Free GAQM CPEH-001 Exam Actual Questions

The questions for CPEH-001 were last updated On Jan 19, 2025

Question No. 1

Which of the following statements would NOT be a proper definition for a Trojan Horse?

Show Answer Hide Answer
Correct Answer: A

Question No. 2

You have retrieved the raw hash values from a Windows 2000 Domain Controller. Using social engineering, you come to know that they are enforcing strong passwords. You understand that all users are required to use passwords that are at least 8 characters in length. All passwords must also use 3 of the 4 following categories: lower case letters, capital letters, numbers and special characters. With your existing knowledge of users, likely user account names and the possibility that they will choose the easiest passwords possible, what would be the fastest type of password cracking attack you can run against these hash values and still get results?

Show Answer Hide Answer
Correct Answer: D

A dictionary attack will not work as strong passwords are enforced, also the minimum length of 8 characters in the password makes a brute force attack time consuming. A hybrid attack where you take a word from a dictionary and exchange a number of letters with numbers and special characters will probably be the fastest way to crack the passwords.


Question No. 3

Which of the following is true of the wireless Service Set ID (SSID)? (Select all that apply.)

Show Answer Hide Answer
Correct Answer: A, B

Question No. 4

You want to hide a secret.txt document inside c:\windows\system32\tcpip.dll kernel library using ADS streams. How will you accomplish this?

Show Answer Hide Answer
Correct Answer: B

Question No. 5

You are gathering competitive intelligence on an organization. You notice that they have jobs listed on a few Internet job-hunting sites. There are two jobs for network and system administrators. How can this help you in foot printing the organization?

Show Answer Hide Answer
Correct Answer: D