GAQM CPEH-001 - Certified Professional Ethical Hacker (CPEH)
Which of the following is not a Bluetooth attack?
Which of the following is the greatest threat posed by backups?
Perspective clients want to see sample reports from previous penetration tests.
What should you do next?
Which tool allows analysts and pen testers to examine links between data using graphs and link analysis?
You've just been hired to perform a pen test on an organization that has been subjected to a large-scale attack. The CIO is concerned with mitigating threats and vulnerabilities to totally eliminate risk.
What is one of the first things you should do when given the job?
Which of the following parameters describe LM Hash (see exhibit):
Exhibit:
You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly.
What is the best nmap command you will use?
When you are getting information about a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file from the server. You can detect all these methods (GET, POST, HEAD, PUT, DELETE, TRACE) using NMAP script engine.
What nmap script will help you with this task?
> NMAP -sn 192.168.11.200-215
The NMAP command above performs which of the following?
Which regulation defines security and privacy controls for Federal information systems and organizations?