GAQM CPEH-001 Exam
Certified Professional Ethical Hacker (CPEH) Exam (Page 14 )

Updated On: 1-Feb-2026

This kind of password cracking method uses word lists in combination with numbers and special characters:

  1. Hybrid
  2. Linear
  3. Symmetric
  4. Brute Force

Answer(s): A

Explanation:

A Hybrid (or Hybrid Dictionary) Attack uses a word list that it modifies slightly to find passwords that are almost from a dictionary (like St0pid)



_________ is a tool that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes.

  1. Trojan
  2. RootKit
  3. DoS tool
  4. Scanner
  5. Backdoor

Answer(s): B

Explanation:

Rootkits are tools that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes.



What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?

  1. Copy the system files from a known good system
  2. Perform a trap and trace
  3. Delete the files and try to determine the source
  4. Reload from a previous backup
  5. Reload from known good media

Answer(s): E

Explanation:

If a rootkit is discovered, you will need to reload from known good media. This typically means performing a complete reinstall.



What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?

  1. All are hacking tools developed by the legion of doom
  2. All are tools that can be used not only by hackers, but also security personnel
  3. All are DDOS tools
  4. All are tools that are only effective against Windows
  5. All are tools that are only effective against Linux

Answer(s): C

Explanation:

All are DDOS tools.



How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?

  1. There is no way to tell because a hash cannot be reversed
  2. The right most portion of the hash is always the same
  3. The hash always starts with AB923D
  4. The left most portion of the hash is always the same
  5. A portion of the hash will be all 0's

Answer(s): B

Explanation:

When looking at an extracted LM hash, you will sometimes observe that the right most portion is always the same. This is padding that has been added to a password that is less than 8 characters long.



Viewing page 14 of 177
Viewing questions 66 - 70 out of 878 questions



Post your Comments and Discuss GAQM CPEH-001 exam prep with other Community members:

Join the CPEH-001 Discussion