Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GAQM CPEH-001 Practice Exam with Questions & Answers | Set: 7

Questions 91

Which of the following is a form of penetration testing that relies heavily on human interaction and often involves tricking people into breaking normal security procedures?

Options:
A.

Social Engineering

B.

Piggybacking

C.

Tailgating

D.

Eavesdropping

GAQM CPEH-001 Premium Access
Questions 92

Which of the following will perform an Xmas scan using NMAP?

Options:
A.

nmap -sA 192.168.1.254

B.

nmap -sP 192.168.1.254

C.

nmap -sX 192.168.1.254

D.

nmap -sV 192.168.1.254

Questions 93

What does a type 3 code 13 represent? (Choose two.)

Options:
A.

Echo request

B.

Destination unreachable

C.

Network unreachable

D.

Administratively prohibited

E.

Port unreachable

F.

Time exceeded

Questions 94

Backing up data is a security must. However, it also has certain level of risks when mishandled. Which of the following is the greatest threat posed by backups?

Options:
A.

A backup is the source of Malware or illicit information

B.

A backup is incomplete because no verification was performed

C.

A backup is unavailable during disaster recovery

D.

An unencrypted backup can be misplaced or stolen

Questions 95

The following are types of Bluetooth attack EXCEPT_____?

Options:
A.

Bluejacking

B.

Bluesmaking

C.

Bluesnarfing

D.

Bluedriving

Questions 96

In IPv6 what is the major difference concerning application layer vulnerabilities compared to IPv4?

Options:
A.

Implementing IPv4 security in a dual-stack network offers protection from IPv6 attacks too.

B.

Vulnerabilities in the application layer are independent of the network layer. Attacks and mitigation techniques are almost identical.

C.

Due to the extensive security measures built in IPv6, application layer vulnerabilities need not be addresses.

D.

Vulnerabilities in the application layer are greatly different from IPv4.

Questions 97

Using Windows CMD, how would an attacker list all the shares to which the current user context has access?

Options:
A.

NET USE

B.

NET CONFIG

C.

NET FILE

D.

NET VIEW

Questions 98

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

Options:
A.

tcpdump

B.

nessus

C.

etherea

D.

Jack the ripper

Questions 99

You've gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your tool kit you have an Ubuntu 9.10 Linux LiveCD. Which Linux based tool has the ability to change any user's password or to activate disabled Windows accounts?

Options:
A.

CHNTPW

B.

Cain & Abel

C.

SET

D.

John the Ripper

Questions 100

What is the process of logging, recording, and resolving events that take place in an organization?

Options:
A.

Incident Management Process

B.

Security Policy

C.

Internal Procedure

D.

Metrics

Questions 101

This tool is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.

Which of the following tools is being described?

Options:
A.

Aircrack-ng

B.

Airguard

C.

WLAN-crack

D.

wificracker

Questions 102

When you are collecting information to perform a data analysis, Google commands are very useful to find sensitive information and files. These files may contain information about passwords, system functions, or documentation.

What command will help you to search files using Google as a search engine?

Options:
A.

site: target.com filetype:xls username password email

B.

inurl: target.com filename:xls username password email

C.

domain: target.com archive:xls username password email

D.

site: target.com file:xls username password email

Questions 103

You have compromised a server on a network and successfully opened a shell. You aimed to identify all operating systems running on the network. However, as you attempt to fingerprint all machines in the network using the nmap syntax below, it is not going through.

CPEH-001 Question 103

What seems to be wrong?

Options:
A.

OS Scan requires root privileges.

B.

The nmap syntax is wrong.

C.

This is a common behavior for a corrupted nmap application.

D.

The outgoing TCP/IP fingerprinting is blocked by the host firewall.

Questions 104

You've just been hired to perform a pen test on an organization that has been subjected to a large-scale attack. The CIO is concerned with mitigating threats and vulnerabilities to totally eliminate risk.

What is one of the first things you should do when given the job?

Options:
A.

Explain to the CIO that you cannot eliminate all risk, but you will be able to reduce risk to acceptable levels.

B.

Interview all employees in the company to rule out possible insider threats.

C.

Establish attribution to suspected attackers.

D.

Start the wireshark application to start sniffing network traffic.

Questions 105

Your team has won a contract to infiltrate an organization. The company wants to have the attack be as realistic as possible; therefore, they did not provide any information besides the company name.

What should be the first step in security testing the client?

Options:
A.

Reconnaissance

B.

Enumeration

C.

Scanning

D.

Escalation