Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GAQM CPEH-001 Practice Exam with Questions & Answers | Set: 6

Questions 76

A possibly malicious sequence of packets that were sent to a web server has been captured by an Intrusion Detection System (IDS) and was saved to a PCAP file. As a network administrator, you need to determine whether this packets are indeed malicious. What tool are you going to use?

Options:
A.

Intrusion Prevention System (IPS)

B.

Vulnerability scanner

C.

Protocol analyzer

D.

Network sniffer

GAQM CPEH-001 Premium Access
Questions 77

You’ve just discovered a server that is currently active within the same network with the machine you recently compromised. You ping it but it did not respond. What could be the case?

Options:
A.

TCP/IP doesn’t support ICMP

B.

ARP is disabled on the target server

C.

ICMP could be disabled on the target server

D.

You need to run the ping command with root privileges

Questions 78

When security and confidentiality of data within the same LAN is of utmost priority, which IPSec mode should you implement?

Options:
A.

AH Tunnel mode

B.

AH promiscuous

C.

ESP transport mode

D.

ESP confidential

Questions 79

Which of the following is NOT an ideal choice for biometric controls?

Options:
A.

Iris patterns

B.

Fingerprints

C.

Height and weight

D.

Voice

Questions 80

In order to prevent particular ports and applications from getting packets into an organization, what does a firewall check?

Options:
A.

Network layer headers and the session layer port numbers

B.

Presentation layer headers and the session layer port numbers

C.

Application layer port numbers and the transport layer headers

D.

Transport layer port numbers and application layer headers

Questions 81

........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. It is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hotspot by posing as a legitimate provider. This type of attack may be used to steal the passwords of unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there.

Fill in the blank with appropriate choice.

Options:
A.

Collision Attack

B.

Evil Twin Attack

C.

Sinkhole Attack

D.

Signal Jamming Attack

Questions 82

One of the Forbes 500 companies has been subjected to a large scale attack. You are one of the shortlisted pen testers that they may hire. During the interview with the CIO, he emphasized that he wants to totally eliminate all risks. What is one of the first things you should do when hired?

Options:
A.

Interview all employees in the company to rule out possible insider threats.

B.

Establish attribution to suspected attackers.

C.

Explain to the CIO that you cannot eliminate all risk, but you will be able to reduce risk to acceptable levels.

D.

Start the Wireshark application to start sniffing network traffic.

Questions 83

An nmap command that includes the host specification of 202.176.56-57.* will scan _______ number of hosts.

Options:
A.

2

B.

256

C.

512

D.

Over 10, 000

Questions 84

Neil notices that a single address is generating traffic from its port 500 to port 500 of several other machines on the network. This scan is eating up most of the network bandwidth and Neil is concerned. As a security professional, what would you infer from this scan?

Options:
A.

It is a network fault and the originating machine is in a network loop

B.

It is a worm that is malfunctioning or hardcoded to scan on port 500

C.

The attacker is trying to detect machines on the network which have SSL enabled

D.

The attacker is trying to determine the type of VPN implementation and checking for IPSec

Questions 85

Shellshock had the potential for an unauthorized user to gain access to a server. It affected many internet-facing services, which OS did it not directly affect?

Options:
A.

Windows

B.

Unix

C.

Linux

D.

OS X

Questions 86

XOR is a common cryptographic tool. 10110001 XOR 00111010 is?

Options:
A.

10111100

B.

11011000

C.

10011101

D.

10001011

Questions 87

While you were gathering information as part of security assessments for one of your clients, you were able to gather data that show your client is involved with fraudulent activities. What should you do?

Options:
A.

Immediately stop work and contact the proper legal authorities

B.

Ignore the data and continue the assessment until completed as agreed

C.

Confront the client in a respectful manner and ask her about the data

D.

Copy the data to removable media and keep it in case you need it

Questions 88

As an Ethical Hacker you are capturing traffic from your customer network with Wireshark and you need to find and verify just SMTP traffic. What command in Wireshark will help you to find this kind of traffic?

Options:
A.

request smtp 25

B.

tcp.port eq 25

C.

smtp port

D.

tcp.contains port 25

Questions 89

While doing a technical assessment to determine network vulnerabilities, you used the TCP XMAS scan. What would be the response of all open ports?

Options:
A.

The port will send an ACK

B.

The port will send a SYN

C.

The port will ignore the packets

D.

The port will send an RST

Questions 90

Bob received this text message on his mobile phone: ““Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: scottsmelby@yahoo.com””. Which statement below is true?

Options:
A.

This is probably a legitimate message as it comes from a respectable organization.

B.

Bob should write to scottsmelby@yahoo.com to verify the identity of Scott.

C.

This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.

D.

This is a scam because Bob does not know Scott.