Free CPEH-001 Exam Braindumps (page: 49)

Page 49 of 220

Which of the following encryption is NOT based on block cipher?

  1. DES
  2. Blowfish
  3. AES (Rijndael)
  4. RC4

Answer(s): D



Michael is a junior security analyst working for the National Security Agency (NSA) working primarily on breaking terrorist encrypted messages. The NSA has a number of methods they use to decipher encrypted messages including Government Access to Keys (GAK) and inside informants. The NSA holds secret backdoor keys to many of the encryption algorithms used on the Internet. The problem for the NSA, and Michael, is that terrorist organizations are starting to use custom-built algorithms or obscure algorithms purchased from corrupt governments. For this reason, Michael and other security analysts like him have been forced to find different methods of deciphering terrorist messages. One method that Michael thought of using was to hide malicious code inside seemingly harmless programs. Michael first monitors sites and bulletin boards used by known terrorists, and then he is able to glean email addresses to some of these suspected terrorists. Michael then inserts a stealth keylogger into a mapping program file readme.txt and then sends that as an attachment to the terrorist. This keylogger takes screenshots every 2 minutes and also logs all keyboard activity into a hidden file on the terrorist's computer. Then, the keylogger emails those files to Michael twice a day with a built in SMTP server.
What technique has Michael used to disguise this keylogging software?

  1. Steganography
  2. Wrapping
  3. ADS
  4. Hidden Channels

Answer(s): C



In which step Steganography fits in CEH System Hacking Cycle (SHC)

  1. Step 2: Crack the password
  2. Step 1: Enumerate users
  3. Step 3: Escalate privileges
  4. Step 4: Execute applications
  5. Step 5: Hide files
  6. Step 6: Cover your tracks

Answer(s): E



Which definition below best describes a covert channel?

  1. A server program using a port that is not well known
  2. Making use of a protocol in a way it was not intended to be used
  3. It is the multiplexing taking place on a communication link
  4. It is one of the weak channels used by WEP that makes it insecure

Answer(s): B



Page 49 of 220



Post your Comments and Discuss GAQM CPEH-001 exam with other Community members:

Sumeet G Hongekar commented on December 21, 2024
I am eger to write cad exaam
UNITED STATES
upvote

KAREEM ROFIAT BOLANLE commented on December 21, 2024
not yet written the exam
Anonymous
upvote

Subham commented on December 21, 2024
Good set of question for practice
Anonymous
upvote

Krish commented on December 20, 2024
Good to have test papers
INDIA
upvote

Ashish Sharma commented on December 20, 2024
Very elaborative explanation and apt questions
CANADA
upvote

Ashish Sharma commented on December 20, 2024
Very Useful
CANADA
upvote

Ashwani commented on December 20, 2024
Nice questions
UNITED KINGDOM
upvote

hardik commented on December 20, 2024
Very good content
UNITED STATES
upvote

Test commented on December 20, 2024
its helpful
Anonymous
upvote

haardik commented on December 20, 2024
Good so far
UNITED STATES
upvote

priya commented on December 20, 2024
good to prepare for the exam
Anonymous
upvote

Nagaraj commented on December 20, 2024
The questions help me to review
Anonymous
upvote

Reagan commented on December 20, 2024
Very Useful
Anonymous
upvote

Anonymous commented on December 20, 2024
definitely a perfect set of questions
Anonymous
upvote

DD commented on December 20, 2024
Preparing for exam
Anonymous
upvote

Anonymous1 commented on December 20, 2024
Nice questions
Anonymous
upvote

PrepGoku commented on December 20, 2024
Great list of questions, with full explaination
Anonymous
upvote

Hemlata commented on December 20, 2024
Great content
INDIA
upvote

Nicholos J Frates commented on December 20, 2024
I just passed the Salesforce-AI-Associate exam recently! my Result Card: https://docs.google.com/document/d/1CicoY5IGQwyyanVV_cCEUE2jFT86tyl3FZ_hA6Q_BiM
Anonymous
upvote

Hemlata commented on December 20, 2024
It is useful.
INDIA
upvote

Koomi commented on December 20, 2024
Great Content
Anonymous
upvote

Aamamm commented on December 20, 2024
useful for certfication
UNITED STATES
upvote

Preeti commented on December 20, 2024
How many questions in exam was from dump who give exam recently?
INDIA
upvote

Preeti commented on December 20, 2024
Have any of you taken the exam recently and passed just by using this dump?
INDIA
upvote

gill commented on December 20, 2024
nice nice nice
Anonymous
upvote

Hitesh commented on December 20, 2024
good practice questions available here
UNITED STATES
upvote

KT commented on December 20, 2024
I passed using this dumps.
Anonymous
upvote

Hassan commented on December 19, 2024
Quite challenging and interesting
Anonymous
upvote

mke commented on December 19, 2024
so far so good
UNITED STATES
upvote

JP commented on December 19, 2024
Good so far
UNITED STATES
upvote

Anyah Vincent Ndubuisi commented on December 19, 2024
Microsoft SC 200 SOC, is awesomely good enough for every cybersecurity specialist. Well detailed for freshers also. From Anyah Vincent.Nigeria.
Anonymous
upvote

Shehan commented on December 19, 2024
Superb stuff
Anonymous
upvote

gege commented on December 19, 2024
The questions looks promising and well formatted. But has anyone passed this exam recently? I have heard the exam is very very hard.
Anonymous
upvote

Tejaswini commented on December 19, 2024
For my understanding
Anonymous
upvote