GAQM CPEH-001 - Certified Professional Ethical Hacker (CPEH)
A company has five different subnets: 192.168.1.0, 192.168.2.0, 192.168.3.0, 192.168.4.0 and 192.168.5.0. How can NMAP be used to scan these adjacent Class C networks?
Which of the following programs is usually targeted at Microsoft Office products?
What are the three types of authentication?
What is one thing a tester can do to ensure that the software is trusted and is not changing or tampering with critical data on the back end of a system it is loaded on?
Smart cards use which protocol to transfer the certificate in a secure manner?
During a penetration test, the tester conducts an ACK scan using NMAP against the external interface of the DMZ firewall. NMAP reports that port 80 is unfiltered. Based on this response, which type of packet inspection is the firewall conducting?
Which command line switch would be used in NMAP to perform operating system detection?
A person approaches a network administrator and wants advice on how to send encrypted email from home. The end user does not want to have to pay for any license fees or manage server services. Which of the following is the most secure encryption protocol that the network administrator should recommend?
How does an operating system protect the passwords used for account logins?
Which of the following is a client-server tool utilized to evade firewall inspection?
Which of the following examples best represents a logical or technical control?
Which tool can be used to silently copy files from USB devices?
A hacker, who posed as a heating and air conditioning specialist, was able to install a sniffer program in a switched environment network. Which attack could the hacker use to sniff all of the packets in the network?
Which of the following is used to indicate a single-line comment in structured query language (SQL)?
WPA2 uses AES for wireless data encryption at which of the following encryption levels?