Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GAQM CPEH-001 - Certified Professional Ethical Hacker (CPEH)

Page: 3 / 15
Total 736 questions

A hacker searches in Google for filetype:pcf to find Cisco VPN config files. Those files may contain connectivity passwords that can be decoded with which of the following?

A.

Cupp

B.

Nessus

C.

Cain and Abel

D.

John The Ripper Pro

John the Ripper is a technical assessment tool used to test the weakness of which of the following?

A.

Usernames

B.

File permissions

C.

Firewall rulesets

D.

Passwords

While doing a Black box pen test via the TCP port (80), you noticed that the traffic gets blocked when you tried to pass IRC traffic from a web enabled host. However, you also noticed that outbound HTTP traffic is being allowed. What type of firewall is being utilized for the outbound traffic?

A.

Stateful

B.

Application

C.

Circuit

D.

Packet Filtering

As an Ethical Hacker you are capturing traffic from your customer network with Wireshark and you need to find and verify just SMTP traffic. What command in Wireshark will help you to find this kind of traffic?

A.

request smtp 25

B.

tcp.port eq 25

C.

smtp port

D.

tcp.contains port 25

Why would an attacker want to perform a scan on port 137?

A.

To discover proxy servers on a network

B.

To disrupt the NetBIOS SMB service on the target host

C.

To check for file and print sharing on Windows systems

D.

To discover information about a target host using NBTSTAT

Shellshock had the potential for an unauthorized user to gain access to a server. It affected many internet-facing services, which OS did it not directly affect?

A.

Windows

B.

Unix

C.

Linux

D.

OS X

Which of the following tools is used by pen testers and analysts specifically to analyze links between data using link analysis and graphs?

A.

Metasploit

B.

Wireshark

C.

Maltego

D.

Cain & Abel

Matthew received an email with an attachment named “YouWon$10Grand.zip.” The zip file contains a file named “HowToClaimYourPrize.docx.exe.” Out of excitement and curiosity, Matthew opened the said file. Without his knowledge, the file copies itself to Matthew’s APPDATA\IocaI directory and begins to beacon to a Command-and-control server to download additional malicious binaries. What type of malware has Matthew encountered?

A.

Key-logger

B.

Trojan

C.

Worm

D.

Macro Virus

The chance of a hard drive failure is known to be once every four years. The cost of a new hard drive is $500. EF (Exposure Factor) is about 0.5. Calculate for the Annualized Loss Expectancy (ALE).

A.

$62.5

B.

$250

C.

$125

D.

$65.2

Which among the following is a Windows command that a hacker can use to list all the shares to which the current user context has access?

A.

NET FILE

B.

NET USE

C.

NET CONFIG

D.

NET VIEW

Sandra is the security administrator of XYZ.com. One day she notices that the XYZ.com Oracle database server has been compromised and customer information along with financial data has been stolen. The financial loss will be estimated in millions of dollars if the database gets into the hands of competitors. Sandra wants to report this crime to the law enforcement agencies immediately. Which organization coordinates computer crime investigations throughout the United States?

A.

NDCA

B.

NICP

C.

CIRP

D.

NPC

E.

CIA

Knowing the nature of backup tapes, which of the following is the MOST RECOMMENDED way of storing backup tapes?

A.

In a cool dry environment

B.

Inside the data center for faster retrieval in a fireproof safe

C.

In a climate controlled facility offsite

D.

On a different floor in the same building

While reviewing the result of scanning run against a target network you come across the following:

Which among the following can be used to get this output?

A.

A Bo2k system query.

B.

nmap protocol scan

C.

A sniffer

D.

An SNMP walk

What kind of risk will remain even if all theoretically possible safety measures would be applied?

A.

Residual risk

B.

Inherent risk

C.

Impact risk

D.

Deferred risk

Which of the following is a vulnerability in GNU’s bash shell (discovered in September of 2014) that gives attackers access to run remote commands on a vulnerable system?

A.

Shellshock

B.

Rootshell

C.

Rootshock

D.

Shellbash