IT認証試験問題集
毎月、GOWUKAKUは1500人以上の受験者が試験準備を助けて、試験に合格するために受験者にご協力します
 ホームページ / CPEH-001 問題集  / CPEH-001 問題練習

GAQM CPEH-001 問題練習

Certified Professional Ethical Hacker (CPEH) 試験

最新更新時間: 2024/03/18,合計736問。

【2024年3月キャンペーン】:CPEH-001 最新真題を買う時、日本語版と英語版両方を同時に獲得できます。

実際の問題集を練習し、試験のポイントを了解し、テストに申し込むするかどうかを決めることができます。

さらに試験準備時間の35%を節約するには、CPEH-001 問題集を使用してください。

 / 7

Question No : 1
Sam is working as s pen-tester in an organization in Houston. He performs penetration testing on IDS in order to find the different ways an attacker uses to evade the IDS. Sam sends a large amount of packets to the target IDS that generates alerts, which enable Sam to hide the real traffic.
What type of method is Sam using to evade IDS?

正解:

Question No : 2
Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations.
Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA.
In this context, what can you say?
A. Bob can be right since DMZ does not make sense when combined with stateless firewalls
B. Bob is partially right. He does not need to separate networks if he can create rules by destination IPs, one by one
C. Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations
D. Bob is partially right. DMZ does not make sense when a stateless firewall is available

正解: C

Question No : 3
A virus that attempts to install itself inside the file it is infecting is called?

正解:

Question No : 4
You are looking for SQL injection vulnerability by sending a special character to web applications.
Which of the following is the most useful for quick validation?

正解:

Question No : 5
Which of the following cryptography attack is an understatement for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by a coercion or torture?

正解:

Question No : 6
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

正解:

Question No : 7
You are a security officer of a company. You had an alert from IDS that indicates that one PC on your Intranet is connected to a blacklisted IP address (C2 Server) on the Internet. The IP address was blacklisted just before the alert. You are staring an investigation to roughly analyze the severity of the situation.
Which of the following is appropriate to analyze?

正解:

Question No : 8
When tuning security alerts, what is the best approach?

正解:

Question No : 9
Bob finished a C programming course and created a small C application to monitor the network traffic and produce alerts when any origin sends “many” IP packets, based on the average number of packets sent by all origins and using some thresholds.
In concept, the solution developed by Bob is actually:

正解:

Question No : 10
Assume a business-crucial web-site of some company that is used to sell handsets to the customers worldwide. All the developed components are reviewed by the security team on a monthly basis. In order to drive business further, the web-site developers decided to add some 3rd party marketing tools on it. The tools are written in JavaScript and can track the customer’s activity on the site. These tools are located on the servers of the marketing company.
What is the main security risk associated with this scenario?

正解:

Question No : 11
On performing a risk assessment, you need to determine the potential impacts when some of the critical business process of the company interrupt its service.
What is the name of the process by which you can determine those critical business?

正解:

Question No : 12
You are the Network Admin, and you get a compliant that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible. But they are not accessible when you try using the URL.
What may be the problem?

正解:

Question No : 13
What is the least important information when you analyze a public IP address in a security alert?

正解:

Question No : 14
Which of the following statements is TRUE?

正解:

Question No : 15
If you want only to scan fewer ports than the default scan using Nmap tool, which option would you use?

正解:

 / 7
GAQM