GAQM CPEH-001 Certified Professional Ethical Hacker (CPEH) Online Training
GAQM CPEH-001 Online Training
The questions for CPEH-001 were last updated at Feb 21,2025.
- Exam Code: CPEH-001
- Exam Name: Certified Professional Ethical Hacker (CPEH)
- Certification Provider: GAQM
- Latest update: Feb 21,2025
An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections.
When users accessed any page, the applet ran and exploited many machines.
Which one of the following tools the hacker probably used to inject HTML code?
- A . Wireshark
- B . Ettercap
- C . Aircrack-ng
- D . Tcpdump
An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections.
When users accessed any page, the applet ran and exploited many machines.
Which one of the following tools the hacker probably used to inject HTML code?
- A . Wireshark
- B . Ettercap
- C . Aircrack-ng
- D . Tcpdump
An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections.
When users accessed any page, the applet ran and exploited many machines.
Which one of the following tools the hacker probably used to inject HTML code?
- A . Wireshark
- B . Ettercap
- C . Aircrack-ng
- D . Tcpdump
An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections.
When users accessed any page, the applet ran and exploited many machines.
Which one of the following tools the hacker probably used to inject HTML code?
- A . Wireshark
- B . Ettercap
- C . Aircrack-ng
- D . Tcpdump
An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections.
When users accessed any page, the applet ran and exploited many machines.
Which one of the following tools the hacker probably used to inject HTML code?
- A . Wireshark
- B . Ettercap
- C . Aircrack-ng
- D . Tcpdump
You find that it is a CnC communication.
Which of the following solution will you suggest?
- A . Block the Blacklist IP’s @ Firewall
- B . Update the Latest Signatures on your IDS/IPS
- C . Clean the Malware which are trying to Communicate with the External Blacklist IP’s
- D . Both B and C
Security Policy is a definition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like Computer Security Policy, Information Protection Policy, Information Security Policy, network Security Policy, Physical Security Policy, Remote Access Policy, and User Account Policy.
What is the main theme of the sub-policies for Information Technologies?
- A . Availability, Non-repudiation, Confidentiality
- B . Authenticity, Integrity, Non-repudiation
- C . Confidentiality, Integrity, Availability
- D . Authenticity, Confidentiality, Integrity
Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?
- A . Omnidirectional antenna
- B . Dipole antenna
- C . Yagi antenna
- D . Parabolic grid antenna
Why should the security analyst disable/remove unnecessary ISAPI filters?
- A . To defend against social engineering attacks
- B . To defend against webserver attacks
- C . To defend against jailbreaking
- D . To defend against wireless attacks
If you want only to scan fewer ports than the default scan using Nmap tool, which option would you use?
- A . -sP
- B . -P
- C . -r
- D . -F