Free GAQM CPEH-001 Exam Questions

Try our Free Demo Practice Tests for Comprehensive CPEH-001 Exam Preparation

  • GAQM CPEH-001 Exam Questions
  • Provided By: GAQM
  • Exam: Certified Professional Ethical Hacker (CPEH)
  • Certification: Information Systems Security
  • Total Questions: 881
  • Updated On: Apr 25, 2025
  • Rated: 4.9 |
  • Online Users: 1762
Page No. 1 of 177
Add To Cart
  • Question 1
    • Michael is a junior security analyst working for the National Security Agency (NSA) working primarily on breaking terrorist encrypted messages. The NSA has a number of methods they use to decipher encrypted messages including Government Access to Keys (GAK) and inside informants. The NSA holds secret backdoor keys to many of the encryption algorithms used on the Internet. The problem for the NSA, and Michael, is that terrorist organizations are starting to use custom-built algorithms or obscure algorithms purchased from corrupt governments. For this reason, Michael and other security analysts like him have been forced to find different methods of deciphering terrorist messages. One method that Michael thought of using was to hide malicious code inside seemingly harmless programs. Michael first monitors sites and bulletin boards used by known terrorists, and then he is able to glean email addresses to some of these suspected terrorists. Michael then inserts a stealth keylogger into a mapping program file readme.txt and then sends that as an attachment to the terrorist. This keylogger takes screenshots every 2 minutes and also logs all keyboard activity into a hidden file on the terrorist's computer. Then, the keylogger emails those files to Michael twice a day with a built in SMTP server. What technique has Michael used to disguise this keylogging software?

      Answer: C
  • Question 2
    • A certified ethical hacker (CEH) is approached by a friend who believes her husband is cheating. She offers to pay to break into her husband's email account in order to find proof so she can take him to court. What is the ethical response?

      Answer: A
  • Question 3
    • Ivan is auditing a corporate website. Using Winhex, he alters a cookie as shown below.
      Before Alteration: Cookie: lang=en-us; ADMIN=no; y=1 ; time=10:30GMT ;
      After Alteration: Cookie: lang=en-us; ADMIN=yes; y=1 ; time=12:30GMT ;
      What attack is being depicted here?

      Answer: D
  • Question 4
    • Wayne is the senior security analyst for his company. Wayne is examining some traffic logs on a server and came across some inconsistencies. Wayne finds some IP packets from a computer purporting to be on the internal network. The packets originate from 192.168.12.35 with a TTL of 15. The server replied to this computer and received a response from 192.168.12.35 with a TTL of 21. What can Wayne infer from this traffic log?

      Answer: A
  • Question 5
    • What is the essential difference between an 'Ethical Hacker' and a 'Cracker'?

      Answer: C
PAGE: 1 - 177
Add To Cart

© Copyrights Dumpscity 2025. All Rights Reserved

We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the Dumpscity.