Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GAQM CPEH-001 Practice Exam with Questions & Answers | Set: 8

Questions 106

After trying multiple exploits, you've gained root access to a Centos 6 server. To ensure you maintain access, what would you do first?

Options:
A.

Create User Account

B.

Disable Key Services

C.

Disable IPTables

D.

Download and Install Netcat

GAQM CPEH-001 Premium Access
Questions 107

Which of the following is a design pattern based on distinct pieces of software providing application functionality as services to other applications?

Options:
A.

Service Oriented Architecture

B.

Object Oriented Architecture

C.

Lean Coding

D.

Agile Process

Questions 108

What is the best description of SQL Injection?

Options:
A.

It is an attack used to gain unauthorized access to a database.

B.

It is an attack used to modify code in an application.

C.

It is a Man-in-the-Middle attack between your SQL Server and Web App Server.

D.

It is a Denial of Service Attack.

Questions 109

Nation-state threat actors often discover vulnerabilities and hold on to them until they want to launch a sophisticated attack. The Stuxnet attack was an unprecedented style of attack because it used four types of vulnerability.

What is this style of attack called?

Options:
A.

zero-day

B.

zero-hour

C.

zero-sum

D.

no-day

Questions 110

What is the benefit of performing an unannounced Penetration Testing?

Options:
A.

The tester will have an actual security posture visibility of the target network.

B.

Network security would be in a "best state" posture.

C.

It is best to catch critical infrastructure unpatched.

D.

The tester could not provide an honest analysis.

Questions 111

Which of the following describes the characteristics of a Boot Sector Virus?

Options:
A.

Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR

B.

Moves the MBR to another location on the RAM and copies itself to the original location of the MBR

C.

Modifies directory table entries so that directory entries point to the virus code instead of the actual program

D.

Overwrites the original MBR and only executes the new virus code

Questions 112

Which of the following is the BEST way to defend against network sniffing?

Options:
A.

Using encryption protocols to secure network communications

B.

Register all machines MAC Address in a Centralized Database

C.

Restrict Physical Access to Server Rooms hosting Critical Servers

D.

Use Static IP Address

Questions 113

It is a short-range wireless communication technology intended to replace the cables connecting portable of fixed devices while maintaining high levels of security. It allows mobile phones, computers and other devices to connect and communicate using a short-range wireless connection.

Which of the following terms best matches the definition?

Options:
A.

Bluetooth

B.

Radio-Frequency Identification

C.

WLAN

D.

InfraRed

Questions 114

You are using NMAP to resolve domain names into IP addresses for a ping sweep later.

Which of the following commands looks for IP addresses?

Options:
A.

>host -t a hackeddomain.com

B.

>host -t soa hackeddomain.com

C.

>host -t ns hackeddomain.com

D.

>host -t AXFR hackeddomain.com

Questions 115

You are performing a penetration test. You achieved access via a buffer overflow exploit and you proceed to find interesting data, such as files with usernames and passwords. You find a hidden folder that has the administrator's bank account password and login information for the administrator's bitcoin account.

What should you do?

Options:
A.

Report immediately to the administrator

B.

Do not report it and continue the penetration test.

C.

Transfer money from the administrator's account to another account.

D.

Do not transfer the money but steal the bitcoins.

Questions 116

Which of the following is the greatest threat posed by backups?

Options:
A.

A backup is the source of Malware or illicit information.

B.

A backup is unavailable during disaster recovery.

C.

A backup is incomplete because no verification was performed.

D.

An un-encrypted backup can be misplaced or stolen.

Questions 117

The configuration allows a wired or wireless network interface controller to pass all traffic it receives to the central processing unit (CPU), rather than passing only the frames that the controller is intended to receive.

Which of the following is being described?

Options:
A.

promiscuous mode

B.

port forwarding

C.

multi-cast mode

D.

WEM

Questions 118

Which of the following parameters describe LM Hash (see exhibit):

Exhibit:

CPEH-001 Question 118

Options:
A.

I, II, and III

B.

I

C.

II

D.

I and II

Questions 119

A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.

Based on this information, what should be one of your key recommendations to the bank?

Options:
A.

Place a front-end web server in a demilitarized zone that only handles external web traffic

B.

Require all employees to change their passwords immediately

C.

Move the financial data to another server on the same IP subnet

D.

Issue new certificates to the web servers from the root certificate authority

Questions 120

Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?

Options:
A.

PKI

B.

single sign on

C.

biometrics

D.

SOA