Free Certified Professional Ethical Hacker (CPEH) Exam CPEH-001 Exam Practice Test

UNLOCK FULL
CPEH-001 Exam Features
In Just $59 You can Access
  • All Official Question Types
  • Interactive Web-Based Practice Test Software
  • No Installation or 3rd Party Software Required
  • Customize your practice sessions (Free Demo)
  • 24/7 Customer Support
Page: 1 / 175
Total Questions: 875
  • Which Type of scan sends a packets with no flags set? Select the Answer

    Answer: 2 Next Question
  • How does a denial-of-service attack work?

    Answer: 1 Next Question
  • Where should a security tester be looking for information that could be used by an attacker against an organization? (Select all that apply)

    Answer: 1, 2, 3, 4, 5, 6 Next Question
  • WPA2 uses AES for wireless data encryption at which of the following encryption levels?

    Answer: 3 Next Question
  • A company has hired a security administrator to maintainand administer Linux and Windows-based systems. Written in the nightly report file is the following. Firewall log files are at the expected value of 4 MB. The current time is 12am. Exactly two hours later the size has decreased considerably. Another hour goes by and the log files have shrunk in size again. Which of the following actions should the security administrator take?

    Answer: 4 Next Question
  • Ron has configured his network to provide strong perimeter security. As part of his network architecture, he has included a host that is fully exposed to attack. The system is on the public side of the demilitarized zone, unprotected by a firewall or filtering router. What would you call such a host?

    Answer: 4 Next Question
  • E-mail scams and mail fraud are regulated by which of the following?

    Answer: 1 Next Question
  • Anetwork administratorreceived an administrative alert at 3:00 a.m. from the intrusion detection system. The alert was generated because a large number of packets were coming into the networkover ports 20 and 21. During analysis, there were no signs of attack on the FTP servers. How should the administrator classify this situation?

    Answer: 4 Next Question
  • How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?

    Answer: 2 Next Question
  • Derek has stumbled upon a wireless network and wants to assess its security. However, he does not find enough traffic for a good capture. He intends to use AirSnort on the captured traffic to crack the WEP key and does not know the IP address range or the AP. How can he generate traffic on the network so that he can capture enough packets to crack the WEP key?

    Answer: 4 Next Question
Page: 1 / 175
Total Questions: 875