Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Professional Ethical Hacker (CPEH)

Last Update 3 hours ago Total Questions : 736

The Certified Professional Ethical Hacker (CPEH) content is now fully updated, with all current exam questions added 3 hours ago. Deciding to include CPEH-001 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CPEH-001 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CPEH-001 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Professional Ethical Hacker (CPEH) practice test comfortably within the allotted time.

Question # 76

What is the least important information when you analyze a public IP address in a security alert?

A.

ARP

B.

Whois

C.

DNS

D.

Geolocation

Question # 77

The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the host 10.0.0.3. He also needs to permit all FTP traffic to the rest of the network and deny all other traffic. After he applied his ACL configuration in the router, nobody can access to the ftp, and the permitted hosts cannot access the Internet. According to the next configuration, what is happening in the network?

A.

The ACL 104 needs to be first because is UDP

B.

The ACL 110 needs to be changed to port 80

C.

The ACL for FTP must be before the ACL 110

D.

The first ACL is denying all TCP traffic and the other ACLs are being ignored by the router

Question # 78

What is the purpose of a demilitarized zone on a network?

A.

To scan all traffic coming through the DMZ to the internal network

B.

To only provide direct access to the nodes within the DMZ and protect the network behind it

C.

To provide a place to put the honeypot

D.

To contain the network devices you wish to protect

Question # 79

Which one of the following Google advanced search operators allows an attacker to restrict the results to those websites in the given domain?

A.

[cache:]

B.

[site:]

C.

[inurl:]

D.

[link:]

Question # 80

An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections.

When users accessed any page, the applet ran and exploited many machines.

Which one of the following tools the hacker probably used to inject HTML code?

A.

Wireshark

B.

Ettercap

C.

Aircrack-ng

D.

Tcpdump

Question # 81

A hacker named Jack is trying to compromise a bank’s computer system. He needs to know the operating system of that computer to launch further attacks.

What process would help him?

A.

Banner Grabbing

B.

IDLE/IPID Scanning

C.

SSDP Scanning

D.

UDP Scanning

Question # 82

Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.

A camera captures people walking and identifies the individuals using Steve’s approach.

After that, people must approximate their RFID badges. Both the identifications are required to open the door.

In this case, we can say:

A.

Although the approach has two phases, it actually implements just one authentication factor

B.

The solution implements the two authentication factors: physical object and physical characteristic

C.

The solution will have a high level of false positives

D.

Biological motion cannot be used to identify people

Question # 83

Knowing the nature of backup tapes, which of the following is the MOST RECOMMENDED way of storing backup tapes?

A.

In a cool dry environment

B.

Inside the data center for faster retrieval in a fireproof safe

C.

In a climate controlled facility offsite

D.

On a different floor in the same building

Question # 84

Which of the following tools would MOST LIKELY be used to perform security audit on various of forms of network systems?

A.

Intrusion Detection System

B.

Vulnerability scanner

C.

Port scanner

D.

Protocol analyzer

Question # 85

Security and privacy of/on information systems are two entities that requires lawful regulations. Which of the following regulations defines security and privacy controls for Federal information systems and organizations?

A.

NIST SP 800-53

B.

PCI-DSS

C.

EU Safe Harbor

D.

HIPAA

Question # 86

You want to analyze packets on your wireless network. Which program would you use?

A.

Wireshark with Airpcap

B.

Airsnort with Airpcap

C.

Wireshark with Winpcap

D.

Ethereal with Winpcap

Question # 87

Which specific element of security testing is being assured by using hash?

A.

Authentication

B.

Integrity

C.

Confidentiality

D.

Availability

Question # 88

XOR is a common cryptographic tool. 10110001 XOR 00111010 is?

A.

10111100

B.

11011000

C.

10011101

D.

10001011

Question # 89

This configuration allows NIC to pass all traffic it receives to the Central Processing Unit (CPU), instead of passing only the frames that the controller is intended to receive. Select the option that BEST describes the above statement.

A.

Multi-cast mode

B.

WEM

C.

Promiscuous mode

D.

Port forwarding

Question # 90

What attack is used to crack passwords by using a precomputed table of hashed passwords?

A.

Brute Force Attack

B.

Hybrid Attack

C.

Rainbow Table Attack

D.

Dictionary Attack

Go to page: