Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Certified Professional Ethical Hacker (CPEH) Question and Answers

Certified Professional Ethical Hacker (CPEH)

Last Update Nov 30, 2025
Total Questions : 736

We are offering FREE CPEH-001 GAQM exam questions. All you do is to just go and sign up. Give your details, prepare CPEH-001 free exam questions and then go for complete pool of Certified Professional Ethical Hacker (CPEH) test questions that will help you more.

CPEH-001 pdf

CPEH-001 PDF

$36.75  $104.99
CPEH-001 Engine

CPEH-001 Testing Engine

$43.75  $124.99
CPEH-001 PDF + Engine

CPEH-001 PDF + Testing Engine

$57.75  $164.99
Questions 1

The Payment Card Industry Data Security Standard (PCI DSS) contains six different categories of control objectives. Each objective contains one or more requirements, which must be followed in order to achieve compliance. Which of the following requirements would best fit under the objective, "Implement strong access control measures"?

Options:

A.  

Regularly test security systems and processes.

B.  

Encrypt transmission of cardholder data across open, public networks.

C.  

Assign a unique ID to each person with computer access.

D.  

Use and regularly update anti-virus software on all systems commonly affected by malware.

Discussion 0
Questions 2

Which of the following provides a security professional with most information about the system’s security posture?

Options:

A.  

Wardriving, warchalking, social engineering

B.  

Social engineering, company site browsing, tailgating

C.  

Phishing, spamming, sending trojans

D.  

Port scanning, banner grabbing, service identification

Discussion 0
Questions 3

Which of the following is an adaptive SQL Injection testing technique used to discover coding errors by inputting massive amounts of random data and observing the changes in the output?

Options:

A.  

Function Testing

B.  

Dynamic Testing

C.  

Static Testing

D.  

Fuzzing Testing

Discussion 0
Questions 4

Which of the following steps for risk assessment methodology refers to vulnerability identification?

Options:

A.  

Determines if any flaws exist in systems, policies, or procedures

B.  

Assigns values to risk probabilities; Impact values.

C.  

Determines risk probability that vulnerability will be exploited (High. Medium, Low)

D.  

Identifies sources of harm to an IT system. (Natural, Human. Environmental)

Discussion 0
Questions 5

Alice encrypts her data using her public key PK and stores the encrypted data in the cloud. Which of the following attack scenarios will compromise the privacy of her data?

Options:

A.  

None of these scenarios compromise the privacy of Alice’s data

B.  

Agent Andrew subpoenas Alice, forcing her to reveal her private key. However, the cloud server successfully resists Andrew’s attempt to access the stored data

C.  

Hacker Harry breaks into the cloud server and steals the encrypted data

D.  

Alice also stores her private key in the cloud, and Harry breaks into the cloud server as before

Discussion 0
Questions 6

You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity, what tool would you most likely select?

Options:

A.  

Nmap

B.  

Cain & Abel

C.  

Nessus

D.  

Snort

Discussion 0
Questions 7

Which of the following descriptions is true about a static NAT?

Options:

A.  

A static NAT uses a many-to-many mapping.

B.  

A static NAT uses a one-to-many mapping.

C.  

A static NAT uses a many-to-one mapping.

D.  

A static NAT uses a one-to-one mapping.

Discussion 0
Questions 8

When setting up a wireless network, an administrator enters a pre-shared key for security. Which of the following is true?

Options:

A.  

The key entered is a symmetric key used to encrypt the wireless data.

B.  

The key entered is a hash that is used to prove the integrity of the wireless data.

C.  

The key entered is based on the Diffie-Hellman method.

D.  

The key is an RSA key used to encrypt the wireless data.

Discussion 0
Questions 9

Which security strategy requires using several, varying methods to protect IT systems against attacks?

Options:

A.  

Defense in depth

B.  

Three-way handshake

C.  

Covert channels

D.  

Exponential backoff algorithm

Discussion 0
Questions 10

Which of the following describes a component of Public Key Infrastructure (PKI) where a copy of a private key is stored to provide third-party access and to facilitate recovery operations?

Options:

A.  

Key registry

B.  

Recovery agent

C.  

Directory

D.  

Key escrow

Discussion 0
Questions 11

Which of the following ensures that updates to policies, procedures, and configurations are made in a controlled and documented fashion?

Options:

A.  

Regulatory compliance

B.  

Peer review

C.  

Change management

D.  

Penetration testing

Discussion 0
Questions 12

SOAP services use which technology to format information?

Options:

A.  

SATA

B.  

PCI

C.  

XML

D.  

ISDN

Discussion 0
Questions 13

Which of the following is a primary service of the U.S. Computer Security Incident Response Team (CSIRT)?

Options:

A.  

CSIRT provides an incident response service to enable a reliable and trusted single point of contact for reporting computer security incidents worldwide.

B.  

CSIRT provides a computer security surveillance service to supply a government with important intelligence information on individuals travelling abroad.

C.  

CSIRT provides a penetration testing service to support exception reporting on incidents worldwide by individuals and multi-national corporations.

D.  

CSIRT provides a vulnerability assessment service to assist law enforcement agencies with profiling an individual's property or company's asset.

Discussion 0
Questions 14

Which of the following network attacks relies on sending an abnormally large packet size that exceeds TCP/IP specifications?

Options:

A.  

Ping of death

B.  

SYN flooding

C.  

TCP hijacking

D.  

Smurf attack

Discussion 0
Questions 15

If an e-commerce site was put into a live environment and the programmers failed to remove the secret entry point that was used during the application development, what is this secret entry point known as?

Options:

A.  

SDLC process

B.  

Honey pot

C.  

SQL injection

D.  

Trap door

Discussion 0
Questions 16

Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?

Options:

A.  

SHA-1

B.  

MD5

C.  

HAVAL

D.  

MD4

Discussion 0
Questions 17

What are the three types of compliance that the Open Source Security Testing Methodology Manual (OSSTMM) recognizes?

Options:

A.  

Legal, performance, audit

B.  

Audit, standards based, regulatory

C.  

Contractual, regulatory, industry

D.  

Legislative, contractual, standards based

Discussion 0
Questions 18

The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses which of the following?

Options:

A.  

Multiple keys for non-repudiation of bulk data

B.  

Different keys on both ends of the transport medium

C.  

Bulk encryption for data transmission over fiber

D.  

The same key on each end of the transmission medium

Discussion 0
Questions 19

Which of the following tools would be the best choice for achieving compliance with PCI Requirement 11?

Options:

A.  

Truecrypt

B.  

Sub7

C.  

Nessus

D.  

Clamwin

Discussion 0
Questions 20

Which United States legislation mandates that the Chief Executive Officer (CEO) and the Chief Financial Officer (CFO) must sign statements verifying the completeness and accuracy of financial reports?

Options:

A.  

Sarbanes-Oxley Act (SOX)

B.  

Gramm-Leach-Bliley Act (GLBA)

C.  

Fair and Accurate Credit Transactions Act (FACTA)

D.  

Federal Information Security Management Act (FISMA)

Discussion 0
Questions 21

When comparing the testing methodologies of Open Web Application Security Project (OWASP) and Open Source Security Testing Methodology Manual (OSSTMM) the main difference is

Options:

A.  

OWASP is for web applications and OSSTMM does not include web applications.

B.  

OSSTMM is gray box testing and OWASP is black box testing.

C.  

OWASP addresses controls and OSSTMM does not.

D.  

OSSTMM addresses controls and OWASP does not.

Discussion 0
Questions 22

The intrusion detection system at a software development company suddenly generates multiple alerts regarding attacks against the company's external webserver, VPN concentrator, and DNS servers. What should the security team do to determine which alerts to check first?

Options:

A.  

Investigate based on the maintenance schedule of the affected systems.

B.  

Investigate based on the service level agreements of the systems.

C.  

Investigate based on the potential effect of the incident.

D.  

Investigate based on the order that the alerts arrived in.

Discussion 0
Questions 23

You work as a Security Analyst for a retail organization. In securing the company's network, you set up a firewall and an IDS. However, hackers are able to attack the network. After investigating, you discover that your IDS is not configured properly and therefore is unable to trigger alarms when needed. What type of alert is the IDS giving?

Options:

A.  

False Negative

B.  

False Positive

C.  

True Negative

D.  

True Positive

Discussion 0
Questions 24

Which of the following is a low-tech way of gaining unauthorized access to systems?

Options:

A.  

Social Engineering

B.  

Sniffing

C.  

Eavesdropping

D.  

Scanning

Discussion 0
Questions 25

Which of the following is a protocol specifically designed for transporting event messages?

Options:

A.  

SYSLOG

B.  

SMS

C.  

SNMP

D.  

ICMP

Discussion 0
Questions 26

To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program.

What term is commonly used when referring to this type of testing?

Options:

A.  

Fuzzing

B.  

Randomizing

C.  

Mutating

D.  

Bounding

Discussion 0
Questions 27

What is the difference between the AES and RSA algorithms?

Options:

A.  

Both are asymmetric algorithms, but RSA uses 1024-bit keys.

B.  

RSA is asymmetric, which is used to create a public/private key pair; AES is symmetric, which is used to encrypt data.

C.  

Both are symmetric algorithms, but AES uses 256-bit keys.

