시험덤프
매달, 우리는 1000명 이상의 사람들이 시험 준비를 잘하고 시험을 잘 통과할 수 있도록 도와줍니다.
  / CPEH-001 덤프  / CPEH-001 문제 연습

GAQM CPEH-001 시험

Certified Professional Ethical Hacker (CPEH) 온라인 연습

최종 업데이트 시간: 2024년04월26일,736문제.

당신은 온라인 연습 문제를 통해 GAQM CPEH-001 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.

시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 CPEH-001 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 736개의 시험 문제와 답을 포함하십시오.

 / 7

Question No : 1


Sam is working as s pen-tester in an organization in Houston. He performs penetration testing on IDS in order to find the different ways an attacker uses to evade the IDS. Sam sends a large amount of packets to the target IDS that generates alerts, which enable Sam to hide the real traffic.
What type of method is Sam using to evade IDS?

정답:

Question No : 2


Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations.
Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA.
In this context, what can you say?
A. Bob can be right since DMZ does not make sense when combined with stateless firewalls
B. Bob is partially right. He does not need to separate networks if he can create rules by destination IPs, one by one
C. Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations
D. Bob is partially right. DMZ does not make sense when a stateless firewall is available

정답: C

Question No : 3


A virus that attempts to install itself inside the file it is infecting is called?

정답:

Question No : 4


You are looking for SQL injection vulnerability by sending a special character to web applications.
Which of the following is the most useful for quick validation?

정답:

Question No : 5


Which of the following cryptography attack is an understatement for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by a coercion or torture?

정답:

Question No : 6


Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

정답:

Question No : 7


You are a security officer of a company. You had an alert from IDS that indicates that one PC on your Intranet is connected to a blacklisted IP address (C2 Server) on the Internet. The IP address was blacklisted just before the alert. You are staring an investigation to roughly analyze the severity of the situation.
Which of the following is appropriate to analyze?

정답:

Question No : 8


When tuning security alerts, what is the best approach?

정답:

Question No : 9


Bob finished a C programming course and created a small C application to monitor the network traffic and produce alerts when any origin sends “many” IP packets, based on the average number of packets sent by all origins and using some thresholds.
In concept, the solution developed by Bob is actually:

정답:

Question No : 10


Assume a business-crucial web-site of some company that is used to sell handsets to the customers worldwide. All the developed components are reviewed by the security team on a monthly basis. In order to drive business further, the web-site developers decided to add some 3rd party marketing tools on it. The tools are written in JavaScript and can track the customer’s activity on the site. These tools are located on the servers of the marketing company.
What is the main security risk associated with this scenario?

정답:

Question No : 11


On performing a risk assessment, you need to determine the potential impacts when some of the critical business process of the company interrupt its service.
What is the name of the process by which you can determine those critical business?

정답:

Question No : 12


You are the Network Admin, and you get a compliant that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible. But they are not accessible when you try using the URL.
What may be the problem?

정답:

Question No : 13


What is the least important information when you analyze a public IP address in a security alert?

정답:

Question No : 14


Which of the following statements is TRUE?

정답:

Question No : 15


If you want only to scan fewer ports than the default scan using Nmap tool, which option would you use?

정답:

 / 7
GAQM