GAQM CPEH-001 Certified Professional Ethical Hacker (CPEH) Online Training
GAQM CPEH-001 Online Training
The questions for CPEH-001 were last updated at Nov 20,2024.
- Exam Code: CPEH-001
- Exam Name: Certified Professional Ethical Hacker (CPEH)
- Certification Provider: GAQM
- Latest update: Nov 20,2024
Trinity needs to scan all hosts on a /16 network for TCP port 445 only.
What is the fastest way she can accomplish this with Nmap? Stealth is not a concern.
- A . nmap -sn -sF 10.1.0.0/16 445
- B . nmap -p 445 -n -T4 Copen 10.1.0.0/16
- C . nmap -s 445 -sU -T5 10.1.0.0/16
- D . nmap -p 445 Cmax -Pn 10.1.0.0/16
You are working as a Security Analyst in a company XYZ that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8.
While monitoring the data, you find a high number of outbound connections. You see that IP’s owned by XYZ (Internal) and private IP’s are communicating to a Single Public IP. Therefore, the Internal IP’s are sending data to the Public IP.
After further analysis, you find out that this Public IP is a blacklisted IP, and the internal communicating devices are compromised.
What kind of attack does the above scenario depict?
- A . Botnet Attack
- B . Spear Phishing Attack
- C . Advanced Persistent Threats
- D . Rootkit Attack
A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer’s software and hardware without the owner’s permission. Their intention can either be to simply gain knowledge or to illegally make changes.
Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?
- A . Suicide Hacker
- B . Black Hat
- C . White Hat
- D . Gray Hat
Which of the below hashing functions are not recommended for use?
- A . SHA-1.ECC
- B . MD5, SHA-1
- C . SHA-2. SHA-3
- D . MD5. SHA-5
An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush.
What type of breach has the individual just performed?
- A . Reverse Social Engineering
- B . Tailgating
- C . Piggybacking
- D . Announced
Which of the following is the best countermeasure to encrypting ransomwares?
- A . Use multiple antivirus softwares
- B . Keep some generation of off-line backup
- C . Analyze the ransomware to get decryption key of encrypted data
- D . Pay a ransom
If an attacker uses the command SELECT*FROM user WHERE name = ‘x’ AND userid IS NULL; –‘; which type of SQL injection attack is the attacker performing?
- A . End of Line Comment
- B . UNION SQL Injection
- C . Illegal/Logically Incorrect Query
- D . Tautology
Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?
- A . Produces less false positives
- B . Can identify unknown attacks
- C . Requires vendor updates for a new threat
- D . Cannot deal with encrypted network traffic
Which of the following act requires employer’s standard national numbers to identify them on standard transactions?
- A . SOX
- B . HIPAA
- C . DMCA
- D . PCI-DSS
In Wireshark, the packet bytes panes show the data of the current packet in which format?
- A . Decimal
- B . ASCII only
- C . Binary
- D . Hexadecimal