Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Professional Ethical Hacker (CPEH)

Last Update 3 hours ago Total Questions : 736

The Certified Professional Ethical Hacker (CPEH) content is now fully updated, with all current exam questions added 3 hours ago. Deciding to include CPEH-001 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CPEH-001 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CPEH-001 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Professional Ethical Hacker (CPEH) practice test comfortably within the allotted time.

Question # 121

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

A.

ESP transport mode

B.

AH permiscuous

C.

ESP confidential

D.

AH Tunnel mode

Question # 122

This asymmetry cipher is based on factoring the product of two large prime numbers.

What cipher is described above?

A.

RSA

B.

SHA

C.

RC5

D.

MD5

Question # 123

Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?

A.

PKI

B.

single sign on

C.

biometrics

D.

SOA

Question # 124

You are performing a penetration test. You achieved access via a buffer overflow exploit and you proceed to find interesting data, such as files with usernames and passwords. You find a hidden folder that has the administrator ' s bank account password and login information for the administrator ' s bitcoin account.

What should you do?

A.

Report immediately to the administrator

B.

Do not report it and continue the penetration test.

C.

Transfer money from the administrator ' s account to another account.

D.

Do not transfer the money but steal the bitcoins.

Question # 125

A hacker has successfully infected an internet-facing server which he will then use to send junk mail, take part in coordinated attacks, or host junk email content.

Which sort of trojan infects this server?

A.

Botnet Trojan

B.

Turtle Trojans

C.

Banking Trojans

D.

Ransomware Trojans

Question # 126

Under the " Post-attack Phase and Activities " , it is the responsibility of the tester to restore the systems to a pre-test state.

Which of the following activities should not be included in this phase? (see exhibit)

Exhibit:

A.

III

B.

IV

C.

III and IV

D.

All should be included.

Question # 127

Your team has won a contract to infiltrate an organization. The company wants to have the attack be as realistic as possible; therefore, they did not provide any information besides the company name.

What should be the first step in security testing the client?

A.

Reconnaissance

B.

Enumeration

C.

Scanning

D.

Escalation

Question # 128

You have successfully gained access to a linux server and would like to ensure that the succeeding outgoing traffic from this server will not be caught by a Network Based Intrusion Detection Systems (NIDS).

What is the best way to evade the NIDS?

A.

Encryption

B.

Protocol Isolation

C.

Alternate Data Streams

D.

Out of band signalling

Question # 129

Initiating an attack against targeted businesses and organizations, threat actors compromise a carefully selected website by inserting an exploit resulting in malware infection. The attackers run exploits on well-known and trusted sites likely to be visited by their targeted victims. Aside from carefully choosing sites to compromise, these attacks are known to incorporate zero-day exploits that target unpatched vulnerabilities. Thus, the targeted entities are left with little or no defense against these exploits.

What type of attack is outlined in the scenario?

A.

Watering Hole Attack

B.

Heartbleed Attack

C.

Shellshock Attack

D.

Spear Phising Attack

Question # 130

Perspective clients want to see sample reports from previous penetration tests.

What should you do next?

A.

Decline but, provide references.

B.

Share full reports, not redacted.

C.

Share full reports with redactions.

D.

Share reports, after NDA is signed.

Question # 131

env x=`(){ :;};echo exploit` bash -c ' cat /etc/passwd '

What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?

A.

Display passwd content to prompt

B.

Removes the passwd file

C.

Changes all passwords in passwd

D.

Add new user to the passwd file

Question # 132

You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine.

What wireshark filter will show the connections from the snort machine to kiwi syslog machine?

A.

tcp.dstport==514 & & ip.dst==192.168.0.150

B.

tcp.srcport==514 & & ip.src==192.168.0.99

C.

tcp.dstport==514 & & ip.dst==192.168.0.0/16

D.

tcp.srcport==514 & & ip.src==192.168.150

Question # 133

Which statement is TRUE regarding network firewalls preventing Web Application attacks?

A.

Network firewalls can prevent attacks because they can detect malicious HTTP traffic.

B.

Network firewalls cannot prevent attacks because ports 80 and 443 must be opened.

C.

Network firewalls can prevent attacks if they are properly configured.

D.

Network firewalls cannot prevent attacks because they are too complex to configure.

Question # 134

Which of the following is assured by the use of a hash?

A.

Integrity

B.

Confidentiality

C.

Authentication

D.

Availability

Question # 135

Which of the following is the BEST way to defend against network sniffing?

A.

Using encryption protocols to secure network communications

B.

Register all machines MAC Address in a Centralized Database

C.

Restrict Physical Access to Server Rooms hosting Critical Servers

D.

Use Static IP Address

Go to page: