Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GAQM CPEH-001 Practice Exam with Questions & Answers | Set: 9

Questions 121

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

Options:
A.

Wired Equivalent Privacy (WEP)

B.

Wi-Fi Protected Access (WPA)

C.

Wi-Fi Protected Access 2 (WPA2)

D.

Temporal Key Integrity Protocol (TKIP)

GAQM CPEH-001 Premium Access
Questions 122

It is a regulation that has a set of guidelines, which should be adhered to by anyone who handles any electronic medical data. These guidelines stipulate that all medical practices must ensure that all necessary measures are in place while saving, accessing, and sharing any electronic medical data to keep patient data secure.

Which of the following regulations best matches the description?

Options:
A.

HIPAA

B.

ISO/IEC 27002

C.

COBIT

D.

FISMA

Questions 123

This phase will increase the odds of success in later phases of the penetration test. It is also the very first step in Information Gathering, and it will tell you what the "landscape" looks like.

What is the most important phase of ethical hacking in which you need to spend a considerable amount of time?

Options:
A.

footprinting

B.

network mapping

C.

gaining access

D.

escalating privileges

Questions 124

You have compromised a server and successfully gained a root access. You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System.

What is the best approach?

Options:
A.

Install Cryptcat and encrypt outgoing packets from this server.

B.

Install and use Telnet to encrypt all outgoing traffic from this server.

C.

Use Alternate Data Streams to hide the outgoing packets from this server.

D.

Use HTTP so that all traffic can be routed via a browser, thus evading the internal Intrusion Detection Systems.

Questions 125

You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly.

What is the best nmap command you will use?

Options:
A.

nmap -T4 -F 10.10.0.0/24

B.

nmap -T4 -r 10.10.1.0/24

C.

nmap -T4 -O 10.10.0.0/24

D.

nmap -T4 -q 10.10.0.0/24

Questions 126

You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line.

Which command would you use?

Options:
A.

c:\compmgmt.msc

B.

c:\services.msc

C.

c:\ncpa.cp

D.

c:\gpedit

Questions 127

It is an entity or event with the potential to adversely impact a system through unauthorized access, destruction, disclosure, denial of service or modification of data.

Which of the following terms best matches the definition?

Options:
A.

Threat

B.

Attack

C.

Vulnerability

D.

Risk

Questions 128

Under the "Post-attack Phase and Activities", it is the responsibility of the tester to restore the systems to a pre-test state.

Which of the following activities should not be included in this phase? (see exhibit)

Exhibit:

CPEH-001 Question 128

Options:
A.

III

B.

IV

C.

III and IV

D.

All should be included.

Questions 129

A tester has been using the msadc.pl attack script to execute arbitrary commands on a Windows NT4 web server. While it is effective, the tester finds it tedious to perform extended functions. On further research, the tester come across a perl script that runs the following msadc functions:

CPEH-001 Question 129

Which exploit is indicated by this script?

Options:
A.

A buffer overflow exploit

B.

A chained exploit

C.

A SQL injection exploit

D.

A denial of service exploit

Questions 130

In order to show improvement of security over time, what must be developed?

Options:
A.

Reports

B.

Testing tools

C.

Metrics

D.

Taxonomy of vulnerabilities

Questions 131

A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?

Options:
A.

Paros Proxy

B.

BBProxy

C.

BBCrack

D.

Blooover

Questions 132

Which of the following is considered an acceptable option when managing a risk?

Options:
A.

Reject the risk.

B.

Deny the risk.

C.

Mitigate the risk.

D.

Initiate the risk.

Questions 133

During a penetration test, a tester finds a target that is running MS SQL 2000 with default credentials. The tester assumes that the service is running with Local System account. How can this weakness be exploited to access the system?

Options:
A.

Using the Metasploit psexec module setting the SA / Admin credential

B.

Invoking the stored procedure xp_shell to spawn a Windows command shell

C.

Invoking the stored procedure cmd_shell to spawn a Windows command shell

D.

Invoking the stored procedure xp_cmdshell to spawn a Windows command shell

Questions 134

What is the outcome of the comm”nc -l -p 2222 | nc 10.1.0.43 1234"?

Options:
A.

Netcat will listen on the 10.1.0.43 interface for 1234 seconds on port 2222.

B.

Netcat will listen on port 2222 and output anything received to a remote connection on 10.1.0.43 port 1234.

C.

Netcat will listen for a connection from 10.1.0.43 on port 1234 and output anything received to port 2222.

D.

Netcat will listen on port 2222 and then output anything received to local interface 10.1.0.43.

Questions 135

Which of the following is a strong post designed to stop a car?

Options:
A.

Gate

B.

Fence

C.

Bollard

D.

Reinforced rebar