質問 1:When Nmap performs a ping sweep, which of the following sets of requests does it send to the target device?
A. ICMP ECHO_REPLY & TFP RST
B. ICMP ECHO_REQUEST & TCP ACK
C. ICMP ECHO_REQUEST & TCP SYN
D. ICMP ECHO_REPLY & TCP FIN
正解:B
解説: (Topexam メンバーにのみ表示されます)
質問 2:Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two. What would you call this attack?
A. ARP Proxy
B. Interceptor
C. Poisoning Attack
D. Man-in-the-middle
正解:D
解説: (Topexam メンバーにのみ表示されます)
質問 3:Fake Anti-Virus, is one of the most frequently encountered and persistent threats on the web. This malware uses social engineering to lure users into infected websites with a technique called Search Engine Optimization. Once the Fake AV is downloaded into the user's computer, the software will scare them into believing their system is infected with threats that do not really exist, and then push users to purchase services to clean up the non-existent threats. The Fake AntiVirus will continue to send these annoying and intrusive alerts until a payment is made.
What is the risk of installing Fake AntiVirus?
A. Victim's personally identifiable information such as billing address and credit card details, may be extracted and exploited by the attacker
B. Once infected, the computer will be unable to boot and the Trojan will attempt to format the hard disk
C. Victim's Operating System versions, services running and applications installed will be published on Blogs and Forums
D. Denial of Service attack will be launched against the infected computer crashing other machines on the connected network
正解:A
質問 4:In this attack, a victim receives an e-mail claiming from PayPal stating that their account has been disabled and confirmation is required before activation. The attackers then scam to collect not one but two credit card numbers, ATM PIN number and other personal details.
Ignorant users usually fall prey to this scam. Which of the following statement is incorrect related to this attack?
A. Do not reply to email messages or popup ads asking for personal or financial information
B. Review credit card and bank account statements regularly
C. Do not send credit card numbers, and personal or financial information via e-mail
D. Antivirus, anti-spyware, and firewall software can very easily detect these type of attacks
E. Do not trust telephone numbers in e-mails or popup ads
正解:D
質問 5:Which of the following represent weak password? (Select 2 answers)
A. Passwords that contain only numbers ExamplE. 23698217
B. Passwords that contain only special characters and numbers ExamplE. 123@$45
C. Passwords that contain only letters ExamplE. QWERTYKLRTY
D. Passwords that contain Uppercase/Lowercase from a dictionary list ExamplE. OrAnGe
E. Passwords that contain letters and numbers ExamplE. meerdfget123
F. Passwords that contain letters, special characters, and numbers ExamplE. ap1$%##f@52
G. Passwords that contain only special characters ExamplE. &*#@!(%)
H. Passwords that contain only letters and special characters ExamplE. bob@&ba
正解:C,D
質問 6:What are the three types of compliance that the Open Source Security Testing Methodology Manual (OSSTMM) recognizes?
A. Audit, standards based, regulatory
B. Legislative, contractual, standards based
C. Contractual, regulatory, industry
D. Legal, performance, audit
正解:B
質問 7:Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been able to spawn an interactive shell and plans to deface the main web page. He first attempts to use the "echo" command to simply overwrite index.html and remains unsuccessful. He then attempts to delete the page and achieves no progress. Finally, he tries to overwrite it with another page in which also he remains unsuccessful. What is the probable cause of Bill's problem?
A. The HTML file has permissions of read only
B. The system is a honeypot
C. You cannot use a buffer overflow to deface a web page
D. There is a problem with the shell and he needs to run the attack again
正解:A
質問 8:Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?
A. Injecting arbitrary data
B. Banner grabbing
C. Port scanning
D. Analyzing service response
正解:D
質問 9:Which of the following techniques can be used to mitigate the risk of an on-site attacker from connecting to an unused network port and gaining full access to the network? (Choose three.)
A. Port Security
B. Network Admission Control (NAC)
C. 802.1q Port Based Authentication
D. IPSec Encryption
E. 802.1x Port Based Authentication
F. Intrusion Detection System (IDS)
正解:A,B,E
弊社のGAQM CPEH-001を利用すれば試験に合格できます
弊社のGAQM CPEH-001は専門家たちが長年の経験を通して最新のシラバスに従って研究し出した勉強資料です。弊社はCPEH-001問題集の質問と答えが間違いないのを保証いたします。
この問題集は過去のデータから分析して作成されて、カバー率が高くて、受験者としてのあなたを助けて時間とお金を節約して試験に合格する通過率を高めます。我々の問題集は的中率が高くて、100%の合格率を保証します。我々の高質量のGAQM CPEH-001を利用すれば、君は一回で試験に合格できます。
一年間の無料更新サービスを提供します
君が弊社のGAQM CPEH-001をご購入になってから、我々の承諾する一年間の更新サービスが無料で得られています。弊社の専門家たちは毎日更新状態を検査していますから、この一年間、更新されたら、弊社は更新されたGAQM CPEH-001をお客様のメールアドレスにお送りいたします。だから、お客様はいつもタイムリーに更新の通知を受けることができます。我々は購入した一年間でお客様がずっと最新版のGAQM CPEH-001を持っていることを保証します。
弊社は失敗したら全額で返金することを承諾します
我々は弊社のCPEH-001問題集に自信を持っていますから、試験に失敗したら返金する承諾をします。我々のGAQM CPEH-001を利用して君は試験に合格できると信じています。もし試験に失敗したら、我々は君の支払ったお金を君に全額で返して、君の試験の失敗する経済損失を減少します。
弊社は無料GAQM CPEH-001サンプルを提供します
お客様は問題集を購入する時、問題集の質量を心配するかもしれませんが、我々はこのことを解決するために、お客様に無料CPEH-001サンプルを提供いたします。そうすると、お客様は購入する前にサンプルをダウンロードしてやってみることができます。君はこのCPEH-001問題集は自分に適するかどうか判断して購入を決めることができます。
CPEH-001試験ツール:あなたの訓練に便利をもたらすために、あなたは自分のペースによって複数のパソコンで設置できます。
TopExamは君にCPEH-001の問題集を提供して、あなたの試験への復習にヘルプを提供して、君に難しい専門知識を楽に勉強させます。TopExamは君の試験への合格を期待しています。
GAQM CPEH-001 認定試験の出題範囲:
トピック | 出題範囲 |
---|
トピック 1 | - Client-Side Exploitation
- Remote Exploitation
- Password Hacking
|
トピック 2 | - Hackers Methodology
- Network Sniffing
- Vulnerability Assessment
|
トピック 3 | - Social Engineering Hacking
- Wireless Networks
- Linux Basics
|
参照:https://gaqm.org/certifications/information_systems_security/cpeh
安全的な支払方式を利用しています
Credit Cardは今まで全世界の一番安全の支払方式です。少数の手続きの費用かかる必要がありますとはいえ、保障があります。お客様の利益を保障するために、弊社のCPEH-001問題集は全部Credit Cardで支払われることができます。
領収書について:社名入りの領収書が必要な場合、メールで社名に記入していただき送信してください。弊社はPDF版の領収書を提供いたします。