Certification Provider: GAQM
- Latest update: Nov 19,2024
In the field of cryptanalysis, what is meant by a “rubber-hose" attack?
- A . Attempting to decrypt cipher text by making logical assumptions about the contents of the original plain text.
- B . Extraction of cryptographic secrets through coercion or torture.
- C . Forcing the targeted key stream through a hardware-accelerated device such as an ASIC.
- D . A backdoor placed into a cryptographic algorithm by its creator.
What type of analysis is performed when an attacker has partial knowledge of inner-workings of the application?
- A . Black-box
- B . Announced
- C . White-box
- D . Grey-box
Which of the following steps for risk assessment methodology refers to vulnerability identification?
- A . Determines if any flaws exist in systems, policies, or procedures
- B . Assigns values to risk probabilities; Impact values.
- C . Determines risk probability that vulnerability will be exploited (High. Medium, Low)
- D . Identifies sources of harm to an IT system. (Natural, Human. Environmental)
Log monitoring tools performing behavioral analysis have alerted several suspicious logins on a Linux server occurring during non-business hours. After further examination of all login activities, it is noticed that none of the logins have occurred during typical work hours. A Linux administrator who is investigating this problem realizes the system time on the Linux server is wrong by more than twelve hours.
What protocol used on Linux servers to synchronize the time has stopped working?
- A . Time Keeper
- B . NTP
- C . PPP
- D . OSPP
What is the minimum number of network connections in a multi homed firewall?
- A . 3
- B . 5
- C . 4
- D . 2
Which of the following DoS tools is used to attack target web applications by starvation of available sessions on the web server?
The tool keeps sessions at halt using never-ending POST transmissions and sending an arbitrarily large content-length header value.
- A . My Doom
- B . Astacheldraht
- C . R-U-Dead-Yet? (RUDY)
- D . LOIC
During the process of encryption and decryption, what keys are shared?
- A . Private keys
- B . User passwords
- C . Public keys
- D . Public and private keys
You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity, what tool would you most likely select?
- A . Nmap
- B . Cain & Abel
- C . Nessus
- D . Snort
How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender’s identity?
- A . Hash value
- B . Private key
- C . Digital signature
- D . Digital certificate
The network team has well-established procedures to follow for creating new rules on the firewall. This includes having approval from a manager prior to implementing any new rules. While reviewing the firewall configuration, you notice a recently implemented rule but cannot locate manager approval for it.
What would be a good step to have in the procedures for a situation like this?
- A . Have the network team document the reason why the rule was implemented without prior manager approval.
- B . Monitor all traffic using the firewall rule until a manager can approve it.
- C . Do not roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.
- D . Immediately roll back the firewall rule until a manager can approve it