D.  

AES is asymmetric, which is used to create a public/private key pair; RSA is symmetric, which is used to encrypt data.

Discussion 0
Questions 28

The security concept of "separation of duties" is most similar to the operation of which type of security device?

Options:

A.  

Firewall

B.  

Bastion host

C.  

Intrusion Detection System

D.  

Honeypot

Discussion 0
Questions 29

The network in ABC company is using the network address 192.168.1.64 with mask 255.255.255.192. In the network the servers are in the addresses 192.168.1.122, 192.168.1.123 and 192.168.1.124.

An attacker is trying to find those servers but he cannot see them in his scanning. The command he is using is:

nmap 192.168.1.64/28.

Why he cannot see the servers?

Options:

A.  

The network must be down and the nmap command and IP address are ok.

B.  

He needs to add the command ''''ip address'''' just before the IP address.

C.  

He is scanning from 192.168.1.64 to 192.168.1.78 because of the mask /28 and the servers are not in that range.

D.  

He needs to change the address to 192.168.1.0 with the same mask.

Discussion 0
Questions 30

A company's security policy states that all Web browsers must automatically delete their HTTP browser cookies upon terminating. What sort of security breach is this policy attempting to mitigate?

Options:

A.  

Attempts by attackers to access Web sites that trust the Web browser user by stealing the user's authentication credentials.

B.  

Attempts by attackers to access the user and password information stored in the company's SQL database.

C.  

Attempts by attackers to access passwords stored on the user's computer without the user's knowledge.

D.  

Attempts by attackers to determine the user's Web browser usage patterns, including when sites were visited and for how long.

Discussion 0
Questions 31

The company ABC recently contracted a new accountant. The accountant will be working with the financial statements. Those financial statements need to be approved by the CFO and then they will be sent to the accountant but the CFO is worried because he wants to be sure that the information sent to the accountant was not modified once he approved it. What of the following options can be useful to ensure the integrity of the data?

Options:

A.  

The document can be sent to the accountant using an exclusive USB for that document.

B.  

The CFO can use a hash algorithm in the document once he approved the financial statements.

C.  

The financial statements can be sent twice, one by email and the other delivered in USB and the accountant can compare both to be sure it is the same document.

D.  

The CFO can use an excel file with a password.

Discussion 0
Questions 32

_________ is a set of extensions to DNS that provide to DNS clients (resolvers) origin authentication of DNS data to reduce the threat of DNS poisoning, spoofing, and similar attacks types.

Options:

A.  

DNSSEC

B.  

Zone transfer

C.  

Resource transfer

D.  

Resource records

Discussion 0
Questions 33

The chance of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate the SLE, ARO, and ALE. Assume the EF = 1 (100%).

What is the closest approximate cost of this replacement and recovery operation per year?

Options:

A.  

$146

B.  

$1320

C.  

$440

D.  

$100

Discussion 0
Questions 34

Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries.) More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and that are related to various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.

Basic example to understand how cryptography works is given below:

Which of the following choices is true about cryptography?

Options:

A.  

Algorithm is not the secret, key is the secret.

B.  

Symmetric-key algorithms are a class of algorithms for cryptography that use the different cryptographic keys for both encryption of plaintext and decryption of ciphertext.

C.  

Secure Sockets Layer (SSL) use the asymmetric encryption both (public/private key pair) to deliver the shared session key and to achieve a communication way.

D.  

Public-key cryptography, also known as asymmetric cryptography, public key is for decrypt, private key is for encrypt.

Discussion 0
Questions 35

In both pharming and phishing attacks an attacker can create websites that look similar to legitimate sites with the intent of collecting personal identifiable information from its victims. What is the difference between pharming and phishing attacks?

Options:

A.  

In a pharming attack a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DNS. In a phishing attack an attacker provides the victim with a URL that is either misspelled or looks similar to the actual websites domain name.

B.  

Both pharming and phishing attacks are purely technical and are not considered forms of social engineering.

C.  

Both pharming and phishing attacks are identical.

D.  

In a phishing attack a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DNS. In a pharming attack an attacker provides the victim with a URL that is either misspelled or looks very similar to the actual websites domain name.

Discussion 0
Questions 36

An attacker gains access to a Web server's database and displays the contents of the table that holds all of the names, passwords, and other user information. The attacker did this by entering information into the Web site's user login page that the software's designers did not expect to be entered. This is an example of what kind of software design problem?

Options:

A.  

Insufficient input validation

B.  

Insufficient exception handling

C.  

Insufficient database hardening

D.  

Insufficient security management

Discussion 0
Questions 37

You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist's email, and you send her an email changing the source email to her boss's email( boss@company ). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don't work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network.

What testing method did you use?

