Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam

Certification Provider: GAQM
Exam Name: Certified Professional Ethical Hacker (CPEH) Exam
Number of questions in our database: 877
Exam Version: Apr. 14, 2024
CPEH-001 Exam Official Topics:
  • Topic 1: Predicting the Future of Hacking/ Information Gathering Techniques
  • Topic 2: Target Enumeration and Port Scanning Techniques/ Hacking Web Applications
  • Topic 3: Windows Exploit Development Basics/ Introduction to Hacking
  • Topic 4: Social Engineering Hacking/ Wireless Networks/ Linux Basics
  • Topic 5: Hackers Methodology/ Network Sniffing/ Vulnerability Assessment
  • Topic 6: Client-Side Exploitation/ Remote Exploitation/ Password Hacking
  • Topic 7: Hack Attack/ Post exploitation/ Wireless Hacking/ Web Hacking
Disscuss GAQM CPEH-001 Topics, Questions or Ask Anything Related

Currently there are no comments in this discussion, be the first to comment!

Free GAQM CPEH-001 Exam Actual Questions

The questions for CPEH-001 were last updated On Apr. 14, 2024

Question #1

StackGuard (as used by Immunix), ssp/ProPolice (as used by OpenBSD), and Microsoft's /GS option use _____ defense against buffer overflow attacks.

Reveal Solution Hide Solution
Correct Answer: A

Canaries or canary words are known values that are placed between a buffer and control data on the stack to monitor buffer overflows. When the buffer overflows, it will clobber the canary, making the overflow evident. This is a reference to the historic practice of using canaries in coal mines, since they would be affected by toxic gases earlier than the miners, thus providing a biological warning system.


Question #2

A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) then it was intended to hold.What is the most common cause of buffer overflow in software today?

Reveal Solution Hide Solution
Correct Answer: D

Technically, a buffer overflow is a problem with the program's internal implementation.


Question #3

What is SYSKEY # of bits used for encryption?

Reveal Solution Hide Solution
Correct Answer: C

System Key hotfix is an optional feature which allows stronger encryption of SAM. Strong encryption protects private account information by encrypting the password data using a 128-bit cryptographically random key, known as a password encryption key.


Question #4

Vulnerability mapping occurs after which phase of a penetration test?

Reveal Solution Hide Solution
Correct Answer: C

The order should be Passive information gathering, Network level discovery, Host scanning and Analysis of host scanning.


Question #5

Exhibit:

Given the following extract from the snort log on a honeypot, what service is being exploited? :

Reveal Solution Hide Solution
Correct Answer: A

The connection is done to 172.16.1.104:21.



Unlock all CPEH-001 Exam Questions with Advanced Practice Test Features:
  • Select Question Types you want
  • Set your Desired Pass Percentage
  • Allocate Time (Hours : Minutes)
  • Create Multiple Practice tests with Limited Questions
  • Customer Support
Get Full Access Now

Save Cancel