Free CPEH-001 Exam Braindumps (page: 46)

Page 46 of 220

When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK. How would an attacker exploit this design by launching TCP SYN attack?

  1. Attacker generates TCP SYN packets with random destination addresses towards a victim host
  2. Attacker floods TCP SYN packets with random source addresses towards a victim host
  3. Attacker generates TCP ACK packets with random source addresses towards a victim host
  4. Attacker generates TCP RST packets with random source addresses towards a victim host

Answer(s): B



Yancey is a network security administrator for a large electric company. This company provides power for over 100, 000 people in Las Vegas. Yancey has worked for his company for over 15 years and has become very successful. One day, Yancey comes in to work and finds out that the company will be downsizing and he will be out of a job in two weeks. Yancey is very angry and decides to place logic bombs, viruses, Trojans, and backdoors all over the network to take down the company once he has left. Yancey does not care if his actions land him in jail for 30 or more years, he just wants the company to pay for what they are doing to him.
What would Yancey be considered?

  1. Yancey would be considered a Suicide Hacker
  2. Since he does not care about going to jail, he would be considered a Black Hat
  3. Because Yancey works for the company currently; he would be a White Hat
  4. Yancey is a Hacktivist Hacker since he is standing up to a company that is downsizing

Answer(s): A



You receive an e-mail like the one shown below.
When you click on the link contained in the mail, you are redirected to a website seeking you to download free Anti-Virus software.
Dear valued customers,
We are pleased to announce the newest version of Antivirus 2010 for Windows which will probe you with total security against the latest spyware, malware, viruses, Trojans and other online threats.

Simply visit the link below and enter your antivirus code:
Antivirus code: 5014
http://www.juggyboy/virus/virus.html
Thank you for choosing us, the worldwide leader Antivirus solutions.
Mike Robertson
PDF Reader Support
Copyright Antivirus 2010 ?All rights reserved
If you want to stop receiving mail, please go to:
http://www.juggyboy.com or you may contact us at the following address: Media Internet Consultants, Edif. Neptuno, Planta Baja, Ave. Ricardo J. Alfaro, Tumba Muerto, n/a Panama How will you determine if this is Real Anti-Virus or Fake Anti-Virus website?

  1. Look at the website design, if it looks professional then it is a Real Anti-Virus website
  2. Connect to the site using SSL, if you are successful then the website is genuine
  3. Search using the URL and Anti-Virus product name into Google and lookout for suspicious warnings against this site
  4. Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware
  5. Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware

Answer(s): C



Every company needs a formal written document which spells out to employees precisely what they are allowed to use the company's systems for, what is prohibited, and what will happen to them if they break the rules. Two printed copies of the policy should be given to every employee as soon as possible after they join the organization. The employee should be asked to sign one copy, which should be safely filed by the company. No one should be allowed to use the company's computer systems until they have signed the policy in acceptance of its terms.
What is this document called?

  1. Information Audit Policy (IAP)
  2. Information Security Policy (ISP)
  3. Penetration Testing Policy (PTP)
  4. Company Compliance Policy (CCP)

Answer(s): B



Page 46 of 220



Post your Comments and Discuss GAQM CPEH-001 exam with other Community members:

Austin commented on December 17, 2024
OK ok When the VM becomes infected with data encrypting ransomware, you decide to recover the VM's files. Which of the following is TRUE in this scenario?
INDIA
upvote

KEMISO ABEBE BEKERE commented on December 17, 2024
GRE FREE CERTIFICATE TEST
Anonymous
upvote

Krishna commented on December 16, 2024
It's very helpful for exam
AUSTRALIA
upvote

nana commented on December 16, 2024
good information for practice
Anonymous
upvote

Nice commented on December 16, 2024
Nice nice nice
Anonymous
upvote

Jonas commented on December 16, 2024
Interesting
Anonymous
upvote

Gosia commented on December 16, 2024
Hi, did you have the same questions on exams?
POLAND
upvote

tom commented on December 16, 2024
it is very good
HONG KONG
upvote

sk commented on December 16, 2024
very usefull
Anonymous
upvote

harsha commented on December 16, 2024
a good way to practice
Anonymous
upvote

Rarebreed commented on December 16, 2024
These Dumps are super duper awesome. I passed my exams from these dumps on 14Th December 2024
NIGERIA
upvote

RJ commented on December 16, 2024
Preparing exam
UNITED STATES
upvote

CY commented on December 15, 2024
quite simple
HONG KONG
upvote

Kamala Swarnalatha commented on December 15, 2024
Good to use
Anonymous
upvote

kamala commented on December 15, 2024
Good to use this
Anonymous
upvote

BabeGirl commented on December 15, 2024
great stuff
Anonymous
upvote

Ousman commented on December 15, 2024
i am going to pass in this month
Anonymous
upvote

Roshan Thakur commented on December 15, 2024
Its very useful.
UNITED STATES
upvote

joe commented on December 15, 2024
dump still valid?
UNITED STATES
upvote

Priti commented on December 14, 2024
Answers seems to be correct
SINGAPORE
upvote

megha commented on December 14, 2024
pls give download file for dumps
Anonymous
upvote

Priti commented on December 14, 2024
Good questions
SINGAPORE
upvote

Priti commented on December 14, 2024
Good article
SINGAPORE
upvote

R Jeswanth commented on December 14, 2024
Hi This is Jai
AUSTRALIA
upvote

Anonymous commented on December 14, 2024
Good set or practice
Anonymous
upvote

??? commented on December 14, 2024
great collection of test questions. very effective to pass the exam
BANGLADESH
upvote

summer commented on December 13, 2024
nice questions
Anonymous
upvote

DIvesh commented on December 13, 2024
Good way to practice
JAPAN
upvote

redflame commented on December 12, 2024
great content
Anonymous
upvote

aini commented on December 12, 2024
best best best
Anonymous
upvote

Aung Naing Lin commented on December 12, 2024
good practice lesson
UNITED STATES
upvote

Mikronet commented on December 12, 2024
good pratice lessons
UNITED STATES
upvote

blaze commented on December 12, 2024
is the PDF worth it? Are these questions the same on the exam?
Anonymous
upvote

Mike Kutenda Chizinga commented on December 12, 2024
are these questions still valid
Anonymous
upvote