Options:

A.  

Social engineering

B.  

Tailgating

C.  

Piggybacking

D.  

Eavesdropping

Discussion 0
Questions 38

What is the best description of SQL Injection?

Options:

A.  

It is an attack used to gain unauthorized access to a database.

B.  

It is an attack used to modify code in an application.

C.  

It is a Man-in-the-Middle attack between your SQL Server and Web App Server.

D.  

It is a Denial of Service Attack.

Discussion 0
Questions 39

It is a vulnerability in GNU's bash shell, discovered in September of 2014, that gives attackers access to run remote commands on a vulnerable system. The malicious software can take control of an infected machine, launch denial-of-service attacks to disrupt websites, and scan for other vulnerable devices (including routers).

Which of the following vulnerabilities is being described?

Options:

A.  

Shellshock

B.  

Rootshock

C.  

Rootshell

D.  

Shellbash

Discussion 0
Questions 40

You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line.

Which command would you use?

Options:

A.  

c:\compmgmt.msc

B.  

c:\services.msc

C.  

c:\ncpa.cp

D.  

c:\gpedit

Discussion 0
Questions 41

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

Options:

A.  

ESP transport mode

B.  

AH permiscuous

C.  

ESP confidential

D.  

AH Tunnel mode

Discussion 0
Questions 42

You are performing information gathering for an important penetration test. You have found pdf, doc, and images in your objective. You decide to extract metadata from these files and analyze it.

What tool will help you with the task?

Options:

A.  

Metagoofil

B.  

Armitage

C.  

Dimitry

D.  

cdpsnarf

Discussion 0
Questions 43

Which of the following is the BEST way to defend against network sniffing?

Options:

A.  

Using encryption protocols to secure network communications

B.  

Register all machines MAC Address in a Centralized Database

C.  

Restrict Physical Access to Server Rooms hosting Critical Servers

D.  

Use Static IP Address

Discussion 0
Questions 44

Which of the following is assured by the use of a hash?

Options:

A.  

Integrity

B.  

Confidentiality

C.  

Authentication

D.  

Availability

Discussion 0
Questions 45

Port scanning can be used as part of a technical assessment to determine network vulnerabilities. The TCP XMAS scan is used to identify listening ports on the targeted system.

If a scanned port is open, what happens?

Options:

A.  

The port will ignore the packets.

B.  

The port will send an RST.

C.  

The port will send an ACK.

D.  

The port will send a SYN.

Discussion 0
Questions 46

When you return to your desk after a lunch break, you notice a strange email in your inbox. The sender is someone you did business with recently, but the subject line has strange characters in it.

What should you do?

Options:

A.  

Forward the message to your company’s security response team and permanently delete the message from your computer.

B.  

Reply to the sender and ask them for more information about the message contents.

C.  

Delete the email and pretend nothing happened

D.  

Forward the message to your supervisor and ask for her opinion on how to handle the situation

Discussion 0
Questions 47

A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.

Based on this information, what should be one of your key recommendations to the bank?

Options:

A.  

Place a front-end web server in a demilitarized zone that only handles external web traffic

B.  

Require all employees to change their passwords immediately

C.  

Move the financial data to another server on the same IP subnet

D.  

Issue new certificates to the web servers from the root certificate authority

Discussion 0
Questions 48

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

Options:

A.  

Wired Equivalent Privacy (WEP)

B.  

Wi-Fi Protected Access (WPA)

C.  

Wi-Fi Protected Access 2 (WPA2)

D.  

Temporal Key Integrity Protocol (TKIP)

Discussion 0
Questions 49

> NMAP -sn 192.168.11.200-215

The NMAP command above performs which of the following?

Options:

A.  

A ping scan

B.  

A trace sweep

C.  

An operating system detect

D.  

A port scan

Discussion 0
Questions 50

An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victim’s profile to a text file and then submit the data to the attacker’s database.

What is this type of attack (that can use either HTTP GET or HTTP POST) called?

Options:

A.  

Cross-Site Request Forgery

B.  

Cross-Site Scripting

C.  

SQL Injection

D.  

Browser Hacking

Discussion 0
Questions 51

Jesse receives an email with an attachment labeled “Court_Notice_21206.zip”. Inside the zip file is a file named “Court_Notice_21206.docx.exe” disguised as a word document. Upon execution, a window appears stating, “This word document is corrupt.” In the background, the file copies itself to Jesse APPDATA\local directory and begins to beacon to a C2 server to download additional malicious binaries.

What type of malware has Jesse encountered?

Options:

A.  

Trojan

B.  

Worm

C.  

Macro Virus

D.  

