GAQM CPEH-001 Certified Professional Ethical Hacker (CPEH) Online Training
GAQM CPEH-001 Online Training
The questions for CPEH-001 were last updated at Feb 20,2025.
- Exam Code: CPEH-001
- Exam Name: Certified Professional Ethical Hacker (CPEH)
- Certification Provider: GAQM
- Latest update: Feb 20,2025
Based on the below log, which of the following sentences are true?
Mar 1, 2016, 7:33:28 AM 10.240.250.23 C 54373 10.249.253.15 C 22 tcp_ip
- A . SSH communications are encrypted it’s impossible to know who is the client or the server
- B . Application is FTP and 10.240.250.23 is the client and 10.249.253.15 is the server
- C . Application is SSH and 10.240.250.23 is the client and 10.249.253.15 is the server
- D . Application is SSH and 10.240.250.23 is the server and 10.249.253.15 is the server
DNS cache snooping is a process of determining if the specified resource address is present in the DNS cache records. It may be useful during the examination of the network to determine what software update resources are used, thus discovering what software is installed.
What command is used to determine if the entry is present in DNS cache?
- A . nslookup -fullrecursive update.antivirus.com
- B . dnsnooping Crt update.antivirus.com
- C . nslookup -norecursive update.antivirus.com
- D . dns –snoop update.antivirus.com
Which of the following is an adaptive SQL Injection testing technique used to discover coding errors by inputting massive amounts of random data and observing the changes in the output?
- A . Function Testing
- B . Dynamic Testing
- C . Static Testing
- D . Fuzzing Testing
Some clients of TPNQM SA were redirected to a malicious site when they tried to access the TPNQM main site. Bob, a system administrator at TPNQM SA, found that they were victims of DNS Cache Poisoning.
What should Bob recommend to deal with such a threat?
- A . The use of security agents in clients’ computers
- B . The use of DNSSEC
- C . The use of double-factor authentication
- D . Client awareness
In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?
- A . Keyed Hashing
- B . Key Stretching
- C . Salting
- D . Double Hashing
Which Nmap option would you use if you were not concerned about being detected and wanted to perform a very fast scan?
- A . CT0
- B . CT5
- C . -O
- D . -A
Which of the following provides a security professional with most information about the system’s security posture?
- A . Wardriving, warchalking, social engineering
- B . Social engineering, company site browsing, tailgating
- C . Phishing, spamming, sending trojans
- D . Port scanning, banner grabbing, service identification
Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate CPU and memory activities.
Which type of virus detection method did Chandler use in this context?
- A . Heuristic Analysis
- B . Code Emulation
- C . Integrity checking
- D . Scanning
An attacker scans a host with the below command.
Which three flags are set? (Choose three.)
#nmap CsX host.domain.com
- A . This is ACK scan. ACK flag is set
- B . This is Xmas scan. SYN and ACK flags are set
- C . This is Xmas scan. URG, PUSH and FIN are set
- D . This is SYN scan. SYN flag is set
Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?
- A . Internet Key Exchange (IKE)
- B . Oakley
- C . IPsec Policy Agent
- D . IPsec driver