Free GAQM CPEH-001 Exam Actual Questions

The questions for CPEH-001 were last updated On Dec 20, 2024

Question No. 1

Which of the following tools will scan a network to perform vulnerability checks and compliance auditing?

Show Answer Hide Answer
Correct Answer: C

Question No. 2

You work as security technician at XYZ.com. While doing web application testing, you might be required to look through multiple web pages online which can take a long time. Which of the processes listed below would be a more efficient way of doing this type of validation?

Show Answer Hide Answer
Correct Answer: B

Wget is a utility used for mirroring websites, get* doesn't work, as for the actual FTP command to work there needs to be a space between get and * (ie. get *), get(); is just bogus, that's a C function that's written 100% wrong. mget is a command used from ''within'' ftp itself, ruling out A. Which leaves B use wget, which is designed for mirroring and download files, especially web pages, if used with the --R option (ie. wget --R www.XYZ.com) it could mirror a site, all expect protected portions of course.

Note: GNU Wget is a free network utility to retrieve files from the World Wide Web using HTTP and FTP and can be used to make mirrors of archives and home pages thus enabling work in the background, after having logged off.


Question No. 3

Windows file servers commonly hold sensitive files, databases, passwords and more. Which of the following choices would be a common vulnerability that usually exposes them?

Show Answer Hide Answer
Correct Answer: C

Question No. 4

What is the tool Firewalk used for?

Show Answer Hide Answer
Correct Answer: C

Firewalk is an active reconnaissance network security tool that attempts to determine what layer 4 protocols a given IP forwarding device 'firewall' will pass. Firewalk works by sending out TCP or UDP packets with a TTL one greater than the targeted gateway. If the gateway allows the traffic, it will forward the packets to the next hop where they will expire and elicit an ICMP_TIME_EXCEEDED message. If the gateway host does not allow the traffic, it will likely drop the packets and no response will be returned.


Question No. 5

ARP poisoning is achieved in _____ steps

Show Answer Hide Answer
Correct Answer: B

The hacker begins by sending a malicious ARP 'reply' (for which there was no previous request) to your router, associating his computer's MAC address with your IP Address. Now your router thinks the hacker's computer is your computer. Next, the hacker sends a malicious ARP reply to your computer, associating his MAC Address with the routers IP Address. Now your machine thinks the hacker's computer is your router. The hacker has now used ARP poisoning to accomplish a MitM attack.