Key-Logger

Discussion 0
Questions 52

The Open Web Application Security Project (OWASP) is the worldwide not-for-profit charitable organization focused on improving the security of software. What item is the primary concern on OWASP's Top Ten Project Most Critical Web Application Security Risks?

Options:

A.  

Injection

B.  

Cross Site Scripting

C.  

Cross Site Request Forgery

D.  

Path disclosure

Discussion 0
Questions 53

Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two. What would you call this attack?

Options:

A.  

Interceptor

B.  

Man-in-the-middle

C.  

ARP Proxy

D.  

Poisoning Attack

Discussion 0
Questions 54

Within the context of Computer Security, which of the following statements describes Social Engineering best?

Options:

A.  

Social Engineering is the act of publicly disclosing information

B.  

Social Engineering is the means put in place by human resource to perform time accounting

C.  

Social Engineering is the act of getting needed information from a person rather than breaking into a system

D.  

Social Engineering is a training program within sociology studies

Discussion 0
Questions 55

Study the snort rule given below:

From the options below, choose the exploit against which this rule applies.

Options:

A.  

WebDav

B.  

SQL Slammer

C.  

MS Blaster

D.  

MyDoom

Discussion 0
Questions 56

What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?

Options:

A.  

Copy the system files from a known good system

B.  

Perform a trap and trace

C.  

Delete the files and try to determine the source

D.  

Reload from a previous backup

E.  

Reload from known good media

Discussion 0
Questions 57

Which of the following are well known password-cracking programs?

Options:

A.  

L0phtcrack

B.  

NetCat

C.  

Jack the Ripper

D.  

Netbus

E.  

John the Ripper

Discussion 0
Questions 58

The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?

Options:

A.  

network Sniffer

B.  

Vulnerability Scanner

C.  

Intrusion prevention Server

D.  

Security incident and event Monitoring

Discussion 0
Questions 59

MX record priority increases as the number increases. (True/False.)

Options:

A.  

True

B.  

False

Discussion 0
Questions 60

Study the following log extract and identify the attack.

Options:

A.  

Hexcode Attack

B.  

Cross Site Scripting

C.  

Multiple Domain Traversal Attack

D.  

Unicode Directory Traversal Attack

Discussion 0
Questions 61

What is the following command used for?

net use \targetipc$ "" /u:""

Options:

A.  

Grabbing the etc/passwd file

B.  

Grabbing the SAM

C.  

Connecting to a Linux computer through Samba.

D.  

This command is used to connect as a null session

E.  

Enumeration of Cisco routers

Discussion 0
Questions 62

Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?

Options:

A.  

To determine who is the holder of the root account

B.  

To perform a DoS

C.  

To create needless SPAM

D.  

To illicit a response back that will reveal information about email servers and how they treat undeliverable mail

E.  

To test for virus protection

Discussion 0
Questions 63

Which type of sniffing technique is generally referred as MiTM attack?

Options:

A.  

Password Sniffing

B.  

ARP Poisoning

C.  

Mac Flooding

D.  

DHCP Sniffing

Discussion 0
Questions 64

You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers will never be able to gain access to your network with complex security system in place.

Your peer, Peter Smith who works at the same department disagrees with you.

He says even the best network security technologies cannot prevent hackers gaining access to the network because of presence of "weakest link" in the security chain.

What is Peter Smith talking about?

Options:

A.  

Untrained staff or ignorant computer users who inadvertently become the weakest link in your security chain

B.  

"zero-day" exploits are the weakest link in the security chain since the IDS will not be able to detect these attacks

C.  

"Polymorphic viruses" are the weakest link in the security chain since the Anti-Virus scanners will not be able to detect these attacks

D.  

Continuous Spam e-mails cannot be blocked by your security system since spammers use different techniques to bypass the filters in your gateway

Discussion 0
Questions 65

If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?

Options:

A.  

Birthday

B.  

Brute force

C.  

Man-in-the-middle

D.  

Smurf

Discussion 0
Questions 66

Let's imagine three companies (A, B and C), all competing in a challenging global environment. Company A and B are working together in developing a product that will generate a major competitive advantage for them. Company A has a secure DNS server while company B has a DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B, company C gains access to outgoing e-mails from company B. How do you prevent DNS spoofing?

Options:

A.  

Install DNS logger and track vulnerable packets

B.  

Disable DNS timeouts

C.  

Install DNS Anti-spoofing

D.  

Disable DNS Zone Transfer

Discussion 0
Questions 67

Which of the following LM hashes represent a password of less than 8 characters? (Choose two.)

Options:

A.  

BA810DBA98995F1817306D272A9441BB

B.  

44EFCE164AB921CQAAD3B435B51404EE

C.  

0182BD0BD4444BF836077A718CCDF409

D.  

