Smartly Prepare Exam with Free Online CPEH-001 Practice Test

We offer the latest CPEH-001 practice test designed for free and effective online Certified Professional Ethical Hacker (CPEH) certification preparation. It's a simulation of the real CPEH-001 exam experience, built to help you understand the structure, complexity, and topics you'll face on exam day.

Exam Code: CPEH-001
Exam Questions: 881
Certified Professional Ethical Hacker (CPEH)
Updated: 25 Aug, 2025
Viewing Page : 1 - 89
Practicing : 1 - 5 of 881 Questions
Question 1

Michael is a junior security analyst working for the National Security Agency (NSA) working primarily on breaking terrorist encrypted messages. The NSA has a number of methods they use to decipher encrypted messages including Government Access to Keys (GAK) and inside informants. The NSA holds secret backdoor keys to many of the encryption algorithms used on the Internet. The problem for the NSA, and Michael, is that terrorist organizations are starting to use custom-built algorithms or obscure algorithms purchased from corrupt governments. For this reason, Michael and other security analysts like him have been forced to find different methods of deciphering terrorist messages. One method that Michael thought of using was to hide malicious code inside seemingly harmless programs. Michael first monitors sites and bulletin boards used by known terrorists, and then he is able to glean email addresses to some of these suspected terrorists. Michael then inserts a stealth keylogger into a mapping program file readme.txt and then sends that as an attachment to the terrorist. This keylogger takes screenshots every 2 minutes and also logs all keyboard activity into a hidden file on the terrorist's computer. Then, the keylogger emails those files to Michael twice a day with a built in SMTP server. What technique has Michael used to disguise this keylogging software?

Options :
Answer: C

Question 2

A covert channel is a channel that

Options :
Answer: A

Question 3

Which of the following techniques does a vulnerability scanneruse in order to detect a vulnerability on a target service?

Options :
Answer: D

Question 4

Which of the following tools can be used to perform a zone transfer?

Options :
Answer: A,C,D

Question 5

While examining a log report you find out that an intrusion has been attempted by a machine whose IP address is displayed as 0xde.0xad.0xbe.0xef. It looks to you like a hexadecimal number. You perform a ping 0xde.0xad.0xbe.0xef. Which of the following IP addresses will respond to the ping and hence will likely be responsible for the intrusion?

Options :
Answer: D

Viewing Page : 1 - 89
Practicing : 1 - 5 of 881 Questions

© Copyrights FreePDFQuestions 2025. All Rights Reserved

We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.