CPEH-001 Certified Professional Ethical Hacker Exam Free Questions


CPEH-001 exam is a required test for Certified Professional Ethical Hacker certification, which is valid for life. A Certified Professional Ethical Hacker is a professional who uses the same knowledge and tools as a malicious hacker, understands and knows how to look for the weaknesses and vulnerabilities in target systems and fortify them. CPEH-001 exam contains 100 Multiple Choice Questions and you must correctly answer 70 questions to pass the exam. Our online Certified Professional Ethical Hacker Exam CPEH-001 exam questions can help you prepare the test well.

Page 1 of 30

1. A new wireless client that is 802.11 compliant cannot connect to a wireless network given that the client can see the network and it has compatible hardware and software installed. Upon further tests and investigation, it was found out that the Wireless Access Point (WAP) was not responding to the association requests being sent by the wireless client.

What MOST likely is the issue on this scenario?

2. This configuration allows NIC to pass all traffic it receives to the Central Processing Unit (CPU), instead of passing only the frames that the controller is intended to receive. Select the option that BEST describes the above statement.

3. Which of the following is designed to verify and authenticate individuals taking part in a data exchange within an enterprise?

4. A software tester is randomly generating invalid inputs in an attempt to crash the program.

Which of the following is a software testing technique used to determine if a software program properly handles a wide range of invalid input?

5. What would you type on the Windows command line in order to launch the Computer Management Console provided that you are logged in as an admin?

6. Which of the following is a wireless network detector that is commonly found on Linux?

7. Which specific element of security testing is being assured by using hash?

8. Which of the following is a restriction being enforced in “white box testing?”

9. Which of the following is a vulnerability in GNU’s bash shell (discovered in September of 2014) that gives attackers access to run remote commands on a vulnerable system?

10. When security and confidentiality of data within the same LAN is of utmost priority, which IPSec mode should you implement?


 

Leave a Reply

Your email address will not be published.