CEC52EB9C8E3455DC2265B23734E0DAC

E.  

B757BF5C0D87772FAAD3B435B51404EE

F.  

E52CAC67419A9A224A3B108F3FA6CB6D

Discussion 0
Questions 68

What did the following commands determine?

Options:

A.  

That the Joe account has a SID of 500

B.  

These commands demonstrate that the guest account has NOT been disabled

C.  

These commands demonstrate that the guest account has been disabled

D.  

That the true administrator is Joe

E.  

Issued alone, these commands prove nothing

Discussion 0
Questions 69

A company has hired a security administrator to maintain and administer Linux and Windows-based systems. Written in the nightly report file is the following:

Firewall log files are at the expected value of 4 MB. The current time is 12am. Exactly two hours later the size has decreased considerably. Another hour goes by and the log files have shrunk in size again.

Which of the following actions should the security administrator take?

Options:

A.  

Log the event as suspicious activity and report this behavior to the incident response team immediately.

B.  

Log the event as suspicious activity, call a manager, and report this as soon as possible.

C.  

Run an anti-virus scan because it is likely the system is infected by malware.

D.  

Log the event as suspicious activity, continue to investigate, and act according to the site's security policy.

Discussion 0
Questions 70

Smart cards use which protocol to transfer the certificate in a secure manner?

Options:

A.  

Extensible Authentication Protocol (EAP)

B.  

Point to Point Protocol (PPP)

C.  

Point to Point Tunneling Protocol (PPTP)

D.  

Layer 2 Tunneling Protocol (L2TP)

Discussion 0
Questions 71

One way to defeat a multi-level security solution is to leak data via

Options:

A.  

a bypass regulator.

B.  

steganography.

C.  

a covert channel.

D.  

asymmetric routing.

Discussion 0
Questions 72

What are the three types of authentication?

Options:

A.  

Something you: know, remember, prove

B.  

Something you: have, know, are

C.  

Something you: show, prove, are

D.  

Something you: show, have, prove

Discussion 0
Questions 73

A network administrator received an administrative alert at 3:00 a.m. from the intrusion detection system. The alert was generated because a large number of packets were coming into the network over ports 20 and 21. During analysis, there were no signs of attack on the FTP servers. How should the administrator classify this situation?

Options:

A.  

True negatives

B.  

False negatives

C.  

True positives

D.  

False positives

Discussion 0
Questions 74

During a penetration test, a tester finds a target that is running MS SQL 2000 with default credentials. The tester assumes that the service is running with Local System account. How can this weakness be exploited to access the system?

Options:

A.  

Using the Metasploit psexec module setting the SA / Admin credential

B.  

Invoking the stored procedure xp_shell to spawn a Windows command shell

C.  

Invoking the stored procedure cmd_shell to spawn a Windows command shell

D.  

Invoking the stored procedure xp_cmdshell to spawn a Windows command shell

Discussion 0
Questions 75

A penetration tester is hired to do a risk assessment of a company's DMZ. The rules of engagement states that the penetration test be done from an external IP address with no prior knowledge of the internal IT systems. What kind of test is being performed?

Options:

A.  

white box

B.  

grey box

C.  

red box

D.  

black box

Discussion 0
Questions 76

What is the best defense against privilege escalation vulnerability?

Options:

A.  

Patch systems regularly and upgrade interactive login privileges at the system administrator level.

B.  

Run administrator and applications on least privileges and use a content registry for tracking.

C.  

Run services with least privileged accounts and implement multi-factor authentication and authorization.

D.  

Review user roles and administrator privileges for maximum utilization of automation services.

Discussion 0
Questions 77

A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.

Which cryptography attack is the student attempting?

Options:

A.  

Man-in-the-middle attack

B.  

Brute-force attack

C.  

Dictionary attack

D.  

Session hijacking

Discussion 0
Questions 78

What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the received response?

Options:

A.  

Passive

B.  

Reflective

C.  

Active

D.  

Distributive

Discussion 0
Questions 79

What is a successful method for protecting a router from potential smurf attacks?

Options:

A.  

Placing the router in broadcast mode

B.  

Enabling port forwarding on the router

C.  

Installing the router outside of the network's firewall

D.  

Disabling the router from accepting broadcast ping messages

Discussion 0
Questions 80

Which of the following is a preventive control?

Options:

A.  

Smart card authentication

B.  

Security policy

C.  

Audit trail

D.  

Continuity of operations plan

Discussion 0
Questions 81

Which type of scan is used on the eye to measure the layer of blood vessels?

Options:

A.  

Facial recognition scan

B.  

Retinal scan

C.  

Iris scan

D.  

Signature kinetics scan

Discussion 0
Questions 82

You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?

