GAQM CPEH-001 Certified Professional Ethical Hacker (CPEH) Online Training
GAQM CPEH-001 Online Training
The questions for CPEH-001 were last updated at Feb 20,2025.
- Exam Code: CPEH-001
- Exam Name: Certified Professional Ethical Hacker (CPEH)
- Certification Provider: GAQM
- Latest update: Feb 20,2025
In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?
- A . Chosen-plaintext attack
- B . Ciphertext-only attack
- C . Adaptive chosen-plaintext attack
- D . Known-plaintext attack
Which of the following attacks exploits web age vulnerabilities that allow an attacker to force an unsuspecting user’s browser to send malicious requests they did not intend?
- A . Command Injection Attacks
- B . File Injection Attack
- C . Cross-Site Request Forgery (CSRF)
- D . Hidden Field Manipulation Attack
Which is the first step followed by Vulnerability Scanners for scanning a network?
- A . TCP/UDP Port scanning
- B . Firewall detection
- C . OS Detection
- D . Checking if the remote host is alive
Alice encrypts her data using her public key PK and stores the encrypted data in the cloud.
Which of the following attack scenarios will compromise the privacy of her data?
- A . None of these scenarios compromise the privacy of Alice’s data
- B . Agent Andrew subpoenas Alice, forcing her to reveal her private key. However, the cloud server successfully resists Andrew’s attempt to access the stored data
- C . Hacker Harry breaks into the cloud server and steals the encrypted data
- D . Alice also stores her private key in the cloud, and Harry breaks into the cloud server as before
A hacker named Jack is trying to compromise a bank’s computer system. He needs to know the operating system of that computer to launch further attacks.
What process would help him?
- A . Banner Grabbing
- B . IDLE/IPID Scanning
- C . SSDP Scanning
- D . UDP Scanning
Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students.
He identified this when the IDS alerted for malware activities in the network.
What should Bob do to avoid this problem?
- A . Disable unused ports in the switches
- B . Separate students in a different VLAN
- C . Use the 802.1x protocol
- D . Ask students to use the wireless network
Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient’s consent, similar to email spamming?
- A . Bluesmacking
- B . Bluesniffing
- C . Bluesnarfing
- D . Bluejacking
Which of the following program infects the system boot sector and the executable files at the same time?
- A . Stealth virus
- B . Polymorphic virus
- C . Macro virus
- D . Multipartite Virus
You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for.
Which of the below scanning technique will you use?
- A . ACK flag scanning
- B . TCP Scanning
- C . IP Fragment Scanning
- D . Inverse TCP flag scanning
You perform a scan of your company’s network and discover that TCP port 123 is open.
What services by default run on TCP port 123?
- A . Telnet
- B . POP3
- C . Network Time Protocol
- D . DNS