Free GAQM CPEH-001 Exam Questions

Become GAQM Certified with updated CPEH-001 exam questions and correct answers

Page:    1 / 177      
Total 881 Questions | Updated On: Jan 10, 2025
Add To Cart
Question 1

Sniffing is considered an active attack.


Answer: B
Question 2

Which of the following items is unique to the N-tier architecture method of designing software applications?


Answer: A
Question 3

Question Type: SingleChoice
TCP SYN Flood attack uses the three-way handshake mechanism.
1. An attacker at system A sends a SYN packet to victim at system B
2. System B sends a SYN/ACK packet to victim A
3. As a normal three-way handshake mechanism system A should send an ACK packet to system B, however, system A does not send an ACK packet to system B. In this case client B is waiting for an ACK packet from client A
This status of client B is called _________________


Answer: B
Question 4

This method is used to determine the Operating system and version running on a remote target system. What is it called?


Answer: B
Question 5

Michael is a junior security analyst working for the National Security Agency (NSA) working primarily on breaking terrorist encrypted messages. The NSA has a number of methods they use to decipher encrypted messages including Government Access to Keys (GAK) and inside informants. The NSA holds secret backdoor keys to many of the encryption algorithms used on the Internet. The problem for the NSA, and Michael, is that terrorist organizations are starting to use custom-built algorithms or obscure algorithms purchased from corrupt governments. For this reason, Michael and other security analysts like him have been forced to find different methods of deciphering terrorist messages. One method that Michael thought of using was to hide malicious code inside seemingly harmless programs. Michael first monitors sites and bulletin boards used by known terrorists, and then he is able to glean email addresses to some of these suspected terrorists. Michael then inserts a stealth keylogger into a mapping program file readme.txt and then sends that as an attachment to the terrorist. This keylogger takes screenshots every 2 minutes and also logs all keyboard activity into a hidden file on the terrorist's computer. Then, the keylogger emails those files to Michael twice a day with a built in SMTP server. What technique has Michael used to disguise this keylogging software?


Answer: C
Page:    1 / 177      
Total 881 Questions | Updated On: Jan 10, 2025
Add To Cart

© Copyrights DumpsCertify 2025. All Rights Reserved

We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the DumpsCertify.