Options:

A.  

All three servers need to be placed internally

B.  

A web server facing the Internet, an application server on the internal network, a database server on the internal network

C.  

A web server and the database server facing the Internet, an application server on the internal network

D.  

All three servers need to face the Internet so that they can communicate between themselves

Discussion 0
Questions 83

You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?

Options:

A.  

nmap –A - Pn

B.  

nmap –sP –p-65535-T5

C.  

nmap –sT –O –T0

D.  

nmap –A --host-timeout 99-T1

Discussion 0
Questions 84

Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?

Options:

A.  

Bootrom Exploit

B.  

iBoot Exploit

C.  

Sandbox Exploit

D.  

Userland Exploit

Discussion 0
Questions 85

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?

Options:

A.  

SHA-2

B.  

SHA-3

C.  

SHA-1

D.  

SHA-0

Discussion 0
Questions 86

A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer's software and hardware without the owner’s permission. Their intention can either be to simply gain knowledge or to illegally make changes. Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?

Options:

A.  

Suicide Hacker

B.  

Black Hat

C.  

White Hat

D.  

Gray Hat

Discussion 0
Questions 87

Bob finished a C programming course and created a small C application to monitor the network traffic and produce alerts when any origin sends “many” IP packets, based on the average number of packets sent by all origins and using some thresholds.

In concept, the solution developed by Bob is actually:

Options:

A.  

Just a network monitoring tool

B.  

A signature-based IDS

C.  

A hybrid IDS

D.  

A behavior-based IDS

Discussion 0
Questions 88

Which of the following program infects the system boot sector and the executable files at the same time?

Options:

A.  

Stealth virus

B.  

Polymorphic virus

C.  

Macro virus

D.  

Multipartite Virus

Discussion 0
Questions 89

Why should the security analyst disable/remove unnecessary ISAPI filters?

Options:

A.  

To defend against social engineering attacks

B.  

To defend against webserver attacks

C.  

To defend against jailbreaking

D.  

To defend against wireless attacks

Discussion 0
Questions 90

Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate CPU and memory activities.

Which type of virus detection method did Chandler use in this context?

Options:

A.  

Heuristic Analysis

B.  

Code Emulation

C.  

Integrity checking

D.  

Scanning

Discussion 0
Questions 91

Darius is analysing logs from IDS. He want to understand what have triggered one alert and verify if it's true positive or false positive. Looking at the logs he copy and paste basic details like below:

source IP: 192.168.21.100

source port: 80

destination IP: 192.168.10.23

destination port: 63221

What is the most proper answer.

Options:

A.  

This is most probably true negative.

B.  

This is most probably true positive which triggered on secure communication between client and server.

C.  

This is most probably false-positive, because an alert triggered on reversed traffic.

D.  

This is most probably false-positive because IDS is monitoring one direction traffic.

Discussion 0
Questions 92

While reviewing the result of scanning run against a target network you come across the following:

Which among the following can be used to get this output?

Options:

A.  

A Bo2k system query.

B.  

nmap protocol scan

C.  

A sniffer

D.  

An SNMP walk

Discussion 0
Questions 93

It is a short-range wireless communication technology that allows mobile phones, computers and other devices to connect and communicate. This technology intends to replace cables connecting portable devices with high regards to security.

Options:

A.  

Bluetooth

B.  

Radio-Frequency Identification

C.  

WLAN

D.  

InfraRed

Discussion 0
Questions 94

Knowing the nature of backup tapes, which of the following is the MOST RECOMMENDED way of storing backup tapes?

Options:

A.  

In a cool dry environment

B.  

Inside the data center for faster retrieval in a fireproof safe

C.  

In a climate controlled facility offsite

D.  

On a different floor in the same building

Discussion 0
Questions 95

While you were gathering information as part of security assessments for one of your clients, you were able to gather data that show your client is involved with fraudulent activities. What should you do?

Options:

A.  

Immediately stop work and contact the proper legal authorities

B.  

Ignore the data and continue the assessment until completed as agreed

C.  

Confront the client in a respectful manner and ask her about the data

D.  

Copy the data to removable media and keep it in case you need it

Discussion 0
Questions 96

Bob received this text message on his mobile phone: ““Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: scottsmelby@yahoo.com””. Which statement below is true?

Options:

A.  

This is probably a legitimate message as it comes from a respectable organization.

B.  

Bob should write to scottsmelby@yahoo.com to verify the identity of Scott.

C.  

This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.

D.  

This is a scam because Bob does not know Scott.

Discussion 0
Questions 97

Security and privacy of/on information systems are two entities that requires lawful regulations. Which of the following regulations defines security and privacy controls for Federal information systems and organizations?

Options:

A.  

