GAQM CPEH-001 Certified Professional Ethical Hacker (CPEH) Online Training
GAQM CPEH-001 Online Training
The questions for CPEH-001 were last updated at Feb 20,2025.
- Exam Code: CPEH-001
- Exam Name: Certified Professional Ethical Hacker (CPEH)
- Certification Provider: GAQM
- Latest update: Feb 20,2025
Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.
A camera captures people walking and identifies the individuals using Steve’s approach.
After that, people must approximate their RFID badges. Both the identifications are required to open the door.
In this case, we can say:
- A . Although the approach has two phases, it actually implements just one authentication factor
- B . The solution implements the two authentication factors: physical object and physical characteristic
- C . The solution will have a high level of false positives
- D . Biological motion cannot be used to identify people
Which protocol is used for setting up secure channels between two devices, typically in VPNs?
- A . PPP
- B . IPSEC
- C . PEM
- D . SET
Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?
- A . SHA-2
- B . SHA-3
- C . SHA-1
- D . SHA-0
Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?
- A . Bootrom Exploit
- B . iBoot Exploit
- C . Sandbox Exploit
- D . Userland Exploit
Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.
- A . SQL injection attack
- B . Cross-Site Scripting (XSS)
- C . LDAP Injection attack
- D . Cross-Site Request Forgery (CSRF)
You are attempting to run an Nmap port scan on a web server.
Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?
- A . nmap CA – Pn
- B . nmap CsP Cp-65535-T5
- C . nmap CsT CO CT0
- D . nmap CA –host-timeout 99-T1
Code injection is a form of attack in which a malicious user:
- A . Inserts text into a data field that gets interpreted as code
- B . Gets the server to execute arbitrary code using a buffer overflow
- C . Inserts additional code into the JavaScript running in the browser
- D . Gains access to the codebase on the server and inserts new code
The collection of potentially actionable, overt, and publicly available information is known as
- A . Open-source intelligence
- B . Human intelligence
- C . Social intelligence
- D . Real intelligence
Which one of the following Google advanced search operators allows an attacker to restrict the results to those websites in the given domain?
- A . [cache:]
- B . [site:]
- C . [inurl:]
- D . [link:]
Firewalls are the software or hardware systems that are able to control and monitor the traffic coming in and out the target network based on pre-defined set of rules.
Which of the following types of firewalls can protect against SQL injection attacks?
- A . Data-driven firewall
- B . Stateful firewall
- C . Packet firewall
- D . Web application firewall