GAQM CPEH-001 - Certified Professional Ethical Hacker (CPEH)
Which of the following describes a component of Public Key Infrastructure (PKI) where a copy of a private key is stored to provide third-party access and to facilitate recovery operations?
If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?
While testing the company's web applications, a tester attempts to insert the following test script into the search area on the company's web site:
Afterwards, when the tester presses the search button, a pop-up box appears on the screen with the text: "Testing Testing Testing". Which vulnerability has been detected in the web application?
Which of the following is an advantage of utilizing security testing methodologies to conduct a security audit?
Which of the following tools would be the best choice for achieving compliance with PCI Requirement 11?
Some passwords are stored using specialized encryption algorithms known as hashes. Why is this an appropriate method?
Which initial procedure should an ethical hacker perform after being brought into an organization?
SOAP services use which technology to format information?
Which type of security document is written with specific step-by-step details?
International Organization for Standardization (ISO) standard 27002 provides guidance for compliance by outlining
MX record priority increases as the number increases. (True/False.)
Yancey is a network security administrator for a large electric company. This company provides power for over 100, 000 people in Las Vegas. Yancey has worked for his company for over 15 years and has become very successful. One day, Yancey comes in to work and finds out that the company will be downsizing and he will be out of a job in two weeks. Yancey is very angry and decides to place logic bombs, viruses, Trojans, and backdoors all over the network to take down the company once he has left. Yancey does not care if his actions land him in jail for 30 or more years, he just wants the company to pay for what they are doing to him.
What would Yancey be considered?
This kind of password cracking method uses word lists in combination with numbers and special characters:
During an Xmas scan what indicates a port is closed?
This TCP flag instructs the sending system to transmit all buffered data immediately.