GAQM Certified Professional Ethical Hacker (CPEH) Exam CPEH-001 Exam Questions in PDF

Free GAQM CPEH-001 Dumps Questions (page: 30)

Data is sent over the network as clear text (unencrypted) when Basic Authentication is configured on Web Servers.

  1. true
  2. false

Answer(s): A



NetBIOS over TCP/IP allows files and/or printers to be shared over the network. You are trying to intercept the traffic from a victim machine to a corporate network printer. You are attempting to hijack the printer network connection from your laptop by sniffing the wire.
Which port does SMB over TCP/IP use?

  1. 443
  2. 139
  3. 179
  4. 445

Answer(s): D



One of the ways to map a targeted network for live hosts is by sending an ICMP ECHO request to the broadcast or the network address. The request would be broadcasted to all hosts on the targeted network. The live hosts will send an ICMP ECHO Reply to the attacker's source IP address. You send a ping request to the broadcast address 192.168.5.255.



There are 40 computers up and running on the target network. Only 13 hosts send a reply while others do not.
Why?

  1. Windows machines will not generate an answer (ICMP ECHO Reply) to an ICMP ECHO request aimed at the broadcast address or at the network address.
  2. Linux machines will not generate an answer (ICMP ECHO Reply) to an ICMP ECHO request aimed at the broadcast address or at the network address.
  3. You should send a ping request with this command ping ? 192.168.5.0-255
  4. You cannot ping a broadcast address. The above scenario is wrong.

Answer(s): A



Charlie is the network administrator for his company. Charlie just received a new Cisco router and wants to test its capabilities out and to see if it might be susceptible to a DoS attack resulting in its locking up. The IP address of the Cisco switch is 172.16.0.45.
What command can Charlie use to attempt this task?

  1. Charlie can use the commanD. ping -l 56550 172.16.0.45 -t.
  2. Charlie can try using the commanD. ping 56550 172.16.0.45.
  3. By using the command ping 172.16.0.45 Charlie would be able to lockup the router
  4. He could use the comman ping -4 56550 172.16.0.45.

Answer(s): A



What type of encryption does WPA2 use?

  1. DES 64 bit
  2. AES-CCMP 128 bit
  3. MD5 48 bit
  4. SHA 160 bit

Answer(s): B



Share your comments for GAQM CPEH-001 exam with other users:

U
unanimous
12/15/2023 6:38:00 AM

very nice very nice

A
akminocha
9/28/2023 10:36:00 AM

please help us with 1z0-1107-2 dumps

J
Jefi
9/4/2023 8:15:00 AM

please upload the practice questions

T
Thembelani
5/30/2023 2:45:00 AM

need this dumps

A
Abduraimov
4/19/2023 12:43:00 AM

preparing for this exam is overwhelming. you cannot pass without the help of these exam dumps.

P
Puneeth
10/5/2023 2:06:00 AM

new to this site but i feel it is good

A
Ashok Kumar
1/2/2024 6:53:00 AM

the correct answer to q8 is b. explanation since the mule app has a dependency, it is necessary to include project modules and dependencies to make sure the app will run successfully on the runtime on any other machine. source code of the component that the mule app is dependent of does not need to be included in the exported jar file, because the source code is not being used while executing an app. compiled code is being used instead.

M
Merry
7/30/2023 6:57:00 AM

good questions

V
VoiceofMidnight
12/17/2023 4:07:00 PM

Delayed the exam until December 29th.

U
Umar Ali
8/29/2023 2:59:00 PM

A and D are True

V
vel
8/28/2023 9:17:09 AM

good one with explanation

G
Gurdeep
1/18/2024 4:00:15 PM

This is one of the most useful study guides I have ever used.

AI Tutor 👋 I’m here to help!