New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Information Systems Security CPEH-001 Exam Dumps

Page: 4 / 28
Total 736 questions

Certified Professional Ethical Hacker (CPEH) Questions and Answers

Question 13

You are attempting to man-in-the-middle a session. Which protocol will allow you to guess a sequence number?

Options:

A.

TCP

B.

UPD

C.

ICMP

D.

UPX

Question 14

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration?

alert tcp any any -> 192.168.100.0/24 21 (msg: "FTP on the network!";)

Options:

A.

An Intrusion Detection System

B.

A firewall IPTable

C.

A Router IPTable

D.

FTP Server rule

Question 15

You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine.

What wireshark filter will show the connections from the snort machine to kiwi syslog machine?

Options:

A.

tcp.dstport==514 && ip.dst==192.168.0.150

B.

tcp.srcport==514 && ip.src==192.168.0.99

C.

tcp.dstport==514 && ip.dst==192.168.0.0/16

D.

tcp.srcport==514 && ip.src==192.168.150

Question 16

A common cryptographical tool is the use of XOR. XOR the following binary values:

10110001

00111010

Options:

A.

10001011

B.

11011000

C.

10011101

D.

10111100

Page: 4 / 28
Total 736 questions