NIST SP 800-53

B.  

PCI-DSS

C.  

EU Safe Harbor

D.  

HIPAA

Discussion 0
Questions 98

What tool and process are you going to use in order to remain undetected by an IDS while pivoting and passing traffic over a server you’ve compromised and gained root access to?

Options:

A.  

Install Cryptcat and encrypt outgoing packets from this server.

B.  

Use HTTP so that all traffic can be routed via a browser, thus evading the internal Intrusion Detection Systems.

C.  

Use Alternate Data Streams to hide the outgoing packets from this server.

Discussion 0
Questions 99

As an Ethical Hacker you are capturing traffic from your customer network with Wireshark and you need to find and verify just SMTP traffic. What command in Wireshark will help you to find this kind of traffic?

Options:

A.  

request smtp 25

B.  

tcp.port eq 25

C.  

smtp port

D.  

tcp.contains port 25

Discussion 0
Questions 100

What is the term coined for logging, recording and resolving events in a company?

Options:

A.  

Internal Procedure

B.  

Security Policy

C.  

Incident Management Process

D.  

Metrics

Discussion 0
Questions 101

While performing ping scans into a target network you get a frantic call from the organization's security team. They report that they are under a denial of service attack. When you stop your scan, the smurf attack event stops showing up on the organization's IDS monitor.

How can you modify your scan to prevent triggering this event in the IDS?

Options:

A.  

Scan more slowly.

B.  

Do not scan the broadcast IP.

C.  

Spoof the source IP address.

D.  

Only scan the Windows systems.

Discussion 0
Questions 102

A big company, who wanted to test their security infrastructure, wants to hire elite pen testers like you. During the interview, they asked you to show sample reports from previous penetration tests. What should you do?

Options:

A.  

Share reports, after NDA is signed

B.  

Share full reports, not redacted

C.  

Decline but, provide references

D.  

Share full reports with redactions

Discussion 0
Questions 103

In which phase of the ethical hacking process can Google hacking be employed? This is a technique that involves manipulating a search string with specific operators to search for vulnerabilities.

Example:

allintitle: root passwd

Options:

A.  

Maintaining Access

B.  

Gaining Access

C.  

Reconnaissance

D.  

Scanning and Enumeration

Discussion 0
Questions 104

Which service in a PKI will vouch for the identity of an individual or company?

Options:

A.  

KDC

B.  

CA

C.  

CR

D.  

CBC

Discussion 0
Questions 105

Which of the following is a form of penetration testing that relies heavily on human interaction and often involves tricking people into breaking normal security procedures?

Options:

A.  

Social Engineering

B.  

Piggybacking

C.  

Tailgating

D.  

Eavesdropping

Discussion 0
Questions 106

Sandra is the security administrator of XYZ.com. One day she notices that the XYZ.com Oracle database server has been compromised and customer information along with financial data has been stolen. The financial loss will be estimated in millions of dollars if the database gets into the hands of competitors. Sandra wants to report this crime to the law enforcement agencies immediately. Which organization coordinates computer crime investigations throughout the United States?

Options:

A.  

NDCA

B.  

NICP

C.  

CIRP

D.  

NPC

E.  

CIA

Discussion 0
Questions 107

Which of the following is the BEST approach to prevent Cross-site Scripting (XSS) flaws?

Options:

A.  

Use digital certificates to authenticate a server prior to sending data.

B.  

Verify access right before allowing access to protected information and UI controls.

C.  

Verify access right before allowing access to protected information and UI controls.

D.  

Validate and escape all information sent to a server.

Discussion 0
Questions 108

A security consultant is trying to bid on a large contract that involves penetration testing and reporting. The company accepting bids wants proof of work so the consultant prints out several audits that have been performed. Which of the following is likely to occur as a result?

Options:

A.  

The consultant will ask for money on the bid because of great work.

B.  

The consultant may expose vulnerabilities of other companies.

C.  

The company accepting bids will want the same type of format of testing.

D.  

The company accepting bids will hire the consultant because of the great work performed.

Discussion 0
Questions 109

Which of the following resources does NMAP need to be used as a basic vulnerability scanner covering several vectors like SMB, HTTP and FTP?

Options:

A.  

Metasploit scripting engine

B.  

Nessus scripting engine

C.  

NMAP scripting engine

D.  

SAINT scripting engine

Discussion 0
Questions 110

What is the correct PCAP filter to capture all TCP traffic going to or from host 192.168.0.125 on port 25?

Options:

A.  

tcp.src == 25 and ip.host == 192.168.0.125

B.  

host 192.168.0.125:25

C.  

port 25 and host 192.168.0.125

D.  

tcp.port == 25 and ip.host == 192.168.0.125

Discussion 0